BAN The Use of Neurotech for Nefarious Purposes

BAN The Use of Neurotech for Nefarious Purposes

Recent signers:
Pat Adams and 19 others have signed recently.

The Issue

My name is Kurt Patterson, I am an INNOCENT MAN, subjected to an unthinkable nightmare every single day since 2019. I have been targeted and ensnared by this malevolent technology against which I am at an utter loss to protect myself - a government neurotechnology that seeks to manipulate, harm, and ultimately, drive me to suicide or criminal conduct. The corrupt FBI activated this horrifying technology that has already cost me a significant portion of my life, enveloping me inside a living torment of inflicted psychosis, sleep deprivation, and continuous mental torture spanning years.

 

DETAILS OF THE NON-INVASIVE BRAIN COMPUTER INTERFACE:

This device is an advanced form of (NIBCI) Non-Invasive Brain Computer Interface, which functions as both an acoustic weapon and a neurological weapon, it is connected to the individual or individuals through an established connection with their brain’s neural network. This enables the ability to engage in Neuromodulation, specifically transcranial.    

I call it "Brain Pairing." The device is controlled by federal agents who have the ability to manipulate the various features within the device's command center. This device is designed to monitor, extract & reconstruct data endemic to the targeted regions in the brain, memory and the process in which data is encoded and stored is the skeleton key to it all. 

Non-Invasive Neural Signal Decoding is the broad terminology for this process, which is achieved with relative ease through a set of decoding/encoding models and algorithms.  

This type of neural interface has been theorized, studied and perfected since the assassination of JFK. "Neuro-Warfare" is a military terminology used to describe this insidious technology, if you begin to comb the surface web for intel you will realize quite quickly that you can find a significant amount of data that will educate you further on the feasibility and applicability of this type of Neurotechnology.

The (CIA) Central Intelligence Agency has blackmailed and manipulated every single (POTUS) President of the United States, since the inception of the (OSS), & when there was a POTUS that was recalcitrant or devoid of any useful stressors they were assassinated. This is an extremely disturbing and dark aspect of the intelligence community, not many citizens would ever think of entertaining the idea that a POTUS could be a sexual deviant, but the fact remains that the main stressor for almost every single POTUS since JFK has been drug addiction or sexual deviancy. The main reason the CIA ordered the death of Jeffrey Epstein was to cover up this exact fact, being the main proprietor of children for some of the most powerful and influential people in the political realm.

The reason this is important to remember is because many individuals under this technology believe that the POTUS is unaware, when in reality the POTUS is completely cognizant of this activity. The programs functionality ensures its longevity, all the way up to the peak of the (DOJ) Department of Justice, plausible deniability has defeated the whistleblower. 

This form of insulation is in place in almost all of the 195 countries. Most individuals will attempt to move at a Domestic or International level in an attempt to escape the frequency. This device is equipped with satellite capability which means you cannot outmaneuver the technology and since geolocation is a primary component and your brain becomes the geolocation beacon, it is simply an effort in futility.

The entire structure of both government and military in USA, Canada, South America, Europe, Asia & China have full knowledge and participation in this program. These countries are not authorized to interfere or activate this on foreign citizens; the activation process is restricted to their own populace. However, if an "activated" individual travels abroad he/she will be monitored by the host country authority as well as the country of origination. It should be highlighted that this program required clearance from multiple Generals, & Presidential approval. Continuity of this program has been authorized once, which will be valid for 30 years.

This is one of the most layered and complex programs in human history, it is important to illustrate the full spectrum of participation, awareness and program applicability. The Posse Comitatus Act has been VIOLATED by the federal government with military support, this is a clandestine agreement, this program is the byproduct of Operation Northwoods and MK-Ultra and functions in an extralegal capacity & supersedes the aforementioned act. This is unconstitutional and should be considered domestic terrorism by definition. 

It is important to acknowledge that although it is an armed service, the U.S. Coast Guard, which operates under the United States Department of Homeland Security during peacetime, is not restricted by the Posse Comitatus Act and has explicit authority to enforce federal law. This is true even when the Coast Guard operates as a service within the United States Navy during wartime.

It is a disturbing reality that military intelligence has utilized the Military Cooperation with Civilian Law Enforcement Agencies Act to engage in psychological operations.

Palantir Technologies is the main proprietor of this technology, which is a main support system for federal agencies in America and privately outsourced on an international scale.

In order to establish the initial connection to the intended target they have to be within a certain proximity, there are handheld devices that transmit the connection signal, which have a small monitor affixed adjacent to the transmitter. There is a larger apparatus with multiple monitors which is a stationary device or "Parent" device.

Once the device is successfully connected the technicians can communicate to the target using transmitted infrasonic frequencies that are imperceptible to anyone else but the intended target. The technicians utilize Synthetic Telepathy to harass them through various methods such as insults, threats, and other malicious forms of communication.

Synthetic Telepathy is a known provocateuring weapon, & has been the skeleton key for producing countless false flag operations & border conflicts such as the Thailand-Cambodian incident of 2025.

This device can assimilate, decode & analyze external aural stimuli through accessing and capturing the Sensory Memory data, for auditory perception that is the Echoic Memory. Everything that the targets brain has processed in regard to auditory function will be logged in a digitalized format into a "Sound Byte" database, such as voice signatures, ambient noise, anything that is perceptible to the target. Through Advanced Heterodyne software/firmware they create a virtual clone of the analyzed acoustic frequency. They can use the assimilated sounds and emulate them to harass the target. Your mothers voice or fathers voice ETC. The intensity of the frequencies needed for the target to perceive it is automatically adjusted in accordance with the targets surrounding external stimuli. E.G., if you are standing near a train, it will duplicate the level of intensity produced by the acoustic wave frequency.

Although voice synthesis (voice signature emulation or creation) is utilized, there is strict protocol that must be adhered to when operating the device. The clandestine policy and procedure restrict the emulation of individuals according to status within the government, IE. Presidents, Vice Presidents, High Ranking Military Personnel, Diplomats, Governors, Representatives ETC. 

It is capable of monitoring what you perceive through your occipital lobe, which is then transmitted to a monitor attached to the device. This violates all aspects of privacy and strips you entirely of what it means to be human. They can observe you under ANY activity imaginable. This is achieved through a Non-Invasive Visual Decoding Model.

Machine Olfaction stimulates the Olfactory area by transmitting digitalized odor molecules. However, this device utilizes a more nuanced methodology, Transcranial Focused Ultrasound (tFUS / TPU) reactivating sensory data of the stimuli specific memory, in this case odor. This was first tested on rodents eventually culminating into human subjects. I think you might remember from your childhood that you may have opened a "scent book" & engaged in a different form of Olfaction stimulation called Chemical Olfaction. 

Using Artificial intelligence software equipped with deep learning it is capable of "Dream Simulation" Comparable to how a movie is created by a director, the AI generated dream is as well. These AI dreams are designed to terrorize and both psycho-sexually and psychologically profile the subconscious state of the target's mind. Scientists studying this phenomenon realized an individual in a state of (REM) Rapid Eye Movement leaves their subconscious particularly vulnerable to suggestion. This process is known as (EMREMS) Electromagnetic REM Stimulation.

The AI utilizes all the former experiences from the individual through their multiple forms of memory encoded and stored within the brain to create scenarios with malleable elements, it engages in a unique AI Biomimicry. This dream simulation is initiated with Theta Wave frequency and followed by a Delta Wave frequency and is then paired with an Aural Stimuli, which will accompany the visual data of the dream. The stimulation of the Auditory Cortex can induce Thunderclap Headaches and Myocardial Infarction from shock. This is also a coordinated attack, meaning all the active targets across the occupied country will experience the dream simultaneously.

(ELF) Extremely Low Frequency at ~1 Hz drives pons’ GABA/glycine neurons into a more prolonged inhibitory state, deepening muscle paralysis beyond normal REM. Through this process (AMA) Artificial Muscle Atonia or Sleep Paralysis is induced through the projected nightmare. 

This is achieved with relative ease if every active target is sedated through the theta waves and is sleeping around the same time. The main benefit of this operational procedure is data extrapolation & there is a secure database which contains all the active subjects that are experiencing this harassment. (ECS) Encrypted Cloud Server houses this information secured with a military grade encryption, data can be transmitted to and from a (LEO) Low Earth Orbit Satellite.

This program is called INCEPT, which predates the 2000's all the way to the Cambodian Genocide. The CIA was experimenting with unique and undetectable methods of dispatching adversaries and sanitizing potential future leaks. Several Hmong men were affected by this tragedy which actually inspired the famous film A Nightmare on Elm Street by director Wes Craven. This is advancing the frontier of (SDW) Simulated Dream Warfare. Essentially, this is theorized to both eliminate targets through dreams & help induce societal submission to the carefully constructed paradigm of control. This is known as (SDBM) Simulated Dream Behavioral Modification, from a psychological perspective dreams are capable of a valuable degree of Behavioral Modification, depending on the scenarios that are implemented. 

This device is also capable of thought transference, meaning it assimilates and transmits both internal dialogue and visualized thought. This is achieved through Noninvasive Continuous Language Decoding. E.G., If you picture a basketball in your mind, it will be received by the technology and transferred to the screen of the monitor. You can actually communicate back and forth to the technicians harassing you through your own internal dialogue. They weaponize your own internal dialogue against you to create deep fake videos and fabricated audio. With so much analytical software out in cyberspace it is almost impossible to assume that agencies will not use them for more damage than good.  The technicians internal dialogue is sandboxed from the target; the target is under a very layered version of "Chat Channel".

It is capable of memory infiltration and can extract memory data all the way from the beginning of your childhood when you were first capable of consciously remembering experiences, it then transmits the memory to the monitor for visualization.

The process of harvesting memory data in the brain is complex to an extent, through the aforementioned Non-Invasive Neural Signal Decoding and a (SSADA) Stimuli Specific Analysis and Decryption Algorithm it can be achieved. Through this neural algorithm it will associate a specific neural signature with the memory in question and the region of origin, you can simultaneously gather actual memory data and basic functional data. There is an interactive advanced model of the targets brain housed in a sandboxed environment on the Parent Device, there is a downloading process quite soon after the initial connection for Explicit Memory and Implicit Memory, which contains Episodic Memory and Autobiographical Memory.

This technology is capable of inhibiting the process related to the consolidation of memory, timed to critical hippocampal and cortical rhythms in the minutes to hours after learning it will selectively suppress synaptic consolidation and induce a form of temporary, targeted amnesia without structural damage. Desynchronization is achievable through ELF pulses timed to the troughs of hippocampal theta, reduce spike timing precision, impairing LTP.

It is fairly important to elucidate on Artificial Muscle Atrophy and the process that is required to produce the desired muscle wasting affect. There is another SSDA for natural physiological protocols that occur during a human being's lifecycle, such as Postprandial, Post‐exercise recovery, Circadian Rhythm and the Pre-Sleep Period. 

For Postprandial Physiology: After a carbohydrate‐rich meal, blood glucose and insulin rise; parasympathetic (Vagus) activity increases, often causing mild somnolence (“food coma”).
Ideal window: 30–60 minutes after a normal‐sized lunch or dinner—when gastric motility is high and insulin/serotonin pathways are active. A low‐amplitude theta burst here can synergize with natural postprandial drowsiness.

For Post-Exercise Recovery: After moderate‐to‐high intensity exercise (e.g., weightlifting or interval training), amino acids flood muscle repair pathways. Growth hormone and IGF‐1 levels elevate, and overall cortical arousal can drop as the body shifts into recovery mode.
Ideal window: 15–45 minutes after finishing exercise—when parasympathetic rebound is strongest and adenosine buildups in the brain are maximal. A brief theta‐tACS session then can lean on that adenosine‐mediated drive toward lethargy.

For Circadian Rhythm: Around 2:00–4:00 pm (post‐lunch dip) people naturally experience slower reaction times and mild sleepiness. If a person’s schedule overlaps this window, even a short 10-minute 6 Hz tACS can amplify the lethargic outcome.

For Pre-Sleep Period: Melatonin begins to rise 1 hour before bedtime; core body temperature drops; EEG shifts toward theta/delta.
A final 20 min theta‐tACS block starting 60 minutes before desired bedtime can help entrain endogenous theta/delta transitions, especially for insomniacs.

This will be weaponized against the individual to create the aforementioned muscle wasting affect, thus leaving you malnourished and physically weak.

There is a very concerning aspect of this technology, which is the stimulation of the thermoreceptor's endemic to the temperature regulation process and hypothalamic functionality. This can effectively raise and lower a human's internal temperature in very slow incremental measurements, causing significant discomfort. 

There is currently research ongoing in response to the biggest hurdle this technology has yet to overcome, the brains Universal Neural Code. This in Lamens terms, is the organic code that governs all fundamental protocol in the brain of the Homosapien. This is what all humans share, although a memory itself or a thought that is generated can be completely unique from another, this code remains ubiquitous. In order for complete infiltration of an individual's brain, you must bypass the brains very own cybersecurity, the cognition of artificial stimulation, or artificial stimulation detection system.

There has been ongoing research in this area of Neuroscience for the past decade, it has been theorized that the only way to ascertain this monumental goal is to fully replicate the transmission of a Foreign Neural Code in an 100% organic form.

This process can be achieved through several methods, the easiest and quite possibly the most alarming is through surgical implantation. This is the exact equivalent of what Elon Musks Bio-Engineers have designed, and there is still progress that has not yet been made. Organelles and the study of their functionality inside a Bio-Computer have yielded significant and impressive results, alluding to the potential of the aforementioned organic replication needed for full spectrum control of the human mind. Bioelectricity and thermal output are two signatures relevant to the brain's natural computation process, something that will need to be analyzed, as well as determining what algebraic equivalency can be properly applied in order to replicate the brains naturally multimodal and asymmetrical method of computation on a systemic level.    

In order to bypass the crime of disseminating surveillance and have a viable defense from litigation the technicians of this technology will "livestream" the individual, this essential function works by a DEEP AI Software that utilizes the occipital lobe feed. The parameters are mapped and digitalized in accordance with the targets surrounding environmental architecture. When the parameters that lead to public interaction are breached, the livestream immediately begins. This is used to galvanize the public to engage in instigation, Local and State Law Enforcement are notified through their onboard computer system. Car radios and Apple I-phones can be used as a potential vector as well.

There is a very concerning aspect of this technology, and that is the virus that is attributed to any and all devices, social media, associated with the targeted individual. This virus is a unique form of RAT|PYSILON hybrid, which enables a level of clandestine access. The goal is to obfuscate not only the full scope of the psychological torment but also eliminate the possibility of a social media spotlight. Social media applications run on specific algorithms, called content algorithms. These are used to coordinate traffic to individual profiles and posts, these can be influenced by astute programmers. Domestic & Foreign surveillance will be employed under the powers granted in the Foreign Intelligence Surveillance ACT, of 1978 and the Patriot ACT, of 2001.

The scope of authority imbued within these are generally obfuscated by a minimal amount of Proof of Concept, as evident in the "Fact Sheet". There was a minimally discussed proposal of amendment and extension in 2023, the Reforming Intelligence and Securing America Act. which was supported by both sides of the house, which would extend until a re-authorization of Section 702 on April 20, 2024. 

You can find the ODNI "FISC Opinion on Certification of Amendments FISA Section 702." I find it amusing that further obfuscation of kangaroo court proceedings and evidence of CIA, FBI, NCTC and NSA judicial impunity have evaporated in hubs of libertarian discussion. COINTEL and Counterterrorism task force within these agencies have utilized technology beyond the scope of ANY investigative capacity. 

There is an intriguing element to this technology, which is the isolation and targeting of civilians through their device WIFI via SUPER-SAT Computer, if you are engaging with someone on a live streaming platform they will be instructed to instigate with provocative comments. You need to be aware that if you are watching a stream from a foreign country, this is considered public interaction, and that country will be activated.  

There are various methods that will enable the virus to essentially be transmitted to another device, which will activate the targeting system upon interaction with a stranger's system like a Venus flytrap. I cannot elucidate on all for obvious reasons, scanning the hardware of your devices and other forms of (OPSEC) Operational Security is something that I would strongly recommend. Refrain from purchasing devices from unknown clients, as this will be used as a physical trojan horse. Leeches or WIFI RATS are a common tactic of corrosive data suppression, this will be relayed to the individuals private and encrypted network using this technology.

Lawyers are backdoored and will be actively communicated with, especially if they have had a previous relationship with you as a client.

You should be aware that you will have ANY hardware purchased will be manipulated at the manufacturing level, it is also within the realm of possibility, that hardware can be intercepted and implanted with a microchip that can be used to geolocate and harvest data without the device actually on. This can be achieved wirelessly through ultrasonic transmission, as well as the relatively nuanced laser injection. I would stay off the Facebook marketplace, as you could essentially be purchasing spyware.

Obviously, information pertinent to the functionality of this program and the devices deployed is of great concern. One safety net for all involved is the mental acuity and competence required to correctly ascertain (unless prior knowledge is given) the innumerable variables to this predicament. Synthetic Media is highly monitored and kept exceptionally malleable until it is "fit for public consumption", elucidation on all aspects of this topic would distract from this petition. If a particular organization can become a beacon of Controlled Opposition to identify and suppress the actual opposers to a regime's ideology or social structure this too will be employed.

This is an important aspect to illuminate because there are many individuals currently under this technology who will attempt to reach out through social media, which has been implemented into this programs threat model. There are (NGO) that function as actual intelligence gathering apparatus, the objective is to illicit information directly from the source of the individual. This has been basic protocol since most people will explode violently and leave behind evidence hoping to elucidate the harassment they were receiving. There are a significant number of people who will also pose as targets themselves which have a slightly different protocol to obfuscate the possibility of this actually occurring, making incredulous remarks or deviating the attention elsewhere.

These individuals that have been selected for this program are at a dangerous impasse, if they collectivize this would be a double edge sword. Now the federal government can have credibility in labelling the group a "Domestic Terrorist Cell" which would only compound the issue of a FISA level surveillance unit being assigned to these people.  

Unfortunately, there is absolutely zero recourse through governmental systems. Many people will report incidents to Local and State law enforcement agencies, who are actually under threat of treason if they acknowledge this activity. "Can neither Confirm nor Deny" An individual under this technology is at his/her most vulnerable moment when they are reduced to incarceration or homelessness, which is actually one of the primary objectives of these malicious actors using this technology. I simply cannot stress how important it is to remember that inducing self-destructive behavior is their goal.

 There has been an alarming trend within the Intelligence Community of "CP Bombing" individuals suspected of committing espionage against the United States of America, (NSA) National Security Agency is the prime culprit in this activity. Metadata associated with suspected intelligence leaks are pooled and once the individual is properly identified they can be targeted with a very malicious package of AI generated images and videos. This was theorized and implemented for security purposes as the age of assassination has become extremely risky even for internalized damage control. It is an absolute last resort to eliminate a threat in such a capacity, this insidious technique is effectively equivalent to a death sentence.   

There is a generic manipulation involving creating a false narrative through declassified documents which has been utilized in great frequency, the documents will possess all the elements of real intelligence but are actually meticulously designed to be released based on a simple analytical process. This is all based off of the known time it takes to be required to declassify and release to the public, the assassination of JFK is a prime example of this tactic.

The public surrounding the target will be manipulated through slander and false information. The most disgusting rumors and excuses for the activation will be circulated, from a potential Fugitive tracking system to a domestic terrorist prevention tool, I have heard just about everything you could possibly imagine. Anything that foments a negative opinion and leads to the insulation of the ongoing criminal activity will be beneficial, the more potent and venomous it is more effective at manufacturing an oblivious and cooperative public. Some commonly applied tactics for character assassination include allegations of being an "Incel", "Pedophile" or "School Shooter" which is particularly effective due to the disdain that society has for these types of individuals. This is classic behavioral psychology and an easy way to induce a tribalistic psychological reaction in both the masculine and feminine psychology.  

 

This technology is also being used to facilitate Espionage operations, utilizing noninvasive continuous language decoding and surveilling through the occipital feed of an operative conducting counterintelligence for our nation on foreign adversaries in non-compliant countries, it was also to be used for mole screening on operatives through accessing the memory data. This is also the new frontier of data theft, utilizing this technology you can steal information from a target without ever leaving a single trace, and from a considerable distance as well.

It was theorized that the devices could be weaponized to a point of inducing silent pacification; by stimulating targeted areas of the body's major organs, this was intended for high value targets deemed too recalcitrant to control diplomatically. (JAIC) Joint Artificial Intelligence Center had contracted the devices for clandestine special operations for its capability as a means of non-verbal communication, utilizing occipital feeds it is feasible to calculate and execute ordinance deployment through visuals of ground infantry.

It is also deployed for the infiltration and dissolution of terrorist cells within the military and abroad. Civilian initiated Domestic Terrorism is also targeted by this technology, VIA federal, State and local authorities. Machine Olfaction is a methodology of detection for (CWA) Chemical Warfare Agents as well as other Conventional forms of terrorism. There will be devices installed in areas designated (NSR) National Security Risks, such as Airports, Government Agencies, Schools etc. Body scanners, Luggage scanners, and security wands and (APMD) Ambient Particulate Matter Detectors utilize this technology. There is also ongoing research in regard to State and Federal prison security systems of America implementing intermediary variations of these devices to replace the archaic camera systems they currently employ.

This would essentially create a unique (OLFS) Occipital Live Feed System, which would be utilized to actively surveil inmates and convicts beyond the usual scope of authority. The reasoning behind this advancement will be extremely dangerous individuals or those prone to attempting escape. This is not the first time that DEW has been used on the prison population of America, case and point is the Silent Guardian System

Using these Ultrasonic and ELF frequencies it is possible to chemically taper an individual's micro-aggressive behavior. When these devices are inevitably converted to the micro-scale, you will see installation into all layers of Critical Infrastructure. Bygone is the age of physical restraint of an active or emerging threat, now we are focusing on eliminating the manufacturing process of aggressive thought before it becomes a crime. This is extremely unconstitutional, & something that should concern every American citizen.

The concept behind the micro-architecture of this device is relatively straightforward, it is essentially a miniature version of the NIBCI. There is one considerable difference, the inclusion of a micro LRAD. This will be deployed when the AI targeting system associated with the neural scanning unit has authorized a strike based upon aggressive thought, when adrenal glands secrete epinephrine, this will be enough to override the Theta/Delta waves transmitted by the NIBCI. The micro LRAD takes over and transmits a transcranial incapacitation frequency. 

The CIA is actively engaged in experiments with this technology in Vermont Prisons, with logistical coordination provided by Nicholas Deml. Experimentation on inmates and convicts was part of the infancy of this technology; the Central Intelligence Agency had concluded that individuals inside of USP's were extremely viable candidates. This was due to fairly little recourse coupled with the environmental stimuli and isolation of a USP, allowing for a convenient excuse such as mental illness or psychosis. Broward Correctional Institution opened in 1977, and had previously housed a male population, was used on more than one occasion; this was facilitated through clandestine satellite installation on the compound. Operatives during these experiments would be stationed in the adjacent Pembroke Pines

I am well aware of the Secret Service utilizing this technology as a deterrent for perceived national security threats, and the current defenses in place for high value targets of which could be targeted by foreign interest. However, this technology is also the weapon behind the Manchurian Candidate manufacturing process, as well as the construction and implementation of a (GNSG) Global Neural Surveillance Grid. There are three culprits I can pinpoint which could achieve this, Starlink​, Star Shield and ICEYE. I am aware of the origins of research and development for this technology, the first Russian Signal” and the following incidents of Havana Syndrome”. 

This technology has been the catalyst for multiple vicarious crimes, including Homicide, Arson, Assassination, Kidnapping, Mass Casualty Incidents and Muslim Extremism. There is a very disturbing list of Manchurian Candidates that needs to be addressed, the mainstream media outlets have been sponsored and controlled by the CIA for years, very similar to how the Military Industrial Complex screens cinematic releases to red flag any potential material deemed excessively corrosive.

In this program's infancy, the only capability was the infrasonic communication. In order to successfully further the MK Ultra project the CIA ascertained very early on that they needed more than just this antiquated form of instigation. The agency infiltrated colleges and started recruiting from inside to acquire the most intelligent minds available that could be persuaded with relative ease. Ill-gotten gains from the "Efforts" in the golden triangle and Colombia were utilized to facilitate private sector research and development.

Areas in academia that would be required to complete the desired outcome were highlighted and relayed to the program director, which were then approved. Bioengineering was one of the main focal points and gave birth to the neurotechnology that we are currently facing, most of the earlier subjects were notorious criminals. Aileen Wuornos was actually a victim of the former, complaining of "Sonic Pressure" her account while an inaccurate description was not delusional.

This is an out of order list of known subjects:

Adam Lanza~USA, Aileen Wuornos~USA, Kevin Costlow~USA, Micheal Brown~USA, James Gleason~USA, Stephen Marlow~USA, Milton William Cooper~USA, Myron May~USA, Misbah Abdul Kareem~USA, Paul Overeem~USA, Aaron Alexis~USA, Mathew Choi~USA, Matthew Dulmaine~USA, Fuaed Abdo Ahmed~USA, Jared Loughner~USA, Justin Hobel~USA, John Lyons~USA, Bryan Riley~USA, Lonnie Place~USA, Isreal Keyes~USA, Britney Spears~USA, Mathew Livelsberger~USA, Todd Kohlhepp~USA, Thomas Jacob Sanford~ USA, Alec Mckinney~USA, Robert Card~USA, Phoenix Ikner~USA,  Panya Khamrab~THAILAND, Robin Forde, Kevin Douglas Limbaugh~USA, Nigel Max Edge~USA Valdo Calocane~UK, Benjamin Hoffman~AUS, Mohamed Aliwijaya~AUS

While at first glance it is easy to discount this as improvable conjecture, if you dig deeper into each individual, you will find corroborating factors. As for the other thousands of individuals currently under this technology, most are incarcerated, institutionalized or homeless.

It would be quite the disturbing reality that Schizophrenia was actually engineered in the early 60-70's due to experimentation with the Frey Effect, but given what we know about the human brains decoding process it is evident that aural stimuli is impossible to hallucinate. From what we know about this program all facets of infrastructure are cognizant, meaning we may be uncovering the greatest medical myth in human history.

One of the main objectives behind these provocateur operations which have been coined False Flag Operations is to consolidate societal control. For instance, with every act of terrorism that transpires there are certain legislative and technological benefits to the government that follow. There is an active plan to foment the installation of a totalitarian regime in America through a technological stranglehold, using the NIBCI discussed in this petition the U.S Government can start the process of installing neural monitors within Critical Infrastructure. The idea behind this is to both neurologically monitor and neurochemically taper micro-aggressive behavior under the pretext of evolving security.

The causation behind this is psychological in nature, inducing psychosis which through the memory access can be achieved through relative ease. Highlighting a targeted individual's psychological stressors, such as traumatic events and instigating through gaslighting, love bombing, 

This type of malicious technological manipulation and harassment has been quite virulent, occurring in every country. There has been a major victory in the Veritas Movement from inside of China, with a Chinese whistleblower utilizing cryptocurrency to foment awareness

I have theorized developing a defense to this insidious technology that I have come to call "Nemesis". The concept involves the implantation of a neural chip that will act as organic cybersecurity for the brain, this would be feasible by filtering all incoming signals to the brain and rejecting "Intruder" signals sent from artificial sources. There could be some difficulty as a wetware computer is transmitting "organic" signals, I have also theorized the development of hearing aids equipped with nanoscale jamming technology.

We as civilians do not have access to the necessary components, funding and laboratorial environments to create what is needed. However, this is private sector and privately funded research and development technology that we are talking about. In 2018, The Secret Service implemented the use of synthetic hair implants which can be used as a covert form of geolocation.  

To elicit full cooperation from confirmed terrorist imprisoned in (GITMO), this technology garnered a successful confession from two to four Muslim extremists. Until that juncture, they had been deemed recalcitrant by the military psychologist to routine interrogative tactics. 

This is an elucidation on the technological capabilities and functionality of this unconstitutional apparatus and is extremely vital to any individual suffering from this targeted form of federal harassment. In America, you are supposed to be innocent until proven guilty, although in the judicial system it is often reversed. It becomes evident that through this federal manipulation of the public, this technology can be used to change public opinion before any matter is brought before a court.

 

This is the story associated with this technology; I will spare no details besides the antecedence of my childhood. Anything that pertains to the current matter will be illustrated, I hope you will take the time to read this entire story, it could save your life.

In 2007, my half-brother Scott Wilson had begun navigating the bureaucracy of Washington DC. We had different fathers but grew up as blood brothers under the care of my mother, I was the youngest child in the family, and he was several years older than myself when I entered the world. He started out as a Staff Assistant, and by November of 2011 he had become a full-fledged Professional Staff member for one of the most influential committees in Congress, The Senate Committee on the Judiciary. 

He proceeded on this path until he was working in an advisory capacity to Senator Patrick Leahy who was the President Pro Tempore until January 3rd, 2023. He had ushered in his guidance on a range of technology, telecommunications, tax, intellectual property, transportation, homeland security, labor, and economic development issues, with a particular focus on advancing his priorities in his capacity as Vice Chairman of the Appropriations Committee.

In 2018 he married Victoria Taylor, who worked as the Deputy Chief of Mission in Croatia until 2021. Victoria Taylor is currently the Deputy Assistant Secretary for Iraq and Iran. I believe these familial and political ties have played a significant role in the future federal scrutiny, I had also become very interested in the political field. I am an extremely intelligent political analyst, capable of predicting outcomes few could see materializing in the future.

In 08/23/20, I was living in a small town in Vernon Vermont, my father had moved to Columbus Ohio, and I was left with the property that he had purchased some 20 years prior. It was a very minute community for a town; I had several friends that were still active inside it. I was 22 years of age when I started to take an interest in photography, I would spend hours sitting outside my house capturing the organic essence of Vermont. The property was fairly obfuscated by flora and fauna, and you couldn't see the property from the road save the gravel driveway.

Every now and again I would visit with the friends that I had, we would have campfires and talk about the bygone years of our childhood. I spent over a year contemplating and observing societal functionality and its inherent structure, I didn't just analyze our community as a small town, I branched out to multiple different states and communities. It was after this close observation that I had recognized the engineered acidification of America and its destruction of the citizen. I decided that it was better to be constructive rather than destructive when dealing with this reality, I planned to create an organization in the future that could deal with the problems that we face as a collective society. 

It was around this time that I started to get heavily involved in advanced energy research, something that would be needed in order to safely fuel the next generation of an ever-evolving society. I am extremely concerned with the development of AI, and I made that explicitly clear in communications with the public and government agencies. My specific area of concern was with the Artificial Intelligence Merger/Singularity that was being touted as the only viable route to an expedited human evolution. I informed the government through email and phone calls that we needed a clear delineation between Positive and Negative technology, and that to ignore this was perilous to the human race. How could there be a merger without the death of organic humanity?

I have a massive concern with Sam Altman's "World Human Verification Project" which has layered governmental support including the CIA. This is part of the hyper digitalization of the human race and ushers in an unparalleled level of mass surveillance on society by eliminating paper currency and pushing Biometric Data verification down to an individual's DNA. "Recently, the project unveiled the Orb Mini, a portable device designed to scan users' eyeballs and verify their identity. This device resembles a smartphone and features two large sensors that capture biometric data. The scanning process takes about 30 seconds and generates a unique "IrisCode" for each user, which is stored securely on the block chain. This verification process is intended to combat fraud and the proliferation of bots online."

"As of now, the project claims to have over 26 million registrants, with 12 million verified users globally. The World project has also established partnerships with major companies, including Visa and Match Group, to integrate its verification system into various platforms. For instance, Visa plans to introduce a "World Visa card" available only to users who have undergone the iris scanning process."

Clone Robotics is another area of extreme concern. The Synthetic Replacement becomes viable with the creation of hyper realistic humanoids.

The biggest myth ever told to the public was that humans as a species could successfully merge with AI without being completely assimilated.  What singularity truly means is human beings converting themselves to Artificial Intelligence, not coexistence. We needed to sandbox AI, ensuring that it is never given the capability of self-sentience. So long as we are programming AI, we are safe. I was cognizant of the UAP issue that was perplexing individuals in governments worldwide, I had theories in relation to this, which were forwarded to (NASA) back in 2019.

I had highlighted very specific engines that could be the catalyst for what we are witnessing in our aerial space. I was most interested in what I have coined as the (Super Classes), so called "phenomena" in both physics and chemistry where basic principles of matter are challenged. I believe these super classes are the doorway to advanced non-combustion engines for a new and ubiquitously applicable methodology of transportation. I have been interested in superconductivity engines designed for aerial flight specifically, of a hybridized sort.

I considered the development of advanced Quantum technology and hyper-development of AI to be the beginning of the first technological transitory phase in human history. These two forces would unlock the potential for a "Kardashev Leap", a point that arguably every species that debates immortalization through advanced technology must reach before the actualization of the idea can occur. It is my belief that this quintessential time in humanity is the most dangerous, a moment to be approached with absolute caution equivalent to the fragility of the situation. There have been some concerning developments, involving advanced AI training protocols working within the best and brightest Bioengineering institutes. 

I was extremely concerned with the omnipresent issue of the Kessler Effect, which is essentially the proliferation and oversaturation of Active Satellites, Satellite Debris and Rocket Debris polluting Earth-Space. This will eventually lead to an inescapable planet among other significant problems. I have theorized using magnetized nets or an artificial gravitational force to permanently sanitize what little Earth-Space we have. It is theoretically possible to transfer detritus to Mars, then liquify these materials to provide adequate base elements for construction upon the surface.

I find it relatively amusing that some exo-planet researchers have deemed this unfortunate circumstance to be a "Solution to the Fermi Paradox" and a sign of intelligent life, when in reality it would be an indication of impulsivity and a colossal lack of intelligence. This combination is usually attributed to a lack of intellectual evolution; I would argue that hypervigilance is a strong indication of hyperintelligence.

 

While I was living at this property, I began to notice some disconcerting activity. I had several instances where vehicles would enter my driveway and make their way up to where my house was perched at the top of the hill, it was at an elevated position so I could actually hear the engine and the displacement of gravel. One particular instance I was in my bathtub completely naked, when I heard the door open. I immediately sprang up out of the tub and ran towards the door which had shut, almost as quickly as I had gotten out. Whoever it was managed to get into a vehicle which I made out to be a sedan of some sort, which disappeared down the road and sped off.

I was alerted by my neighbor that there was an individual asking about my daily activities, that she apparently did not wish to disclose the name of. I shrugged it off as somebody from the neighborhood who heard that I was back in my old hometown. It was around this time that the house I was living in was going to be sold, and it was eventually placed on Zillow. I had been working with a local realtor, who my father had hired to coordinate showings.

There was another instance of an unwanted visitor when, at around 10:00pm, I heard a vehicle approaching. I couldn't make out the make and model because of the lack of visibility, but as it came to a stop, I made sure that I was outside. I demanded to know who they were and the nature of their visit. The driver was a Caucasian female, and the passenger was a Caucasian male, I could see their skin color reflecting off of the headlights on their vehicle. The answer to my query was given by both individuals at the same time, "We had seen the house on the market and were just seeing the property." To which I replied, "You have to schedule a time with the realtor, you cannot just show up randomly." They both acknowledged and stated that they had children with them in the backseat. I watched them drive off and went to sleep shortly after.

The house was sold in 2021, and I remained in Vermont. I was still experiencing what can only be described as calculated cyber-attacks, Wi-Fi intrusion, DOS, Traffic Leeches and AI Bot Surveillance was being uncovered at an alarming rate. I immediately began to suspect Big Brother had taken an interest in something that I had said, probably in regard to something nefarious that I had uncovered during the course of my research. There was little recourse, as this federal agency would have zero watchdog oversight and was clearly and disturbingly working at an extra-legal capacity. I made the necessary documentation of these "events" and prepared to move to a different location. 

On 9/13/21, I moved from my father's house to an apartment, which was   in the same small town as the previous. The property was situated adjacent to one of the main roads in town, it actually crossed into another state in less than 3 minutes depending on the direction you were traveling. For the next couple of months things were back to normal, there was no signs of anything out of the ordinary. I was free to enjoy the beautiful Vermont weather; I liked to read outside in the sun when it was particularly hot.  

On 1/1/22, A couple with children was conversing with the owner of the property, I assumed these would be the new tenants of the downstairs apartment. I was notified by an employee of the owner that the woman's name was Amber Renaud and the man's name was Jonathan Gregg, I was unfamiliar with both, and we had never met a single time in the entirety of my life in Vernon. This was interesting to me later on, as her Ex Husband-Heath Renaud happened to own a mechanic shop which I had passed probably a million times, it was situated on 142 and it was impossible to miss if you were driving into Brattleboro. I remembered something later on that in hindsight, I wished I would've earlier. Years before I had even met this family, Heath Renaud had called law enforcement officers on one of my best friends for virtually no reason whatsoever. 

We had interacted once, when I was walking up the stairs to my apartment, she opened the door as I was entering the complex and stated, "I just swept the floor and the stairs." I thanked her and continued up the stairs to enter my apartment. The rest of that year was spent fairly similar to my previous location, going outside every once and a while to photograph wildlife or read a book when it appealed to me. I was also getting anxious to start my own organization to combat the previous issues that I felt were so pertinent to the world I was living in.

In 2022, I had started my own think tank organization designed to establish new technological advancements that could revolutionize industry and promote intelligent alternatives to current energies. I had conceived multiple ingenious ideas, one of which was to encapsulate energy from stars at the molecular level through an advanced form of solar panel and transport the energy through lasers to other locations using algorithmic sequencing and Qubit Energy

Photonic transportation is certainly the emerging reality of several aspects in astrophysics; data transmission is something that can be expedited quite exponentially. I think it's important to note that the technology of today is merely the materialized thought of the 19th Century, it's very challenging to posit a "pure" idea. A pure idea is one that is devoid of external influence, I believe this what separates a layman from a genius. It is one thing to absorb the knowledge from others through books, it is alien territory to be capable of ingenuity.

I had promising ideas in electromagnetism, as it has always been the future of transportation and the key to non-combustion engines. I was working on a new super conductive engine specifically designed for aviation and ordinary vehicular transport. I came to the conclusion that this is the best method of energy transference from one celestial body to another in surrogacy to a Dyson Sphere as it would be more viable in regard to current technological and economic capabilities, the installation process will have to be VIA a satellite that is programmed to interject itself in a rotational trajectory around our star. I was struggling with certain elements as there is a minimal distance for energy absorption, as well as integrity of the probe itself that is irritating me. To state the obvious, the position and proximity to the sun should be so that adequate energy is received and transmitted to a neighboring satellite.

We can replicate this on Earth and also at the exosphere level, I am positive we can use this method to also form an "Energy Blanket" surrounding the star from a group of nanosatellites all performing the same action as described above. It would be for a small fraction of the star; I think this is a good place to start and absolutely viable with today's technology. I am aware of the miniature sun that is in development, I think we could actually utilize this and miniature black holes to power future spacecraft. There is also an idea I am curious to delve into about a rover capsule that would land with a rover and act as a "Home Beacon" while simultaneously being capable of a return to Earth, If the tech for my nano satellites comes to fruition, I suppose this would become irrelevant.

 

It was in 2022, that I started to voice opposition to the hyper-federalization of America. My theory of the previous year became crystallized, that several agencies within the federal government had gone "Rogue" and were engaging in seditious activity to undermine citizens constitutional rights on an unprecedented Orwellian scale.

I wasn't shy about who I spoke to about this, I interacted with people through the internet and otherwise, I spent a considerable portion of that year attempting to awaken the dormant spirit of America. Given what followed shortly after, I am only left to ascertain that it was drawing some unwanted attention from the darkest facets of government. On 5/1/23, I had noticed individuals moving into the downstairs apartment, Amber Renaud spun a pathetic web of lies attributing it to her relatives and some wedding that was supposedly going to occur. The individuals were carrying black bags, I later realized these were the bags containing the neurotech. They activated the technology immediately upon assembling it beneath my floor.

I would like to make it abundantly clear that I have never been interrogated or charged with a crime, nor have I engaged in criminal activity of any sort. The FBI and US Marshals have watched me take showers and use the bathroom. They have also engaged in sleep deprivation. I have been surveilled every time I was having sexual intercourse with my significant other. They have done this every day since 5/1/23. This constitutes Intentional Infliction of Emotional Distress, Sexual Harassment and Violation of my Fourth and Fourteenth Amendment rights to an unconscionable degree. 

On 5/15/23, the FBI and US Marshals unlawfully and without the display of a warrant searched my vehicle outside the residence at 4248 Fort Bridgeman Road. On 5/21/23 I moved to Columbus, Ohio and the FBI once again moved into the apartment complex which was located in Westerville, Ohio called the HQ Flats where I have been residing with my father in APT #302. The federal agents moved into APT #102.

I have suffered immense psychological distress and as a result I was hospitalized on 7/13/23. The FBI and US Marshals violated (HIPPA) when they continued to use this technology to harass me while I was inside Mount Caramel Hospital. In attempts to induce insanity they emulated my own mothers voice and using her voice signature told me "I'm going to commit suicide Kurt!" Immediately followed by a sound of her neck snapping. They emulated every single family member I had and would engage in arguments amongst each other as a further torment.

On 7/24/23, I was released from the hospital and immediately reported this matter to the FBI through their online website, they never responded or investigated the situation. On 5/10/24, I met with an experienced attorney and during the meeting with said attorney the FBI continued the surveillance violating my Sixth Amendment right. On 7/7/24, I was hospitalized at UC San Diego Health in California. FBI and US Marshals once again continued the technological harassment violating my HIPPA rights, I was released from this hospital on 7/9/24.

 

As you can imagine, I have suffered immense psychological agony from this constant harassment, I intend to seek punitive and reparative legal action against any and all participating entities that allowed this type of criminal activity to occur. This is nothing short of Orwellian technology and in my opinion, an indication that the federal government has attempted to usher in a nightmarish totalitarian ERA. Do not take this as an attempt at humor, nor an indication of mental illness. This information is only the tip of the iceberg, I believe this neurotechnology is being used to provoke American citizens to commit crimes to further rogue federal agencies political agenda. 

In spite of this grave adversity, I have made efforts to cling on to my own humanity by contributing to society. I have provided food to the homeless, engaged in wildlife conservation, oceanic restoration and advocated for better systems to facilitate care for the mentally ill and handicapped of America.

I DEMAND JUSTICE, not only for myself but also for those unseen, unheard victims. The government, under no circumstances, should have the power to commandeer our minds or prevail over our right to liberty, under the guise of national security or technological advancement.

avatar of the starter
Kurt PattersonPetition StarterI am a young man from the USA. For the past 9 years, I have been subjected to an unimaginable nightmare, tortured daily by a government (NIBCI) Non-Invasive Brain Computer Interface. The US government has unjustly targeted me, I need your help.

76

Recent signers:
Pat Adams and 19 others have signed recently.

The Issue

My name is Kurt Patterson, I am an INNOCENT MAN, subjected to an unthinkable nightmare every single day since 2019. I have been targeted and ensnared by this malevolent technology against which I am at an utter loss to protect myself - a government neurotechnology that seeks to manipulate, harm, and ultimately, drive me to suicide or criminal conduct. The corrupt FBI activated this horrifying technology that has already cost me a significant portion of my life, enveloping me inside a living torment of inflicted psychosis, sleep deprivation, and continuous mental torture spanning years.

 

DETAILS OF THE NON-INVASIVE BRAIN COMPUTER INTERFACE:

This device is an advanced form of (NIBCI) Non-Invasive Brain Computer Interface, which functions as both an acoustic weapon and a neurological weapon, it is connected to the individual or individuals through an established connection with their brain’s neural network. This enables the ability to engage in Neuromodulation, specifically transcranial.    

I call it "Brain Pairing." The device is controlled by federal agents who have the ability to manipulate the various features within the device's command center. This device is designed to monitor, extract & reconstruct data endemic to the targeted regions in the brain, memory and the process in which data is encoded and stored is the skeleton key to it all. 

Non-Invasive Neural Signal Decoding is the broad terminology for this process, which is achieved with relative ease through a set of decoding/encoding models and algorithms.  

This type of neural interface has been theorized, studied and perfected since the assassination of JFK. "Neuro-Warfare" is a military terminology used to describe this insidious technology, if you begin to comb the surface web for intel you will realize quite quickly that you can find a significant amount of data that will educate you further on the feasibility and applicability of this type of Neurotechnology.

The (CIA) Central Intelligence Agency has blackmailed and manipulated every single (POTUS) President of the United States, since the inception of the (OSS), & when there was a POTUS that was recalcitrant or devoid of any useful stressors they were assassinated. This is an extremely disturbing and dark aspect of the intelligence community, not many citizens would ever think of entertaining the idea that a POTUS could be a sexual deviant, but the fact remains that the main stressor for almost every single POTUS since JFK has been drug addiction or sexual deviancy. The main reason the CIA ordered the death of Jeffrey Epstein was to cover up this exact fact, being the main proprietor of children for some of the most powerful and influential people in the political realm.

The reason this is important to remember is because many individuals under this technology believe that the POTUS is unaware, when in reality the POTUS is completely cognizant of this activity. The programs functionality ensures its longevity, all the way up to the peak of the (DOJ) Department of Justice, plausible deniability has defeated the whistleblower. 

This form of insulation is in place in almost all of the 195 countries. Most individuals will attempt to move at a Domestic or International level in an attempt to escape the frequency. This device is equipped with satellite capability which means you cannot outmaneuver the technology and since geolocation is a primary component and your brain becomes the geolocation beacon, it is simply an effort in futility.

The entire structure of both government and military in USA, Canada, South America, Europe, Asia & China have full knowledge and participation in this program. These countries are not authorized to interfere or activate this on foreign citizens; the activation process is restricted to their own populace. However, if an "activated" individual travels abroad he/she will be monitored by the host country authority as well as the country of origination. It should be highlighted that this program required clearance from multiple Generals, & Presidential approval. Continuity of this program has been authorized once, which will be valid for 30 years.

This is one of the most layered and complex programs in human history, it is important to illustrate the full spectrum of participation, awareness and program applicability. The Posse Comitatus Act has been VIOLATED by the federal government with military support, this is a clandestine agreement, this program is the byproduct of Operation Northwoods and MK-Ultra and functions in an extralegal capacity & supersedes the aforementioned act. This is unconstitutional and should be considered domestic terrorism by definition. 

It is important to acknowledge that although it is an armed service, the U.S. Coast Guard, which operates under the United States Department of Homeland Security during peacetime, is not restricted by the Posse Comitatus Act and has explicit authority to enforce federal law. This is true even when the Coast Guard operates as a service within the United States Navy during wartime.

It is a disturbing reality that military intelligence has utilized the Military Cooperation with Civilian Law Enforcement Agencies Act to engage in psychological operations.

Palantir Technologies is the main proprietor of this technology, which is a main support system for federal agencies in America and privately outsourced on an international scale.

In order to establish the initial connection to the intended target they have to be within a certain proximity, there are handheld devices that transmit the connection signal, which have a small monitor affixed adjacent to the transmitter. There is a larger apparatus with multiple monitors which is a stationary device or "Parent" device.

Once the device is successfully connected the technicians can communicate to the target using transmitted infrasonic frequencies that are imperceptible to anyone else but the intended target. The technicians utilize Synthetic Telepathy to harass them through various methods such as insults, threats, and other malicious forms of communication.

Synthetic Telepathy is a known provocateuring weapon, & has been the skeleton key for producing countless false flag operations & border conflicts such as the Thailand-Cambodian incident of 2025.

This device can assimilate, decode & analyze external aural stimuli through accessing and capturing the Sensory Memory data, for auditory perception that is the Echoic Memory. Everything that the targets brain has processed in regard to auditory function will be logged in a digitalized format into a "Sound Byte" database, such as voice signatures, ambient noise, anything that is perceptible to the target. Through Advanced Heterodyne software/firmware they create a virtual clone of the analyzed acoustic frequency. They can use the assimilated sounds and emulate them to harass the target. Your mothers voice or fathers voice ETC. The intensity of the frequencies needed for the target to perceive it is automatically adjusted in accordance with the targets surrounding external stimuli. E.G., if you are standing near a train, it will duplicate the level of intensity produced by the acoustic wave frequency.

Although voice synthesis (voice signature emulation or creation) is utilized, there is strict protocol that must be adhered to when operating the device. The clandestine policy and procedure restrict the emulation of individuals according to status within the government, IE. Presidents, Vice Presidents, High Ranking Military Personnel, Diplomats, Governors, Representatives ETC. 

It is capable of monitoring what you perceive through your occipital lobe, which is then transmitted to a monitor attached to the device. This violates all aspects of privacy and strips you entirely of what it means to be human. They can observe you under ANY activity imaginable. This is achieved through a Non-Invasive Visual Decoding Model.

Machine Olfaction stimulates the Olfactory area by transmitting digitalized odor molecules. However, this device utilizes a more nuanced methodology, Transcranial Focused Ultrasound (tFUS / TPU) reactivating sensory data of the stimuli specific memory, in this case odor. This was first tested on rodents eventually culminating into human subjects. I think you might remember from your childhood that you may have opened a "scent book" & engaged in a different form of Olfaction stimulation called Chemical Olfaction. 

Using Artificial intelligence software equipped with deep learning it is capable of "Dream Simulation" Comparable to how a movie is created by a director, the AI generated dream is as well. These AI dreams are designed to terrorize and both psycho-sexually and psychologically profile the subconscious state of the target's mind. Scientists studying this phenomenon realized an individual in a state of (REM) Rapid Eye Movement leaves their subconscious particularly vulnerable to suggestion. This process is known as (EMREMS) Electromagnetic REM Stimulation.

The AI utilizes all the former experiences from the individual through their multiple forms of memory encoded and stored within the brain to create scenarios with malleable elements, it engages in a unique AI Biomimicry. This dream simulation is initiated with Theta Wave frequency and followed by a Delta Wave frequency and is then paired with an Aural Stimuli, which will accompany the visual data of the dream. The stimulation of the Auditory Cortex can induce Thunderclap Headaches and Myocardial Infarction from shock. This is also a coordinated attack, meaning all the active targets across the occupied country will experience the dream simultaneously.

(ELF) Extremely Low Frequency at ~1 Hz drives pons’ GABA/glycine neurons into a more prolonged inhibitory state, deepening muscle paralysis beyond normal REM. Through this process (AMA) Artificial Muscle Atonia or Sleep Paralysis is induced through the projected nightmare. 

This is achieved with relative ease if every active target is sedated through the theta waves and is sleeping around the same time. The main benefit of this operational procedure is data extrapolation & there is a secure database which contains all the active subjects that are experiencing this harassment. (ECS) Encrypted Cloud Server houses this information secured with a military grade encryption, data can be transmitted to and from a (LEO) Low Earth Orbit Satellite.

This program is called INCEPT, which predates the 2000's all the way to the Cambodian Genocide. The CIA was experimenting with unique and undetectable methods of dispatching adversaries and sanitizing potential future leaks. Several Hmong men were affected by this tragedy which actually inspired the famous film A Nightmare on Elm Street by director Wes Craven. This is advancing the frontier of (SDW) Simulated Dream Warfare. Essentially, this is theorized to both eliminate targets through dreams & help induce societal submission to the carefully constructed paradigm of control. This is known as (SDBM) Simulated Dream Behavioral Modification, from a psychological perspective dreams are capable of a valuable degree of Behavioral Modification, depending on the scenarios that are implemented. 

This device is also capable of thought transference, meaning it assimilates and transmits both internal dialogue and visualized thought. This is achieved through Noninvasive Continuous Language Decoding. E.G., If you picture a basketball in your mind, it will be received by the technology and transferred to the screen of the monitor. You can actually communicate back and forth to the technicians harassing you through your own internal dialogue. They weaponize your own internal dialogue against you to create deep fake videos and fabricated audio. With so much analytical software out in cyberspace it is almost impossible to assume that agencies will not use them for more damage than good.  The technicians internal dialogue is sandboxed from the target; the target is under a very layered version of "Chat Channel".

It is capable of memory infiltration and can extract memory data all the way from the beginning of your childhood when you were first capable of consciously remembering experiences, it then transmits the memory to the monitor for visualization.

The process of harvesting memory data in the brain is complex to an extent, through the aforementioned Non-Invasive Neural Signal Decoding and a (SSADA) Stimuli Specific Analysis and Decryption Algorithm it can be achieved. Through this neural algorithm it will associate a specific neural signature with the memory in question and the region of origin, you can simultaneously gather actual memory data and basic functional data. There is an interactive advanced model of the targets brain housed in a sandboxed environment on the Parent Device, there is a downloading process quite soon after the initial connection for Explicit Memory and Implicit Memory, which contains Episodic Memory and Autobiographical Memory.

This technology is capable of inhibiting the process related to the consolidation of memory, timed to critical hippocampal and cortical rhythms in the minutes to hours after learning it will selectively suppress synaptic consolidation and induce a form of temporary, targeted amnesia without structural damage. Desynchronization is achievable through ELF pulses timed to the troughs of hippocampal theta, reduce spike timing precision, impairing LTP.

It is fairly important to elucidate on Artificial Muscle Atrophy and the process that is required to produce the desired muscle wasting affect. There is another SSDA for natural physiological protocols that occur during a human being's lifecycle, such as Postprandial, Post‐exercise recovery, Circadian Rhythm and the Pre-Sleep Period. 

For Postprandial Physiology: After a carbohydrate‐rich meal, blood glucose and insulin rise; parasympathetic (Vagus) activity increases, often causing mild somnolence (“food coma”).
Ideal window: 30–60 minutes after a normal‐sized lunch or dinner—when gastric motility is high and insulin/serotonin pathways are active. A low‐amplitude theta burst here can synergize with natural postprandial drowsiness.

For Post-Exercise Recovery: After moderate‐to‐high intensity exercise (e.g., weightlifting or interval training), amino acids flood muscle repair pathways. Growth hormone and IGF‐1 levels elevate, and overall cortical arousal can drop as the body shifts into recovery mode.
Ideal window: 15–45 minutes after finishing exercise—when parasympathetic rebound is strongest and adenosine buildups in the brain are maximal. A brief theta‐tACS session then can lean on that adenosine‐mediated drive toward lethargy.

For Circadian Rhythm: Around 2:00–4:00 pm (post‐lunch dip) people naturally experience slower reaction times and mild sleepiness. If a person’s schedule overlaps this window, even a short 10-minute 6 Hz tACS can amplify the lethargic outcome.

For Pre-Sleep Period: Melatonin begins to rise 1 hour before bedtime; core body temperature drops; EEG shifts toward theta/delta.
A final 20 min theta‐tACS block starting 60 minutes before desired bedtime can help entrain endogenous theta/delta transitions, especially for insomniacs.

This will be weaponized against the individual to create the aforementioned muscle wasting affect, thus leaving you malnourished and physically weak.

There is a very concerning aspect of this technology, which is the stimulation of the thermoreceptor's endemic to the temperature regulation process and hypothalamic functionality. This can effectively raise and lower a human's internal temperature in very slow incremental measurements, causing significant discomfort. 

There is currently research ongoing in response to the biggest hurdle this technology has yet to overcome, the brains Universal Neural Code. This in Lamens terms, is the organic code that governs all fundamental protocol in the brain of the Homosapien. This is what all humans share, although a memory itself or a thought that is generated can be completely unique from another, this code remains ubiquitous. In order for complete infiltration of an individual's brain, you must bypass the brains very own cybersecurity, the cognition of artificial stimulation, or artificial stimulation detection system.

There has been ongoing research in this area of Neuroscience for the past decade, it has been theorized that the only way to ascertain this monumental goal is to fully replicate the transmission of a Foreign Neural Code in an 100% organic form.

This process can be achieved through several methods, the easiest and quite possibly the most alarming is through surgical implantation. This is the exact equivalent of what Elon Musks Bio-Engineers have designed, and there is still progress that has not yet been made. Organelles and the study of their functionality inside a Bio-Computer have yielded significant and impressive results, alluding to the potential of the aforementioned organic replication needed for full spectrum control of the human mind. Bioelectricity and thermal output are two signatures relevant to the brain's natural computation process, something that will need to be analyzed, as well as determining what algebraic equivalency can be properly applied in order to replicate the brains naturally multimodal and asymmetrical method of computation on a systemic level.    

In order to bypass the crime of disseminating surveillance and have a viable defense from litigation the technicians of this technology will "livestream" the individual, this essential function works by a DEEP AI Software that utilizes the occipital lobe feed. The parameters are mapped and digitalized in accordance with the targets surrounding environmental architecture. When the parameters that lead to public interaction are breached, the livestream immediately begins. This is used to galvanize the public to engage in instigation, Local and State Law Enforcement are notified through their onboard computer system. Car radios and Apple I-phones can be used as a potential vector as well.

There is a very concerning aspect of this technology, and that is the virus that is attributed to any and all devices, social media, associated with the targeted individual. This virus is a unique form of RAT|PYSILON hybrid, which enables a level of clandestine access. The goal is to obfuscate not only the full scope of the psychological torment but also eliminate the possibility of a social media spotlight. Social media applications run on specific algorithms, called content algorithms. These are used to coordinate traffic to individual profiles and posts, these can be influenced by astute programmers. Domestic & Foreign surveillance will be employed under the powers granted in the Foreign Intelligence Surveillance ACT, of 1978 and the Patriot ACT, of 2001.

The scope of authority imbued within these are generally obfuscated by a minimal amount of Proof of Concept, as evident in the "Fact Sheet". There was a minimally discussed proposal of amendment and extension in 2023, the Reforming Intelligence and Securing America Act. which was supported by both sides of the house, which would extend until a re-authorization of Section 702 on April 20, 2024. 

You can find the ODNI "FISC Opinion on Certification of Amendments FISA Section 702." I find it amusing that further obfuscation of kangaroo court proceedings and evidence of CIA, FBI, NCTC and NSA judicial impunity have evaporated in hubs of libertarian discussion. COINTEL and Counterterrorism task force within these agencies have utilized technology beyond the scope of ANY investigative capacity. 

There is an intriguing element to this technology, which is the isolation and targeting of civilians through their device WIFI via SUPER-SAT Computer, if you are engaging with someone on a live streaming platform they will be instructed to instigate with provocative comments. You need to be aware that if you are watching a stream from a foreign country, this is considered public interaction, and that country will be activated.  

There are various methods that will enable the virus to essentially be transmitted to another device, which will activate the targeting system upon interaction with a stranger's system like a Venus flytrap. I cannot elucidate on all for obvious reasons, scanning the hardware of your devices and other forms of (OPSEC) Operational Security is something that I would strongly recommend. Refrain from purchasing devices from unknown clients, as this will be used as a physical trojan horse. Leeches or WIFI RATS are a common tactic of corrosive data suppression, this will be relayed to the individuals private and encrypted network using this technology.

Lawyers are backdoored and will be actively communicated with, especially if they have had a previous relationship with you as a client.

You should be aware that you will have ANY hardware purchased will be manipulated at the manufacturing level, it is also within the realm of possibility, that hardware can be intercepted and implanted with a microchip that can be used to geolocate and harvest data without the device actually on. This can be achieved wirelessly through ultrasonic transmission, as well as the relatively nuanced laser injection. I would stay off the Facebook marketplace, as you could essentially be purchasing spyware.

Obviously, information pertinent to the functionality of this program and the devices deployed is of great concern. One safety net for all involved is the mental acuity and competence required to correctly ascertain (unless prior knowledge is given) the innumerable variables to this predicament. Synthetic Media is highly monitored and kept exceptionally malleable until it is "fit for public consumption", elucidation on all aspects of this topic would distract from this petition. If a particular organization can become a beacon of Controlled Opposition to identify and suppress the actual opposers to a regime's ideology or social structure this too will be employed.

This is an important aspect to illuminate because there are many individuals currently under this technology who will attempt to reach out through social media, which has been implemented into this programs threat model. There are (NGO) that function as actual intelligence gathering apparatus, the objective is to illicit information directly from the source of the individual. This has been basic protocol since most people will explode violently and leave behind evidence hoping to elucidate the harassment they were receiving. There are a significant number of people who will also pose as targets themselves which have a slightly different protocol to obfuscate the possibility of this actually occurring, making incredulous remarks or deviating the attention elsewhere.

These individuals that have been selected for this program are at a dangerous impasse, if they collectivize this would be a double edge sword. Now the federal government can have credibility in labelling the group a "Domestic Terrorist Cell" which would only compound the issue of a FISA level surveillance unit being assigned to these people.  

Unfortunately, there is absolutely zero recourse through governmental systems. Many people will report incidents to Local and State law enforcement agencies, who are actually under threat of treason if they acknowledge this activity. "Can neither Confirm nor Deny" An individual under this technology is at his/her most vulnerable moment when they are reduced to incarceration or homelessness, which is actually one of the primary objectives of these malicious actors using this technology. I simply cannot stress how important it is to remember that inducing self-destructive behavior is their goal.

 There has been an alarming trend within the Intelligence Community of "CP Bombing" individuals suspected of committing espionage against the United States of America, (NSA) National Security Agency is the prime culprit in this activity. Metadata associated with suspected intelligence leaks are pooled and once the individual is properly identified they can be targeted with a very malicious package of AI generated images and videos. This was theorized and implemented for security purposes as the age of assassination has become extremely risky even for internalized damage control. It is an absolute last resort to eliminate a threat in such a capacity, this insidious technique is effectively equivalent to a death sentence.   

There is a generic manipulation involving creating a false narrative through declassified documents which has been utilized in great frequency, the documents will possess all the elements of real intelligence but are actually meticulously designed to be released based on a simple analytical process. This is all based off of the known time it takes to be required to declassify and release to the public, the assassination of JFK is a prime example of this tactic.

The public surrounding the target will be manipulated through slander and false information. The most disgusting rumors and excuses for the activation will be circulated, from a potential Fugitive tracking system to a domestic terrorist prevention tool, I have heard just about everything you could possibly imagine. Anything that foments a negative opinion and leads to the insulation of the ongoing criminal activity will be beneficial, the more potent and venomous it is more effective at manufacturing an oblivious and cooperative public. Some commonly applied tactics for character assassination include allegations of being an "Incel", "Pedophile" or "School Shooter" which is particularly effective due to the disdain that society has for these types of individuals. This is classic behavioral psychology and an easy way to induce a tribalistic psychological reaction in both the masculine and feminine psychology.  

 

This technology is also being used to facilitate Espionage operations, utilizing noninvasive continuous language decoding and surveilling through the occipital feed of an operative conducting counterintelligence for our nation on foreign adversaries in non-compliant countries, it was also to be used for mole screening on operatives through accessing the memory data. This is also the new frontier of data theft, utilizing this technology you can steal information from a target without ever leaving a single trace, and from a considerable distance as well.

It was theorized that the devices could be weaponized to a point of inducing silent pacification; by stimulating targeted areas of the body's major organs, this was intended for high value targets deemed too recalcitrant to control diplomatically. (JAIC) Joint Artificial Intelligence Center had contracted the devices for clandestine special operations for its capability as a means of non-verbal communication, utilizing occipital feeds it is feasible to calculate and execute ordinance deployment through visuals of ground infantry.

It is also deployed for the infiltration and dissolution of terrorist cells within the military and abroad. Civilian initiated Domestic Terrorism is also targeted by this technology, VIA federal, State and local authorities. Machine Olfaction is a methodology of detection for (CWA) Chemical Warfare Agents as well as other Conventional forms of terrorism. There will be devices installed in areas designated (NSR) National Security Risks, such as Airports, Government Agencies, Schools etc. Body scanners, Luggage scanners, and security wands and (APMD) Ambient Particulate Matter Detectors utilize this technology. There is also ongoing research in regard to State and Federal prison security systems of America implementing intermediary variations of these devices to replace the archaic camera systems they currently employ.

This would essentially create a unique (OLFS) Occipital Live Feed System, which would be utilized to actively surveil inmates and convicts beyond the usual scope of authority. The reasoning behind this advancement will be extremely dangerous individuals or those prone to attempting escape. This is not the first time that DEW has been used on the prison population of America, case and point is the Silent Guardian System

Using these Ultrasonic and ELF frequencies it is possible to chemically taper an individual's micro-aggressive behavior. When these devices are inevitably converted to the micro-scale, you will see installation into all layers of Critical Infrastructure. Bygone is the age of physical restraint of an active or emerging threat, now we are focusing on eliminating the manufacturing process of aggressive thought before it becomes a crime. This is extremely unconstitutional, & something that should concern every American citizen.

The concept behind the micro-architecture of this device is relatively straightforward, it is essentially a miniature version of the NIBCI. There is one considerable difference, the inclusion of a micro LRAD. This will be deployed when the AI targeting system associated with the neural scanning unit has authorized a strike based upon aggressive thought, when adrenal glands secrete epinephrine, this will be enough to override the Theta/Delta waves transmitted by the NIBCI. The micro LRAD takes over and transmits a transcranial incapacitation frequency. 

The CIA is actively engaged in experiments with this technology in Vermont Prisons, with logistical coordination provided by Nicholas Deml. Experimentation on inmates and convicts was part of the infancy of this technology; the Central Intelligence Agency had concluded that individuals inside of USP's were extremely viable candidates. This was due to fairly little recourse coupled with the environmental stimuli and isolation of a USP, allowing for a convenient excuse such as mental illness or psychosis. Broward Correctional Institution opened in 1977, and had previously housed a male population, was used on more than one occasion; this was facilitated through clandestine satellite installation on the compound. Operatives during these experiments would be stationed in the adjacent Pembroke Pines

I am well aware of the Secret Service utilizing this technology as a deterrent for perceived national security threats, and the current defenses in place for high value targets of which could be targeted by foreign interest. However, this technology is also the weapon behind the Manchurian Candidate manufacturing process, as well as the construction and implementation of a (GNSG) Global Neural Surveillance Grid. There are three culprits I can pinpoint which could achieve this, Starlink​, Star Shield and ICEYE. I am aware of the origins of research and development for this technology, the first Russian Signal” and the following incidents of Havana Syndrome”. 

This technology has been the catalyst for multiple vicarious crimes, including Homicide, Arson, Assassination, Kidnapping, Mass Casualty Incidents and Muslim Extremism. There is a very disturbing list of Manchurian Candidates that needs to be addressed, the mainstream media outlets have been sponsored and controlled by the CIA for years, very similar to how the Military Industrial Complex screens cinematic releases to red flag any potential material deemed excessively corrosive.

In this program's infancy, the only capability was the infrasonic communication. In order to successfully further the MK Ultra project the CIA ascertained very early on that they needed more than just this antiquated form of instigation. The agency infiltrated colleges and started recruiting from inside to acquire the most intelligent minds available that could be persuaded with relative ease. Ill-gotten gains from the "Efforts" in the golden triangle and Colombia were utilized to facilitate private sector research and development.

Areas in academia that would be required to complete the desired outcome were highlighted and relayed to the program director, which were then approved. Bioengineering was one of the main focal points and gave birth to the neurotechnology that we are currently facing, most of the earlier subjects were notorious criminals. Aileen Wuornos was actually a victim of the former, complaining of "Sonic Pressure" her account while an inaccurate description was not delusional.

This is an out of order list of known subjects:

Adam Lanza~USA, Aileen Wuornos~USA, Kevin Costlow~USA, Micheal Brown~USA, James Gleason~USA, Stephen Marlow~USA, Milton William Cooper~USA, Myron May~USA, Misbah Abdul Kareem~USA, Paul Overeem~USA, Aaron Alexis~USA, Mathew Choi~USA, Matthew Dulmaine~USA, Fuaed Abdo Ahmed~USA, Jared Loughner~USA, Justin Hobel~USA, John Lyons~USA, Bryan Riley~USA, Lonnie Place~USA, Isreal Keyes~USA, Britney Spears~USA, Mathew Livelsberger~USA, Todd Kohlhepp~USA, Thomas Jacob Sanford~ USA, Alec Mckinney~USA, Robert Card~USA, Phoenix Ikner~USA,  Panya Khamrab~THAILAND, Robin Forde, Kevin Douglas Limbaugh~USA, Nigel Max Edge~USA Valdo Calocane~UK, Benjamin Hoffman~AUS, Mohamed Aliwijaya~AUS

While at first glance it is easy to discount this as improvable conjecture, if you dig deeper into each individual, you will find corroborating factors. As for the other thousands of individuals currently under this technology, most are incarcerated, institutionalized or homeless.

It would be quite the disturbing reality that Schizophrenia was actually engineered in the early 60-70's due to experimentation with the Frey Effect, but given what we know about the human brains decoding process it is evident that aural stimuli is impossible to hallucinate. From what we know about this program all facets of infrastructure are cognizant, meaning we may be uncovering the greatest medical myth in human history.

One of the main objectives behind these provocateur operations which have been coined False Flag Operations is to consolidate societal control. For instance, with every act of terrorism that transpires there are certain legislative and technological benefits to the government that follow. There is an active plan to foment the installation of a totalitarian regime in America through a technological stranglehold, using the NIBCI discussed in this petition the U.S Government can start the process of installing neural monitors within Critical Infrastructure. The idea behind this is to both neurologically monitor and neurochemically taper micro-aggressive behavior under the pretext of evolving security.

The causation behind this is psychological in nature, inducing psychosis which through the memory access can be achieved through relative ease. Highlighting a targeted individual's psychological stressors, such as traumatic events and instigating through gaslighting, love bombing, 

This type of malicious technological manipulation and harassment has been quite virulent, occurring in every country. There has been a major victory in the Veritas Movement from inside of China, with a Chinese whistleblower utilizing cryptocurrency to foment awareness

I have theorized developing a defense to this insidious technology that I have come to call "Nemesis". The concept involves the implantation of a neural chip that will act as organic cybersecurity for the brain, this would be feasible by filtering all incoming signals to the brain and rejecting "Intruder" signals sent from artificial sources. There could be some difficulty as a wetware computer is transmitting "organic" signals, I have also theorized the development of hearing aids equipped with nanoscale jamming technology.

We as civilians do not have access to the necessary components, funding and laboratorial environments to create what is needed. However, this is private sector and privately funded research and development technology that we are talking about. In 2018, The Secret Service implemented the use of synthetic hair implants which can be used as a covert form of geolocation.  

To elicit full cooperation from confirmed terrorist imprisoned in (GITMO), this technology garnered a successful confession from two to four Muslim extremists. Until that juncture, they had been deemed recalcitrant by the military psychologist to routine interrogative tactics. 

This is an elucidation on the technological capabilities and functionality of this unconstitutional apparatus and is extremely vital to any individual suffering from this targeted form of federal harassment. In America, you are supposed to be innocent until proven guilty, although in the judicial system it is often reversed. It becomes evident that through this federal manipulation of the public, this technology can be used to change public opinion before any matter is brought before a court.

 

This is the story associated with this technology; I will spare no details besides the antecedence of my childhood. Anything that pertains to the current matter will be illustrated, I hope you will take the time to read this entire story, it could save your life.

In 2007, my half-brother Scott Wilson had begun navigating the bureaucracy of Washington DC. We had different fathers but grew up as blood brothers under the care of my mother, I was the youngest child in the family, and he was several years older than myself when I entered the world. He started out as a Staff Assistant, and by November of 2011 he had become a full-fledged Professional Staff member for one of the most influential committees in Congress, The Senate Committee on the Judiciary. 

He proceeded on this path until he was working in an advisory capacity to Senator Patrick Leahy who was the President Pro Tempore until January 3rd, 2023. He had ushered in his guidance on a range of technology, telecommunications, tax, intellectual property, transportation, homeland security, labor, and economic development issues, with a particular focus on advancing his priorities in his capacity as Vice Chairman of the Appropriations Committee.

In 2018 he married Victoria Taylor, who worked as the Deputy Chief of Mission in Croatia until 2021. Victoria Taylor is currently the Deputy Assistant Secretary for Iraq and Iran. I believe these familial and political ties have played a significant role in the future federal scrutiny, I had also become very interested in the political field. I am an extremely intelligent political analyst, capable of predicting outcomes few could see materializing in the future.

In 08/23/20, I was living in a small town in Vernon Vermont, my father had moved to Columbus Ohio, and I was left with the property that he had purchased some 20 years prior. It was a very minute community for a town; I had several friends that were still active inside it. I was 22 years of age when I started to take an interest in photography, I would spend hours sitting outside my house capturing the organic essence of Vermont. The property was fairly obfuscated by flora and fauna, and you couldn't see the property from the road save the gravel driveway.

Every now and again I would visit with the friends that I had, we would have campfires and talk about the bygone years of our childhood. I spent over a year contemplating and observing societal functionality and its inherent structure, I didn't just analyze our community as a small town, I branched out to multiple different states and communities. It was after this close observation that I had recognized the engineered acidification of America and its destruction of the citizen. I decided that it was better to be constructive rather than destructive when dealing with this reality, I planned to create an organization in the future that could deal with the problems that we face as a collective society. 

It was around this time that I started to get heavily involved in advanced energy research, something that would be needed in order to safely fuel the next generation of an ever-evolving society. I am extremely concerned with the development of AI, and I made that explicitly clear in communications with the public and government agencies. My specific area of concern was with the Artificial Intelligence Merger/Singularity that was being touted as the only viable route to an expedited human evolution. I informed the government through email and phone calls that we needed a clear delineation between Positive and Negative technology, and that to ignore this was perilous to the human race. How could there be a merger without the death of organic humanity?

I have a massive concern with Sam Altman's "World Human Verification Project" which has layered governmental support including the CIA. This is part of the hyper digitalization of the human race and ushers in an unparalleled level of mass surveillance on society by eliminating paper currency and pushing Biometric Data verification down to an individual's DNA. "Recently, the project unveiled the Orb Mini, a portable device designed to scan users' eyeballs and verify their identity. This device resembles a smartphone and features two large sensors that capture biometric data. The scanning process takes about 30 seconds and generates a unique "IrisCode" for each user, which is stored securely on the block chain. This verification process is intended to combat fraud and the proliferation of bots online."

"As of now, the project claims to have over 26 million registrants, with 12 million verified users globally. The World project has also established partnerships with major companies, including Visa and Match Group, to integrate its verification system into various platforms. For instance, Visa plans to introduce a "World Visa card" available only to users who have undergone the iris scanning process."

Clone Robotics is another area of extreme concern. The Synthetic Replacement becomes viable with the creation of hyper realistic humanoids.

The biggest myth ever told to the public was that humans as a species could successfully merge with AI without being completely assimilated.  What singularity truly means is human beings converting themselves to Artificial Intelligence, not coexistence. We needed to sandbox AI, ensuring that it is never given the capability of self-sentience. So long as we are programming AI, we are safe. I was cognizant of the UAP issue that was perplexing individuals in governments worldwide, I had theories in relation to this, which were forwarded to (NASA) back in 2019.

I had highlighted very specific engines that could be the catalyst for what we are witnessing in our aerial space. I was most interested in what I have coined as the (Super Classes), so called "phenomena" in both physics and chemistry where basic principles of matter are challenged. I believe these super classes are the doorway to advanced non-combustion engines for a new and ubiquitously applicable methodology of transportation. I have been interested in superconductivity engines designed for aerial flight specifically, of a hybridized sort.

I considered the development of advanced Quantum technology and hyper-development of AI to be the beginning of the first technological transitory phase in human history. These two forces would unlock the potential for a "Kardashev Leap", a point that arguably every species that debates immortalization through advanced technology must reach before the actualization of the idea can occur. It is my belief that this quintessential time in humanity is the most dangerous, a moment to be approached with absolute caution equivalent to the fragility of the situation. There have been some concerning developments, involving advanced AI training protocols working within the best and brightest Bioengineering institutes. 

I was extremely concerned with the omnipresent issue of the Kessler Effect, which is essentially the proliferation and oversaturation of Active Satellites, Satellite Debris and Rocket Debris polluting Earth-Space. This will eventually lead to an inescapable planet among other significant problems. I have theorized using magnetized nets or an artificial gravitational force to permanently sanitize what little Earth-Space we have. It is theoretically possible to transfer detritus to Mars, then liquify these materials to provide adequate base elements for construction upon the surface.

I find it relatively amusing that some exo-planet researchers have deemed this unfortunate circumstance to be a "Solution to the Fermi Paradox" and a sign of intelligent life, when in reality it would be an indication of impulsivity and a colossal lack of intelligence. This combination is usually attributed to a lack of intellectual evolution; I would argue that hypervigilance is a strong indication of hyperintelligence.

 

While I was living at this property, I began to notice some disconcerting activity. I had several instances where vehicles would enter my driveway and make their way up to where my house was perched at the top of the hill, it was at an elevated position so I could actually hear the engine and the displacement of gravel. One particular instance I was in my bathtub completely naked, when I heard the door open. I immediately sprang up out of the tub and ran towards the door which had shut, almost as quickly as I had gotten out. Whoever it was managed to get into a vehicle which I made out to be a sedan of some sort, which disappeared down the road and sped off.

I was alerted by my neighbor that there was an individual asking about my daily activities, that she apparently did not wish to disclose the name of. I shrugged it off as somebody from the neighborhood who heard that I was back in my old hometown. It was around this time that the house I was living in was going to be sold, and it was eventually placed on Zillow. I had been working with a local realtor, who my father had hired to coordinate showings.

There was another instance of an unwanted visitor when, at around 10:00pm, I heard a vehicle approaching. I couldn't make out the make and model because of the lack of visibility, but as it came to a stop, I made sure that I was outside. I demanded to know who they were and the nature of their visit. The driver was a Caucasian female, and the passenger was a Caucasian male, I could see their skin color reflecting off of the headlights on their vehicle. The answer to my query was given by both individuals at the same time, "We had seen the house on the market and were just seeing the property." To which I replied, "You have to schedule a time with the realtor, you cannot just show up randomly." They both acknowledged and stated that they had children with them in the backseat. I watched them drive off and went to sleep shortly after.

The house was sold in 2021, and I remained in Vermont. I was still experiencing what can only be described as calculated cyber-attacks, Wi-Fi intrusion, DOS, Traffic Leeches and AI Bot Surveillance was being uncovered at an alarming rate. I immediately began to suspect Big Brother had taken an interest in something that I had said, probably in regard to something nefarious that I had uncovered during the course of my research. There was little recourse, as this federal agency would have zero watchdog oversight and was clearly and disturbingly working at an extra-legal capacity. I made the necessary documentation of these "events" and prepared to move to a different location. 

On 9/13/21, I moved from my father's house to an apartment, which was   in the same small town as the previous. The property was situated adjacent to one of the main roads in town, it actually crossed into another state in less than 3 minutes depending on the direction you were traveling. For the next couple of months things were back to normal, there was no signs of anything out of the ordinary. I was free to enjoy the beautiful Vermont weather; I liked to read outside in the sun when it was particularly hot.  

On 1/1/22, A couple with children was conversing with the owner of the property, I assumed these would be the new tenants of the downstairs apartment. I was notified by an employee of the owner that the woman's name was Amber Renaud and the man's name was Jonathan Gregg, I was unfamiliar with both, and we had never met a single time in the entirety of my life in Vernon. This was interesting to me later on, as her Ex Husband-Heath Renaud happened to own a mechanic shop which I had passed probably a million times, it was situated on 142 and it was impossible to miss if you were driving into Brattleboro. I remembered something later on that in hindsight, I wished I would've earlier. Years before I had even met this family, Heath Renaud had called law enforcement officers on one of my best friends for virtually no reason whatsoever. 

We had interacted once, when I was walking up the stairs to my apartment, she opened the door as I was entering the complex and stated, "I just swept the floor and the stairs." I thanked her and continued up the stairs to enter my apartment. The rest of that year was spent fairly similar to my previous location, going outside every once and a while to photograph wildlife or read a book when it appealed to me. I was also getting anxious to start my own organization to combat the previous issues that I felt were so pertinent to the world I was living in.

In 2022, I had started my own think tank organization designed to establish new technological advancements that could revolutionize industry and promote intelligent alternatives to current energies. I had conceived multiple ingenious ideas, one of which was to encapsulate energy from stars at the molecular level through an advanced form of solar panel and transport the energy through lasers to other locations using algorithmic sequencing and Qubit Energy

Photonic transportation is certainly the emerging reality of several aspects in astrophysics; data transmission is something that can be expedited quite exponentially. I think it's important to note that the technology of today is merely the materialized thought of the 19th Century, it's very challenging to posit a "pure" idea. A pure idea is one that is devoid of external influence, I believe this what separates a layman from a genius. It is one thing to absorb the knowledge from others through books, it is alien territory to be capable of ingenuity.

I had promising ideas in electromagnetism, as it has always been the future of transportation and the key to non-combustion engines. I was working on a new super conductive engine specifically designed for aviation and ordinary vehicular transport. I came to the conclusion that this is the best method of energy transference from one celestial body to another in surrogacy to a Dyson Sphere as it would be more viable in regard to current technological and economic capabilities, the installation process will have to be VIA a satellite that is programmed to interject itself in a rotational trajectory around our star. I was struggling with certain elements as there is a minimal distance for energy absorption, as well as integrity of the probe itself that is irritating me. To state the obvious, the position and proximity to the sun should be so that adequate energy is received and transmitted to a neighboring satellite.

We can replicate this on Earth and also at the exosphere level, I am positive we can use this method to also form an "Energy Blanket" surrounding the star from a group of nanosatellites all performing the same action as described above. It would be for a small fraction of the star; I think this is a good place to start and absolutely viable with today's technology. I am aware of the miniature sun that is in development, I think we could actually utilize this and miniature black holes to power future spacecraft. There is also an idea I am curious to delve into about a rover capsule that would land with a rover and act as a "Home Beacon" while simultaneously being capable of a return to Earth, If the tech for my nano satellites comes to fruition, I suppose this would become irrelevant.

 

It was in 2022, that I started to voice opposition to the hyper-federalization of America. My theory of the previous year became crystallized, that several agencies within the federal government had gone "Rogue" and were engaging in seditious activity to undermine citizens constitutional rights on an unprecedented Orwellian scale.

I wasn't shy about who I spoke to about this, I interacted with people through the internet and otherwise, I spent a considerable portion of that year attempting to awaken the dormant spirit of America. Given what followed shortly after, I am only left to ascertain that it was drawing some unwanted attention from the darkest facets of government. On 5/1/23, I had noticed individuals moving into the downstairs apartment, Amber Renaud spun a pathetic web of lies attributing it to her relatives and some wedding that was supposedly going to occur. The individuals were carrying black bags, I later realized these were the bags containing the neurotech. They activated the technology immediately upon assembling it beneath my floor.

I would like to make it abundantly clear that I have never been interrogated or charged with a crime, nor have I engaged in criminal activity of any sort. The FBI and US Marshals have watched me take showers and use the bathroom. They have also engaged in sleep deprivation. I have been surveilled every time I was having sexual intercourse with my significant other. They have done this every day since 5/1/23. This constitutes Intentional Infliction of Emotional Distress, Sexual Harassment and Violation of my Fourth and Fourteenth Amendment rights to an unconscionable degree. 

On 5/15/23, the FBI and US Marshals unlawfully and without the display of a warrant searched my vehicle outside the residence at 4248 Fort Bridgeman Road. On 5/21/23 I moved to Columbus, Ohio and the FBI once again moved into the apartment complex which was located in Westerville, Ohio called the HQ Flats where I have been residing with my father in APT #302. The federal agents moved into APT #102.

I have suffered immense psychological distress and as a result I was hospitalized on 7/13/23. The FBI and US Marshals violated (HIPPA) when they continued to use this technology to harass me while I was inside Mount Caramel Hospital. In attempts to induce insanity they emulated my own mothers voice and using her voice signature told me "I'm going to commit suicide Kurt!" Immediately followed by a sound of her neck snapping. They emulated every single family member I had and would engage in arguments amongst each other as a further torment.

On 7/24/23, I was released from the hospital and immediately reported this matter to the FBI through their online website, they never responded or investigated the situation. On 5/10/24, I met with an experienced attorney and during the meeting with said attorney the FBI continued the surveillance violating my Sixth Amendment right. On 7/7/24, I was hospitalized at UC San Diego Health in California. FBI and US Marshals once again continued the technological harassment violating my HIPPA rights, I was released from this hospital on 7/9/24.

 

As you can imagine, I have suffered immense psychological agony from this constant harassment, I intend to seek punitive and reparative legal action against any and all participating entities that allowed this type of criminal activity to occur. This is nothing short of Orwellian technology and in my opinion, an indication that the federal government has attempted to usher in a nightmarish totalitarian ERA. Do not take this as an attempt at humor, nor an indication of mental illness. This information is only the tip of the iceberg, I believe this neurotechnology is being used to provoke American citizens to commit crimes to further rogue federal agencies political agenda. 

In spite of this grave adversity, I have made efforts to cling on to my own humanity by contributing to society. I have provided food to the homeless, engaged in wildlife conservation, oceanic restoration and advocated for better systems to facilitate care for the mentally ill and handicapped of America.

I DEMAND JUSTICE, not only for myself but also for those unseen, unheard victims. The government, under no circumstances, should have the power to commandeer our minds or prevail over our right to liberty, under the guise of national security or technological advancement.

avatar of the starter
Kurt PattersonPetition StarterI am a young man from the USA. For the past 9 years, I have been subjected to an unimaginable nightmare, tortured daily by a government (NIBCI) Non-Invasive Brain Computer Interface. The US government has unjustly targeted me, I need your help.

The Decision Makers

Donald Trump
President of the United States

Supporter Voices

Petition Updates

Share this petition

Petition created on January 22, 2025