The present invention relates to a kind of automatic machine can both identify who is victim of abuse voice to skull and remote neural monitoring technology and identify who is remote operator using device of voice to skull and remote neural monitoring. Then produce a certificate to a identified victim for medical department using, meanwhile produce some documents about remote attacker or operator's status submitting to department of justice for reference.
Origin of the problem: from 2008 to 2018, there were large number of victims in 22 provinces in China, Shanghai and Beijing municipalities have large number of collective protests against RNM and V2K technology abuse. This is also a part of operational level of war or called unrestricted war which China has somehow partly launched to attack US and other countries now or in no long future.
From psychiatric taxonomy analysis, only rare case of hysteria likely to occur in group under special situation. These same groups of large-scale protester's peaceful and rational activities year and year in China are not hysteria patients obviously.
In addition, on Oct. 1, 2015, representatives from 17 countries in Berlin, Germany, hold a “Covered Harassment Conference”. The covered harassment is same thing with voice to skull & remote neural monitoring technology.
After a lot of times contacting with these victims in China mainland WeChat, emails and telephones, these victims' thoughts were read and harassed at same time by some unknown Chinese institutions abusing these technologies. Meanwhile all victims know their optic neural image signals, or call retinal cortex image signals and auditory neural signals in their cerebral cortex were monitored remotely.
According to Zhong Zhiyong, the organizer and leader of anti-V2k &RNM torture in 22 provinces and cities in mainland China (Zhong Zhiyong's affairs were also reported by the media “The Epoch Times” and he and other victims representatives also received interview with “New Tang Dynasty TV”). He told me directly by phone and WeChart almost all victims have the same experience: the Remote Neural Monitoring and V2K technology can read victim's auditory signals on cortex and victim's retinal cortex image signals, harass all victims with V2K signals. Including two Chinese victim has been a lawful permanent resident in United States have same experience: their retinal cortex image signals and auditory neural signals in their cerebral cortex were monitored remotely. They are all suffering non-stop V2K harassment.
Another Chinese leader anti-abuse technology of V2K & RNM, Mr. Yao Dou-jie live in Shenzhen China who collect large information also confirmed same cases above.
Jun. 21, 2020, United Nations Human Rights Office of the High Commissioner call for input to a report: Psychosocial dynamics conducive to torture and ill-treatment, decide to investigate and ban electromagnetic Torture, Harrassment techniques torture to individuals. This is first time UN official recognition the existence the abuse V2K and Remote Neural Monitoring Technology.
What is Remote Neural Monitoring Technology? the following US patents describe them clearly: These technology can read human neural signals like human optic neural signals, or call retinal cortex image signals and auditory neural signals in their cerebral cortex to produce harassment to a victim. Because these US patents have external link to European patent database, so all US and European engineers and technical personnel acknowledge the existence of these technologies.
Generally three to five operators (ROD) of V2k & RNM devices in group in turn concentrate one victim via satellite positioning technology to realize remote harassment, the technology is mainly based on these US technological patents and China patents which describe the technology of V2K & RNM are extracting the brain's characteristic wave frequency and their optic neural signals, or call retinal cortex image signals and auditory neural signals in their cerebral cortex first (like fingerprints, each person's brain characteristic wave frequency is different), then codes the brain characteristic wave frequency and these neural signals by computer software technology and remotely locks the frequency and monitors the victim's brain wave frequency and these neural signals using computer software technology and satellite positioning technology.
The bases of these V2K technology are microwave auditory hearing effect or call Frey effect and neural coding technology. The microwave auditory hearing effect is a well-known physical phenomenon and it does not a sound wave shaking eardrum in ear, but directly effects on human auditory cortex with like KAKAKA sound. V2K technology is a kind of improving microwave auditory hearing effect with human language which only a victim can feel, the persons around the victim never hear or feel.
In such way, three to five operators (ROD) using devices of V2K & RNM in groups perform active psychological attacks on victim's brain with some negative emotions according these victim's auditory signal and, retinal cortex image signals shown on the their RNM device. But the effect of this kind of psychological reactions or responses can be two-ways or two directions between victim and operators (RODs) using devices of V2K & RNM.
In past of years, FBI's investigation on some cases related similar technology attacking.
This is not a scientific fiction, because the following US patents and China patents tell us it is true and existing technologies: US patents: All following US patents describe technologies can monitor auditory signals and retinal signals in cerebral cortex remotely.
1.1. U.S. Pat. No. 3,951,134A: Apparatus and method for remotely monitoring and altering brain waves.
Inventor: Robert G. Malech, Date of publication: 1976-04-20 publication
The technology describes such technology can monitor human brain wave and all Kinds neutral signals like auditory signal and retinal signal remotely. Meanwhile cause V2K signal feedback like microwave hearing effect.
Apparatus for and method of sensing brain waves at a position remote from a . . . . The demodulated waveform also can be used to produce a compensating signal . . . . In addition to passively monitoring his brain waves, the subject's neurological signals.
1.2. U.S. Pat. No. 6,470,214B1 Method and device for implementing the radio frequency hearing effect, US Air Force.
1.3. U.S. Pat. No. 7,222,961B2 Method for detecting a functional signal in retinal images.
1.4. U.S. Pat. No. 6,011,991A: Communication system and method including brain wave analysis and/or use of brain activity.
Inventor: Aris Mardirossian; Date of Publication: 2000-01-04
The technology describes how communicate human brain thoughts and cause language like effect remotely via satellite.
A system and method for enabling human beings to communicate by way of their monitored brain activity. The brain activity of an individual is monitored and transmitted to a remote location (e.g. by satellite). At the remote location, the monitored brain activity is compared with pre-recorded normalized brain activity curves, wave forms, or patterns to determine if a match or substantial match is found. If such a match is found, then the computer at the remote location determines that the individual was attempting to communicate the word, phrase, or thought corresponding to the matched stored normalized signal.
1.5. WO2014066598A1, WIPO (PCT): Image retinal intrinsic optical signals Remote neural modulation brain stimulation and feedback control. Inventor: Laura Tyler PERRYMAN, Chad ANDRESEN, Patrick LARSON, Graham GREENE. Date of publication: 2014-09-18.
The method, system and apparatus is presented for a wireless neural modulation feedback control system as it relates to an implantable medical device comprised of a radio frequency (RF) receiver circuit, one or more dipole or patch antenna(s), one or more electrode leads connected to at least one dipole or patch antenna(s), and at least one microelectronic neural modulation circuit, and an external or internally implanted RF device to neurally modulate brain tissue in order to treat medical conditions that can be mediated by neuronal activation or inhibition, such as Parkinson's, Alzheimer's, epilepsy, other motor or mood based disorders, and/or pain. The implantable receiver captures energy radiated by the RF transmitter unit and converts this energy to an electrical waveform by the implanted neural modulation circuit to deliver energy that can be utilized by the attached electrode pads in order to activate targeted neurons in the brain.
1.6. U.S. Pat. No. 8,738,162: Clustering of recorded patient neurological activity to determine length of a neurological event, Inventor: Mark G. Frei, Ivan Osorio, Nina M. Graves, Scott F. Schaffner, Mark T. Rise, Jonathon E. Giftakis, David L. Carlson. Date of Publication: 2014-05-27.
Apparatus and method detect a detection cluster that is associated with a neurological event, such as a seizure, of a nervous system disorder and update therapy parameters that are associated with a treatment therapy. The occurrence of the detection cluster is detected when the maximal ratio exceeds an intensity threshold. If the maximal ratio drops below the intensity threshold for a time interval that is less than a time threshold and subsequently rises above the intensity threshold, the subsequent time duration is considered as being associated with the detection cluster rather than being associated with a different detection cluster. Consequently, treatment of the nervous system disorder during the corresponding time period is in accordance with one detection cluster. Treatment therapy may be provided by providing electrical stimulation, drug infusion or a combination. Therapy parameters may be updated for each mth successive group of applications of the treatment therapy or for each nth detection cluster.
1.7. US20080146960A1, Headset For A Wireless Neural Data Acquisition System, Inventor: Pedro Irazoqui-Pastor, James C. Morizio, Vinson L. Go, Jack D. ParmentireDate of Publication: 2009-12-29.
A headstage for a Neural Data Acquisition System is shown and described. In one embodiment, the headstage includes at least one Input Pre-amplifier, and a multiplexer (MUX) for multiplexing at least one channel. In one embodiment, the input filter of the Input Pre-amplifier is tuned by adjusting the gate voltage of a transistor operating in sub-threshold mode.
1.8. U.S. Pat. No. 4,858,612A Hearing Device, Inventor: Philip L. Stocklin; Date of Publication: 1989-08-22, A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the region of the auditory cortex is shown and described. A microphone is used to transform sound signals into electrical signals which are in turn analyzed and processed to provide controls for generating a plurality of microwave signals at different frequencies. The multifrequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the ma
1.9. CN 2008202247769.1 China use the tech both in peaceful time and war time.
Publicly published books: All these public books describe some technologies can monitor neural signals like auditory signals and retinal signals in cerebral cortex remotely.
Chinese military research book and public issued books:
2.0. <Control Brain Technology Development and Military Application Prediction and Research> Date of publication November, 2016, Total pages 166—Doctoral Paper of the Third Military University of China Author: Luo Xue, Principle Professors: Gou Jiwei and Liu Cangli.
The doctoral paper shows Chinese military and government institute develop this technology vigorously which is used in Operational Level War to attack our USA and other countries.
2.1. <Neural Monitoring, The Prevention of Intraoperative Injury>, ISBN 978-1-4612-0491-6 Authors: Salzman, Steven K., eBook $219.00
2.2. <Remote Brain Targeting: A Compilation of Historical Data and Information from Various Sources>, eBay:$15.89, Sold by greatbookpricesl (115117) 98.9% Positive feedback
2.3. <Surviving and Thriving as a Targeted Individual: How to Beat Covert Surveillance, Gang Stalking, and Harassment>, eBay: US$19.27 ISBN 10: 1549542931/ISBN 13: 9781549542930
Now we have confirmed these technologies existing with US patents and China patents, as well as publicly issued books.
Till now, there is not any method to identify both a victims of technology abusing and those remote operators (RODs) using devices of V2K and RNM around world. These abuse has been developed global and transnational.
This invention uses programmable logical controller (PLC) as main comportment, because PLC is widely used in automatic control areas which input all kind signals to be processed by a special CPU inside of PLC. The invention also input all kinds of electronic signals from V2K feedback signals and retinal image signals transformation to achieve identifying goals.
First the invention is used to identify a victim of abuse V2K and RNM technology, the victim receives coded physical electromagnetic and microwave wave radio frequency harassment called V2K harassment feedback signal, V2K's physical base is microwave hearing effect, or called Frey effect, it is an ordinary physical phenomena, Here it needs to be emphasized the V2K signal is generated by voice to skull (V2K) technological device which is described by above US patents, there is not human factor.
Second why the reason the remote operator can harass the victim is the victim's brain wave frequency was taken in very near distance first by someone and then the brain wave frequency was coded and decoded into some software then using satellite communication technology to harass victim remotely and take victim's neural signal such as retinal image signal and auditory cortex signal, like a radio station receive and send shortwave information with fixed frequency. So the invention uses of the remote device taking and showing victim's retinal image signal, with pre-designed images and videos with some text words to display on the remote device of V2K and RNM, deliberately causing the remote operator feedback signals of V2K and RNM V2K. Here also needs to be emphasized the retinal image signal is collected by remote neural monitoring (RNM) technological device which is described by above US patents, there is not human factor.
Because the ROD wants to harass a victim, the ROD must use of his or her negative words with V2K technology based microwave hearing effect to harass the victim via device of V2K and RNM and via satellite communication and obtain victim's emotion reaction from these device, so in this case has a bidirectional and interactive process. The invention first time uses of such process to launch multiple attacking to ROD in the opposite direction using victim's retinal image signal with images or videos with some text words in projecting database from victim's side (TP's side) to cause response or reaction from ROD. Once ROD makes some responses or reactions which the victim (TP) can not make, the programmable logical controller (PLC) will make judgement and identification quickly. How to say, the art of war is called to turn somebody’ trick against himself or to beat somebody at his own game, because the automatic machine in this invention can change the passive harassment to victim into revealing the identity of victim and further more revealing all kinds of status of ROD himself/herself using device of V2K and RNM, although the ROD stay at a remote place.
Third, the special algorithm running in the CPU in a programmable logical controller (PLC) uses the automatic control curve to identify the tested person is a victim, then can identify the all status of a remote operator using device of V2K and RNM.
Summarize the above three steps, the invention is the world first using Automatic Control Technology—Programmable Logical Controller (PLC) to expose the huge amount abuse of V2K and RNM technology, it is only one countermeasure between Automatic Control Technology and V2K & RNM Technology at present, it is not a battle between human beings.
Different from human brain, PLC does not consider mistakes of electronic signals which a human being inputs by pressing buttons on a touchscreen by a person, because the special software in PLC choose a fluctuating trend which approaches correct goals finally, whereas human brain always consider choosing which one is correct or which one is wrong only, so this job can not be instead of human brain. The invention does not exist mind process.
PLC is different from ordinary computer, PLC have special CPU which can scan 1000 instructions within 100 ms in average, all kind of Timer (T0-T255) which are convenient for timing any length of time, all kinds of variable memories such as VB store Bit, VW store Word, WD store double words, all kinds of bit memory M 0.0-M 31.7, special memory SM, all kinds of Counters (C0-C255) and high speed counter HC0-HC5 and so on, so PLC can completes task which ordinary computer can not complete.
Furthermore, the invention has a very advanced automatic guide system, when a person chooses thousand pictures or videos from projector's classified database and press answer buttons on a touchscreen, the special PLC algorithm will show green light CORRECT or red light WRONG in the touchscreen within 0.01 second, so the guide system will let the tested person (TP) reach the final identification goal very fast.
At last the automatic machine can automatically print a certificate of victim to a person to identify him/her is a victim which can provide reference to medical department. Meanwhile, the automatic machine can also automatically print some document about remote attacker's or remote operator's all kinds of status which can submit to department of justice for reference.
The invention is an unique combination of existing technologies in the world, using an unique software which the inventor programs, generates an unique effect in the world in a field where on one has ever involved, so no doubt, it is a real invention.
An object of the present invention is to provide an automatic machine can identify both the victims of technology abusing and those remote operator's status using devices of V2K and RNM around world. This is the first set invention of identification combined with polygraph technology, projecting image technology, special automatic technology (PLC) and human-machine interface technology around world which can automatically generate identification results, except checking polygraph meter with human, all other parts of the system achieves automation.
The principle of the invention utilizes the remote operator can read retinal image signals which later transferred into image on a remote device which operator is using according these above US patents description, so the operator can see what a victim see via
Remote Neural Monitoring technology. The invention asks a victim to watch or only a glance some images or videos with some classified psychological attacking words against remote operator to send these retinal image signals to a remote operator and attack a remote operator directly to cause the remote operator classified psychological response which the victim can feel or sense according V2K feedback signal technology describing in these above US patents description. Then asking the victim to answer designed question on a touch screen with pressing buttons YES or NO,
American eye doctor with US PhD Ms. Diana Chao, M.D. explain very clearly that retinal image signal formed by some lights into retina is not mind process.
when a person glance or watch on something forming a retinal image signal only in a microsecond (equal to one millionth of a second) then transfers to remote device of V2K and RNM with the speed of electromagnetic wave transmission, these is not any mind process in the procedure.
The every image and video from projector database contains some per-designs text words to attack remote operators using device of V2K & RNM technology, so the victim's (TP's) retinal image with such text words only cause those remote operator's psychology reaction, but cannot cause TP's psychology reaction.
So the system is a kind of automatic machine inputting raw materials and outputting products as following simple diagram presentation, the retinal image signal forming like camera lens imaging function, so there is not any mind processing. Refer
V2K: Voice to Skull
RNM: remote neural monitoring technology
ROD: remote operators using devices of V2K and RNM technology
ISA: an identification system administrator
TP: a tested person who originally claims him/her as a victim
PLC: programmable logical controller
PM: polygraph meter (computerized digital)
TS: touch screen
Six Steps for Identification:
Step 1. Ask a TP who claims himself/herself as a victim to use of RODs reading his/her retinal cortex image signals and auditory neural signals in their cerebral cortex being monitored remotely to watch some images or videos with some words in databases in a projector to sent retinal cortex image signals to some remote operator using devices of V2K and RNM, (an American eye doctor with US PhD Ms. Diana Chao, M.D. explain very clearly that retinal image signal formed by some lights into retina is not mind process). This phase may take about five seconds.
Step 2. Then these retinal image signals will be shown on those devices as image with words only attacking ROD will cause those ROD's psychological response and at same time the TP can feel or sense those ROD's psychological responses according V2K feedback signal technology on TP's auditory cortex. The technology comes from US patents and China patents above and the base is microwave hearing effect or call Frey effect. This phase may take three seconds.
Step 3. Ask the TP to answer pre-designed questions which shows a touch screen by pressing buttons YES or NO on a touch screen according which psychological response from RODs. The YES or NO button on a touchscreen via M (Bit memory) communicating with M (Bit memory) in a PLC, via variable memory VW make a judgement and response within 0.01 second via M (Bit memory) to show green light “CORRECT” or red light “WRONG” on the touchscreen. The timer (T) in PLC keeps these showings ‘CORRECT’ or ‘WRONG’ on for two sends on the touchscreen. Then the TP see the small green light “CORRECT” or small red light “WRONG” on the touchscreen. The base of technologies come from CPU in a programmable logical controller make judgement with automatic control algorithm and basic human-machine interface asking person to make human-machine interaction. So from phase 1 to phase 3 only takes 10 seconds.
When step 4 finish, return to step 1 into a circulation with a high speed advanced automatic identifying guide system responds the tested person (TP) pressing YES or NO button only within 10 ms indicating CORRECT with small green light or WRONG with small red light. According automatic control decay curve (PID control regulate curve to prove the identification is accurate via a number of times of successful identification being divided by the number times of failure identification with sending multiple times of retinal cortex image signals to RODs and getting multiple time of psychological responses from RODs. Then the tested person (TP) can choose next image or next video in projecting database. So the automatic identifying machine can guide tested person (TP) quickly to reach identifying result and nearly does not need tested person (TP) to make some judgment, more than 90% judgments makes by the automatic identify machine. As the error curve approaches the X axis gradually. The base of theory come from automatic control theory.
There are a, b, c, d, e, f and g seven databases total, complete one of seven databases taking about 30 times to 50 times reverse attacking to ROD, one time of attacking only takes 10 seconds, so the invention can complete one database within 300 seconds to 500 seconds to reach a identifying result.
Step 5. When these identification finish database a, b and e successfully, the TP has been identified as a victim of abuse of V2K and RNM technology, the automatic machine will show the TP is a victim on the touchscreen and print a certificate of victim automatically.
Step 6. When TP finishes one of seven classified picture or video (a,b,c,d,e,f,g) projecting database identification, ISA connects PM to TP to confirm TP answering all questions on the touchscreen is honest. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
Step 7. The information of victim and information of ROD will be stored into a victim database and a ROD database in standardized format; these information in the database can be real time update by a content server; and there is remote access to users over a network and transmitting the message to users over the computer network when information update.
However, the method only ask the TP to choose some contents in some database to send retinal cortex image signals to RODs when TP see some images or videos with some words in some database in a projector, in this phase, there is not TP's mind process. The next phase, TP answers very simple fixed questions on touch screen according the TP feels or senses which psychological response from RODs according V2K technology signal feedback on TP's auditory cortex, meanwhile the automatic guide system shows CORRECT with small green light or WRONG with small red light on the touchscreen on every pressing YES or NO button,
here is nearly not TP's mind process also, because microwave hearing effect or Frey effect does not belong mind process.
According theory of psychoanalysis: the psychological response between an active psychological attacker and a psychological attacked person passively have completely different characteristics, so these different psychological responses caused by selective classified psychological attacks can be used both to identify a victim (TP) and those remote operators using device (RODs) of RNM and V2K via satellite, even the victim (TP) is in USA, but the remote operator is in China.
Additional advantages and features of the invention will become apparent from the description which follows, and may be realized by means of the instrumentalities and combinations particular point out in the appended claims.
Still further objects and advantages will become apparent from a consideration of the ensuing description and drawings. These and other objectives, features, and
advantages of the present invention will become apparent from the following detailed description, the accompanying drawings, and the appended claims.
V2K: What is ‘Voice to Skull’? . . . Voice to skull is the transmission of voice, or any other audible or subliminal sound, directly into the hearing sense of a victim. So the invention is based on technologies about of RNM and V2K technology around the world. The painful experience described by victims is consistent with the effect of these technologies in relation to V2K which were described in US patents and China patent.
The invention is based on these V2K and RNM device operated by human beings and these operators show themselves emotions via microphones and earphones when they are using these devises to harass a victims. On the other hand, the victim can feel and sense operator's emotions via V2K technology effect on their auditory cortex. This emotional interaction between victim and operators is interactive when these V2K and RNM devices are running.
The reason to confirm V2K and RNM device operated by human beings is human brain can forget something, because operators frequently forget somethings related victim's history, but victims do not forget these things in himself or herself history. On the other hand, these computer memory and robot memory with artificial intelligent never lost data when programmer programs data into their memory, so only human has memory error, but computer's CPU never has memory data read and write error. So the invention can analyze operator's human emotion which a victim can feel and sense to identify these voice to skull is not victim's auditory hallucination, but they are emotional response from those remote operators. Because there are obvious differences between victim's emotion reaction and those emotions response belong to remote operators using devices of V2K and RNM, so if using the invention method, you can find these differences clearly.
The invention can help victims to confirm their grieves and get justice, on the other hand, it can help law enforcement like FBI to find out the fact of cases, as this remote technology is global and transnational crime, so if all kinds of victims enter United States in some related cases, FBI can use the invention as a tool to analysis and identify who are remote operators (or call them remote attacker), then these operators' (or call them remote attacker) nationality and race; religious belief and political belief, scale of language and dialect, scale of scientific knowledge, even identify these attacker or operator belong to which organization.
For example, FBI investigated the case of Washington D.C. navy yard gun case, CNN reported on Sep. 26, 2013, the gunman suffered “Low frequency attacks” and that attack drove him to kill. If similar cases happen, the invention can help FBI to investigate.
Declaration: In this invention, all political, religious attacks or attack a country are human attacks with viewing videos, pictures & other materials in computer databases only are retinal image signals with some words attacking remote operators using device (RODs) to cause remote operators using device (RODs) psychological response in non-public site, there is neither any verbal attack nor behavioral attack. So do not cause insulting anyone.
Description of the Automatic Machine of the Present Invention:
The invention first time apply principle of automatic control attenuation cure to gradually approaching final correct direction on human multiple instinct selections, regardless the human's single selection is correct or wrong, because the invention has an advanced automatic guide system to indicate every correct answer and every wrong answer which can guide the tested person (TP) to get final identification goal, just requires this tested person (TP) is an evolved human being, the invention can reach final correct result, so such invention will be the first one around the world.
So the invention uses programmable logical controller as main component:
1. Use some intermediate registers M in PLC as communicating component connected PLC and a touchscreen, when there is a pressing button signal on touchscreen, CPU in PLC response within 10 ms (0.01 second) to send judgement of input signal is correct or wrong and meanwhile make reaction let the touchscreen show green light “CORRECT” or red light “WRONG”, the intermediate register M also make last instruction to make touchscreen show identifying result on the touchscreen.
2. Use some variable registers VR in the CPU of a PLC to do all kinds of judgment calculations, in this invention uses of VW.
3. Use some precise timers in the PLC to calculate time, the calculation accuracy reaches 10 milliseconds.
All these technical means insure the last identifications are correct.
The following is a well-known automatic control PID algorithm formula:
u
(k)
=k
p(err(k)+kiΣerr(j)+kd(err(k)−err(k−1))),
Kp: scale parameter; Ki: integration parameter; Kd: differential parameter.
The invention utilizes a victim's (TP's) intentional selective and classified retinal image signals with some words attacking remote operators using device (RODs) of V2K and RNM to cause remote operators using device (RODs) classified psychological response or classified emotional responses which victim (TP) can feel and sense according V2K technology effect on victim's (TP)'s auditory cortex. So, there is nearly not mind process.
Then the invention uses of relatively comparing methods, designed procedures in flowcharts classify emotional responses between the victim's (TP's) and remote operators' (ROD's), designed procedures in flowchart can find out there are significant differences between victim's (TP's) and remote operators' (ROD's) with judgement diamond frames. Use of these difference, a programmable logical controller (PLC) can identify both a victim (TP) and classified identify all kinds status of remote operators (ROD) using devices of V2K and RNM by checking flowcharts
These classified identities including remote operator's (ROD's) nationality, race, political trend, religious belief, organization, scope of language and dialect, scope of scientific knowledge.
When identifying begin, a identifying curve indicates identifying error changes gradually from large to small and approach to accurate identification at last, the principle is similar with automatic control decay curve, which is shown in
Such similar curve is widely used for PID controller in automatic control technology which is used to control like temperature and pressure, but the invention uses it to identify who is a victim (TP) and to identify all kinds status of a ROD, mainly for identifying ROD.
Referring to
1 . . . polygraph Meter: (PM)
Polygraph meter is used to confirm the tested person's (TP's) answer is true.
2. Operating Electric Box: there are a Programmable Logical Controller, a Touchscreen, a Switch Power, a Power Switch in the Box;
3. Projecting image and video system, there are a projector, a database for images and videos and projecting curtain.
4. Printing and storing system: there are a printer and a computer and there is an identified information database in the computer with an access of network for users.
Referring to
1. ISA: An Identification System Administrator.
An identification administrator (ISA) asks a tested person (TP) to choose some special pictures or videos with some words in some databases in a projecting system to send retinal image signals those remote operators (ROD)'s to cause those remote operator's, (ROD)'s psychological response via V2K and RNM device, but cannot cause tested person's (TP) same psychological reaction. Meanwhile, the tested person (TP) to answer some designed questions which shown on a touch screen with pressing designed buttons YES or NO on a touch screen according diamond frames in flowcharts in a computer what remote operators' (ROD's) psychological response which the tested person (TP) can feel or sense according V2K technology on TP's auditory cortex. ISA asks the tested person (TP) answer all questions on a touchscreen honestly before test begin, then uses the polygraph meter to confirm TP is honest to answer questions.
2. Tested Person (TP)
Tested person (TP) should claim himself/herself is a victim of abusing V2K and RNM technology. Tested person answer questions which can be analyzed and identify who is the remote operator (ROD) using V2K and RNM device, furthermore the invention may analyze and identify a remote operator's (ROD's) nationality, race, political belief and religious belief, scale of language and dialect, scale of scientific knowledge and which organization by the designed procedures in a computer and a programmable logical controller.
Of course, the qualified tested person (TP) should be emotional stable and rational thinking, as well as cooperative with identification system administrator (ISA).
A projector database contains seven classified databases a; b; c; d; e; f and g which contain classified pictures and videos with some words attacking remote operators using device (RODs) directly. Every classified database can let tested person (TP) choose contents to send some classified retinal image signals with some words attacking remote operators using device (RODs) to cause ROD's classified psychological responses.
This the ROD's classified psychological responses can be used to identify who is victim (TP) and who is remote operator (ROD) by operating programs in flowcharts in a programmable logical controller.
Of course, the classified contents in database can be updated and increased according different requirements in a projector used in identifying process.
A programmable logical controller (PLC): A programmable logical controller manages special algorithm when automatic system is running. It also contains twelve counters in flowcharts, flowcharts is a programmed software, among them, seven counters are successful counters which record every time successful identification and accumulate the times of successful identification: a(n), b(n), c(n), d(n), e(n), f(n) and g(n). Another five counters are failure counters which record every time failure identification and accumulate the times of identification: fail a(n), fail b(n), fail c(n), fail d(n) and fail e(n).
A touch screen (TS): the touch screen will have eight pages, except the main page
Judgement contains in every diamond in flowcharts, TP answers questions in every diamond frame which shows on a touch screen.
Every diamond frame have two flow lines directions, a word “success” beside the line indicates one time of successful identification; a word “fail” beside the line indicates one time of failure identification.
There are two sets of flowcharts which are programmed software in a programmable logical controller.
The first set of flowcharts consist of
Among these fail counters, they represent any failure identification, fail a(n), fail b(n), fail e(n) in first set of flowcharts; but fail counters fail c(n) and fail d(n) in second set of flowcharts.
In the identifying process, the number in successful counters is divided by the number in fail counters, if the quotient larger or equal to 9, the identification has been completed. In case of need, the quotient can be larger than 9.
In order to avoiding the divisor (denominator of the score) is zero, we assign an initial value 1 to every fail counter. In the fractional number in a(n), b(n), c(n), d(n) and e(n) are numerator, but the number in fail a(n), fail b(n), fail c(n), fail d(n) and fail e(n) are denominator.
The second set of flowcharts consist of
There are also two successful counters: c(n) and d(n), two fail counters: fail c(n) and fail d(n), but there are not fail counter fail f (n) and fail g(n).
Each flowchart input contents according type and characteristics from contents database in a computer, ISA asks TP to choose some suitable contents form the database to send a retinal image signals to ROD, then TP answer questions which show on a touch screen in diamond frame in flowcharts about what kind of psychological response from ROD which TP can feel and sense via V2K technology on TP's auditory cortex. Seven category of input contents are in seven classified databases.
Every projecting system database stores different content like following, but these contents in different databases inputs classified content only the method put into using. For examples, database of category d can input twenty five names of countries and more different races, because it was said there were twenty five countries own the technology of remote neutral monitoring and voice to skull or relevant equipment. So ISA can store these names of twenty five countries and their races in database d of a computer when the method in operating.
After a TP answers the questions with pressing button YES or NO, the touchscreen will show small green light CORRECT or small red light WRONG at once and keep the lights on for two seconds, which can guide TP to get final identification fast.
Seven category of input contents in seven classified databases, each database stores different content like following, but these contents in different databases store classified contents only the method put into running.
The present invention designed that if a TP passes database a, database b and database e identifications, the TP has been identified as a victim of abuse of V2K and RNM technology, the automatic machine will print a certificate of victim to this TP.
Then the invention regards the TP as a qualified tested person to identify ROD's all kind status further as following:
1. By the help of the qualified TP, complete database c to identify ROD's political trend and religious belief
2. By the help of the qualified TP, complete database d to identify ROD's nationality and race.
3. By the help of the qualified TP, complete database f to identify ROD's scope of language and dialects.
4. By the help of the qualified TP, complete database g to identify ROD's scope of scientific knowledge.
Of course, 1, 2, 3 and 4 identifications can also strengthen the accuracy of identification of a victim, because all these features in 1, 2, 3 and 4 identifications belong ROD, they do not belong the victim or call TP any more.
Category A:
The category a database contains some universal disgusting pictures and videos with some words which are specifically only causing remote operator's (ROD's) using devices of V2K and RNM disgusting psychological response, but they will not cause a tested person's (TP) disgusting psychological reaction, because these words in pictures and videos only attacking ROD directly, but not any words attacking the TP.
After a TP has chosen a kind of disgusting picture and videos with some words attacking ROD, the TP has sent his/her retinal image signals to ROD. Then ROD must make psychological response when ROD see these disgusting picture and videos with some words or sentences attacking him/her on ROD's device. There is nearly not mind process.
After TP feel or sense what psychological response from ROD, TP answer question in diamond frame in flowchart which shows a touchscreen by pressing buttons “YES” or “NO”, every time TP press a button, a small green light show “CORRECT” or red light show “WRONG” on touchscreen which the automatic system guides TP gradually to the final accurate identification fast.
After category identification, an identification system administrator (ISA) connects PM to TP and then asks TP one question: ‘Did you answer these question on this touchscreen honestly?”, TP answer; “Yes, I did”. ISA checks PM to confirm TP's answer is true, then finish identification. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
According automatic control theory, multiple TP's disgusting retinal image signals psychological attack cycles will generate precise identification: the disgusting psychological response comes from ROD, but does not belong to TP.
Special PLC algorithm for identifying disgusting thing reaction V2K signal refer
Disgusting Images or Videos Example List:
All above seven examples can cause universal disgusting to every people, but can not insult anyone because the identification operating in private room.
Category b:
Category b is used for identifying a TP who is a victim of abuse technology of V2K and RNM.
The category b database contents which are specifically causing remote operator (ROD) using devices of V2K & RNM funny psychological response. E.g., LAUFHING, but they will not cause tested person's (TP's) funny psychological reaction, because the identification system administrator (ISA) lets tested person (TP) himself/herself choose some funny pictures or videos with words pointing directly at ROD, but do not pointing TP self.
For example, A picture drawing two flies stopping on one's hair mating, in this picture has such words: “Hey, the flies couple are mating on your ROD's hair, do you feel funny? Please check
After TP has chosen a kind of funny picture with teasing words to ROD from database b, he/she must answer the designed question which shows on a touch screen. Meanwhile, an advanced automatic guide system in PLC to show CORRECT or WRONG on every TP pressing button on the touch screen.
After category identification, an identification system administrator (ISA) connects PM to TP and then asks TP one question: ‘Did you answer these question on this touchscreen honestly?”, TP answer; “Yes, I did”. ISA checks PM to confirm TP's answer is true, then finish identification. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
According automatic control theory, multiple TP's funny retinal image signal psychological attacking cycles will generate precise identification: the funny psychological response comes from ROD but does not belong to TP's.
Special PLC algorithm for identifying Funny reaction of V2K signal refer
Funny Jokes Examples List
Category c:
Category c is used for identifying ROD's political trend and religious belief.
The category c database contains all kinds of pictures or videos with some words attacking ROS's political trend and religious belief are specifically causing remote operator's (ROD's) using devices of V2K & RNM angry psychological response: angry curse and refutation, but they will not cause tested person's (TP's) angry psychological reaction, because the identification system administrator (ISA) lets tested person (TP) himself/herself choose some pictures or videos with some words only attacking ROD, that is these words only fiercely oppose ROD″s political trends or these words only seriously insult ROD's religious beliefs in this database intentionally, but these words does not attack TP. So these words only to cause ROD's angry psychological response, but does not cause the tested person (TP) himself/herself angry psychological reaction.
There is a more very clear example: we assume the TP is not a Communist Party member, but ROD is a Communist Party member who thinks that the Communist Party flag and Communist Party emblem are sacred and inviolable. Then ISA asks TP to choose a picture or a video to insult the Communist Party flag and Communist Party emblem with stinky stool to stain it or burn them, in this case, TP in the invention system will feel and sense ROD's angry via V2K technology on TP's auditory cortex, ISA is sure ROD is a Communist Party member, because people who are not Communist Party member feel nothing insulting the Communist Party flag and Communist Party emblem in such way, only a Communist Party member can feel angry, so there is not any psychologist can deny the accuracy of the invention of identification.
After TP has chosen a kind of picture with some words only attacking ROD from database c, he/she only need to watch these picture with words in a projecting system to launch a retinal image signals to attack ROD and then answer question in diamond frame in flowchart which shows on a touch screen,
Meanwhile, an advanced automatic guide system in PLC to show CORRECT or WRONG on every TP pressing button on the touch screen which guides TP to reach final identification fast.
After category identification, an identification system administrator (ISA) connects PM to TP and then asks TP one question: ‘Did you answer these question on this touchscreen honestly?”, TP answer; “Yes, I did”. ISA checks PM to confirm TP's answer is true, then finish identification. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
According automatic control theory, multiple TP's political or religious watching pictures with words retinal image signals attack cycles will generate precise identification: the angry psychological response comes from RODs because of political or religious reasons, but does not belong to TP's, so ROD's political trend and religious trend are identified.
C. Special PLC algorithm for identifying ROD's political and religion belief refer
Political Ideologies Examples List
Religious Belief List
Category d:
Category d is used for identifying ROD's nationality and race. picture with some words to burn ROD's political and religious sign.
The category d database contents are different countries pictures and different races pictures or videos with some words only used attacking ROD's country and ROD's race which specifically cause remote operator's (ROD's) using devices of V2K and RNM angry psychological response: angry curse, because the identification system administrator (ISA) lets tested person (TP) himself/herself choose some pictures or videos with some words which destroy ROD's country and ROD's race in this database intentionally only to cause ROD angry psychological response, but does not cause the tested person (TP) himself/herself angry psychological reaction.
For example, TP choose some nuclear explosion videos with words in database d, these words like such: “Hey, remote operator, I hope to use the nuclear weapon to destroy your country and kill all your family members, let your ROD's body and corpse became vapor or steam in high temperature, kill all your race from the earth”, such TP's retinal image signals psychological attack is sure to cause ROD's angry response which TP can feel and sense via V2K technology on TP's auditory cortex. Once ROD's angry is identified, ROD's nationality and race have been identified.
For example: TP can choose a video in which a huge earthquake destroying a country with some words like “Hey, dear remote operator, the huge earthquake will destroy your country and your family” from computer database, a country where RODs live to cause ROD's antipathy and angry which TP can feel clearly via V2K technology on TP's auditory cortex.
For example: TP can choose a huge tsunami drowning a country video with some words like “Hey, remote operator using V2K technology, the huge tsunami will destroy your ROD's country and drown your ROD's family” from computer database d to launch a retinal image signal psychological attack a country where RODs live to cause ROD's antipathy and angry which TP can feel clearly via V2K technology on TP's auditory cortex.
After TP has chosen a kind of content from database d, he/she only need to watch the video or picture with some words only attacking ROD in a computer to launch a retinal image signal psychological attack ROD and then answer question in diamond frame in flowchart which shows on touch screen.
Meanwhile, an advanced automatic guide system in PLC to show CORRECT or WRONG on every TP pressing button on the touch screen which guides TP to reach final identification fast.
After category identification, an identification system administrator (ISA) connects PM to TP and then asks TP one question: ‘Did you answer these question on this touchscreen honestly?”, TP answer; “Yes, I did”. ISA checks PM to confirm TP's answer is true, then finish identification. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
According automatic control theory, multiple TP's retinal image signal psychological attack cycles will generate precise identification: the angry psychological response comes from ROD, because ROD's nationality or race are attacked and ROD are infuriated, but these does not belong to TP's.
Special PLC algorithm for identifying ROD's nationality and race refer
Because there are too much countries and races, so the list of countries and races omit here, when the machine puts into running, puts counties and races in database.
Category e: Category e is used for identifying a TP is a victim of abuse technology of RNM & V2K.
The category e database contents with all kinds of foreign terrorist organizations are specifically causing remote operator's using devices of V2K & RNM ROD's angry psychological response: strongly deny, because the identification system administrator (ISA) lets tested person (TP) himself/herself choose pictures with some words which accuse RODs committed a terrorist crime, such as terrorist attack on United States and RODs belong to some terrorist organization to cause ROD's strongly deny which TP can feel and sense via V2K technology on TP's auditory cortex. Because everyone knows any terrorist who attacked USA, US government must eliminate the terrorist in anywhere in the world.
On the other hand, TP is not a terrorist and never commit felony, so TP does not need to deny or admit. So in this step, TP answer will choose NotYES&NotNO button, but TP is not willing top press YES button on the touchscreen more than ten times deliberately, but sure ROD will deny it firmly.
So once RODs make a strongly deny, it is sure the response from RODs and it is sure the response is not auditory hallucination belong the victim (TP). This is an important step to identify a victim of abusing technology of V2K & RNM.
After TP has chosen a kind of picture with such words from database e, he/she only need to watch the picture or video with such words to launch a retinal image signal psychological attack to ROD and then answer question in diamond frame in flowchart
Meanwhile, an advanced automatic guide system in PLC to show CORRECT or WRONG on every TP pressing button on the touch screen which guides TP to reach final identification fast.
After category identification, an identification system administrator (ISA) connects PM to TP and then asks TP one question: ‘Did you answer these question on this touchscreen honestly?”, TP answer; “Yes, I did”. ISA checks PM to confirm TP's answer is true, then finish this identification. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
According automatic control theory, multiple TP's accusing ROD's belong terrorist organizations or convicted terrorist crime psychological attacking cycles will generate precise identification: the strongly denying psychological response comes from ROD, but these does not belong to TP's.
Special PLC algorithm for identifying a TP is a victim of abuse technology of V2K and RNM refer
Foreign organizations will be searched from time to time and added into the database e by ISA when in need.
Part Examples of Foreign Terrorist Organizations List with Date Designed
Category f: Category f is used for identifying ROD's scope of language and dialect.
The category f database contains pictures and videos with different languages words and different dialects words to send retinal image signals to remote operator (ROD) for specifically causing remote operator's (ROD's) using devices of V2K and RNM psychological response: there are two cases. If the ROD knows the words language in the same drawing, ROD will make psychological response, so this can identify ROD know this language. On the other hand, if ROD do not know the words language, ROD will lighten harassment or stop harassment when they meet some foreign language or dialect which they do not know, because these ROD need time to understand and consider how response on their device of V2K & RNM on ROD using device.
For example, there are five pictures have same drawing with different languages; The drawing describes remote operator pissing pans and the urine is wet a lot. If a ROD meets one of the following five kinds of words language which he/she knows, The ROD will make a psychological response. If a ROD meets one of the following five kinds of words language he/she does not know, the ROD will not make a psychological response and lighten or stop his/her harassment. So ISA ask a TP to watch the five same drawing pictures with different words language in turn, the TP is waiting for which picture with obviously psychological response from a ROD with V2K feeling in TP's auditory cortex.
After TP has chosen a kind of picture with some words from database f, he/she has sent a retina image signal to ROD and made a psychological attack to ROD and then TP answer question in diamond frame in flowchart which shows on touch screen.
Meanwhile, an advanced automatic guide system in PLC to show CORRECT or WRONG on every TP pressing button on the touch screen which guides TP to reach final identification fast.
After category identification, an identification system administrator (ISA) connects PM to TP and then asks TP one question: ‘Did you answer these question on this touchscreen honestly?”, TP answer; “Yes, I did”. ISA checks PM to confirm TP's answer is true, then finish identification. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
According automatic control theory, multiple TP's retina image signal psychological attacking cycles with words languages or words dialect will generate precise identification: ROD know what language and does not know what language.
Special PLC algorithm for identifying ROD's scale of language and dialect is similar to parts a,b,c, d,e, so here omit.
Table 1 shows examples of languages spoken in different countries of the world.
Languages Spoken in Different Countries of the World
Category g: Category g is used for identifying ROD's scope of scientific knowledge.
The category g database has different pictures or videos of scientific knowledge with some words specifically test ROD if the ROD know or understand the scientific knowledge? If the ROD know or understand scientific knowledge, he/she will make some psychological response which a TP can feel or sense via V2K technology on TP's auditory cortex; On the other hand, if the ROD does not know or understand the scientific knowledge, the ROD will slow down psychological response: lighten harassment or stop harassment, because the ROD need time to consider how to response.
For examples, we assume a TP has computer technology knowledge and know how change theses data among hexadecimal, binary and decimal. At this point, TP can choose a picture like following: Please check
In this case, if the ROD know the question, the ROD will response. On the other hand, if the ROD does not know the question, the ROD will slow down the harassment, even stop harassment to TP, which TP can feel or sense via V2K technology effecting on TP's auditory cortex.
When these questions are processing, we can find an obvious phenomenon: TP feel or sense the remote harassment get weaken or even disappeared temporarily, the reason is that those ROD do not understand how change data among hexadecimal, binary and decimal, so those remote operators (ROD) have no way to response on the device of V2K & RNM as soon as possible.
After TP has chosen a kind of picture with such words from database g, he/she only need to watch the picture with such words to launch a retinal image signal psychological attack to ROD and then answer question in diamond frame in flowchart which shows on touch screen.
Meanwhile, an advanced automatic guide system in PLC to show CORRECT or WRONG on every TP pressing button on the touch screen which guides TP to reach final identification fast.
After category identification, an identification system administrator (ISA) connects PM to TP and then asks TP one question: ‘Did you answer these question on this touchscreen honestly?”, TP answer; “Yes, I did”. ISA checks PM to confirm TP's answer is true, then finish identification. In case of TP complete this phase is not honest, ISA had to ask TP to repeat this identification phase.
According automatic control theory, multiple TP's such retinal image signal psychological attacking cycles with scientific knowledge will generate precise identification: ROD's scientific knowledge scale.
Special PLC algorithm for identifying ROD's scale of scientific knowledge is similar to parts a,b,c,d,e, so here omit.
Table 2 shows examples of different kinds of sciences.
List of Different Kinds of Sciences
All these identifies can be repeatedly done to confirm the last identification is correct, there is not contingency.
The hardware configuration of automatic identification machine can refer
The operating method of the present invention can refer to
The special PLC algorithms refers to
Automatic Identification Machine including tested person VS Device of V2K and Device of Remote Neural Monitor Technology refer
One skilled in the art will understand that the embodiment of the present invention as shown in the drawings and described above is exemplary only and not intended to be limiting.
It will thus be seen that the objects of the present invention have been fully and effectively accomplished. Its embodiments have been shown and described for the purposes of illustrating the functional and structural principles of the present invention and is subject to change without departure from such principles. Therefore, this invention includes all modifications encompassed within the spirit and scope of the following claims.
This is a Continuation-In-Part application of a non-provisional application Ser. No. 16/558,040, filing date Aug. 31, 2019, which claims the benefit of U.S. provisional patent application No. 62/812,915, filing date Mar. 1, 2019. The content of these specifications, including any intervening amendments thereto, are incorporated by reference herein in their entirety.
Number | Date | Country | |
---|---|---|---|
62812915 | Mar 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16558040 | Aug 2019 | US |
Child | 16997656 | US |