Gang Stalking Davenport,Physcological Warefare City of Davenport Uses
Thursday, September 27, 2012
mind control and how some of it works technology
1. A POSSIBLE SCALAR WAR SCENARIO
2. HOW WERE SCALAR WAVES DISCOVERED?
3. A CLOSER LOOK AT SCALAR WAVE-FORMS
4. HOW DO SCALAR WEAPONS WORK?
5. WHAT CAN SCALAR WEAPONS DO?
6. SCALAR BEAMS AGAINST INDIVIDUALS
7. SCALAR MIND CONTROL
8. AMERICA'S 'NO CONTACT' MASS MIND CONTROLLING NETWORK
9. INDUCING DISEASES WITH SCALAR WAVES
10. TESLA'S TECHNOLOGY WAS SECRETLY CONTINUED BY RUSSIA AND THE NAZIS
11. IS THERE A SECRET WAR GOING IN THE SKIES?
12. WHO ELSE IS CONTINUING TESLA'S SCALAR TECHNOLOGY?
1. A POSSIBLE SCALAR WAR SCENARIO
The following seems like science fiction, but scalar beam weapons were invented in 1904 by a American immigrant genius called Nicola Tesla (1856 or 57 -1943) from Yugoslavia. Since he died in 1943, many nations have secretly developed his beam weapons which now further refined are so powerful that just by satellite one can: make a nuclear like destruction; earthquake; hurricane; tidal wave; cause instant freezing - killing every living thing instantly over many miles; cause intense heat like a burning fireball over a wide area; induce hypnotic mind control over a whole population; or even read anyone on the planet's mind by remote; affect anybody's REM dream sleep by sending in subliminal pictures to the visual cortex; cause hallucinagon drug like effects or the symptoms of chemical or biological poisoning; make a disease epidemic by imprinting the disease 'signature' right into the cellular structure; paralyze and or/kill everyone instantaneously in a 50 mile radius and lastly remove something right out of its place in time and space faster than the speed of light, without any detectable warning by crossing 2 or more beams with each other and any target can be aimed at even right through to the opposite side of the earth. If either of the major scalar weapon armed countries e.g. U.S. or Russia were to fire a nuclear missile to attack each other this may possibly not even reach the target, because the missile could be destroyed with scalar technology before it even left its place or origin. The knowledge via radio waves that it was about to be fired could be eavesdropped and the target could be destroyed in the bunker, fired at from space by satellite.
Alternatively invisible moving barriers and globes made of plasma (produced by crossed scalar beams) could destroy any nuclear missile easily while it moves towards the target and failing all these, it could be destroyed by entering the target's territory by passing through a Tesla shield which would explode anything entering its airspace. To begin with, defense using scalar technology could intercept it before it even landed. Secret eavesdropping of radio communications tapping into ordinary military radio contact using undetectable 'scalar wave carriers' hacking in may have heard military personnel say it was about to be fired. The missile may be destroyed from above the site, using satellites equipped with scalar or particle beam weapons or a cloaked UFO (American or Russian made anti-gravity disk originally made by back engineering crashed alien saucers) or aircraft using scalar or particle beams which could invisibly (and undetectably with standard equipment) cause the target to malfunction and drop down. By using a scalar wave (radar like) 'interference grid', which covers both country's entire military activities in the air, underground or undersea, scalar transmitters send waves over large areas at 90 deg angles to each other. These waves follow the earth-ionospheric wave guide and curve around the planet. It is called an 'interference grid' because all solid moving objects show up as a spot of light moving through marked grid squares on an operator's video screen. Scalar waves are a higher form of radar waves, but they go one step further by passing through anything solid too and are able to detect and be able to be made into a focused beam to target anything through the earth or sea as well.
A scalar beam can be sent from a transmitter to the target, coupled with another sent from another transmitter and as they cross an explosion can be made. This interference grid method could enable scalar beams to explode the missile before launch, as well as en route with knowing the right coordinates. If the target does manage to launch, what are known as Tesla globes or Tesla hemispheric shields can be sent to envelop a missile or aircraft. These are made of luminous plasma which emanates physically from crossed scalar beams and can be created any size, even over 100 miles across. Initially detected and tracked as it moves on the scalar interference grid, a continuous EMP (electromagnetic pulse) Tesla plasma globe could kill the electronics of the target. More intensely hot Tesla 'fireball' globes could vaporize the missile. Tesla globes could also activate a missile's nuclear warhead en route by creating a violent low order nuclear explosion. Various parts of the flying debris can be subjected to smaller more intense Tesla globes where the energy density to destroy is more powerful than the larger globe first encountered. This can be done in pulse mode with any remaining debris given maximum continuous heating to vaporize metals and materials. If anything still rains down on Russia or America, either could have already made a Tesla shield over the targeted area to block it from entering the airspace.
2. HOW WERE SCALAR WAVES DISCOVERED?
Scalar wavelengths are finer than gamma rays or X rays and only one hundred millionth of a square centimeter in width. They belong to the subtle gravitational field and are also known as gravitic waves. Uniquely, they flow in multiple directions at right angles off electromagnetic waves, as an untapped energy source called 'potentials'. Potentials are particles which are unorganized in hyperspace - pure etheric energy not manifest in the physical world. In comparison, electromagnetic waves (measured by so many hertz or pulses per second, which we are familiar with e.g. radio waves) exist normally in the physical world, but can only be measured up to levels determined by the sensitivity of the equipment being used as to how many cycles per second they operate.
Scalar waves were originally detected by a Scottish mathematical genius called James Clerk Maxwell (1831-1879) He linked electricity and magnetism and laid the foundation for modern physics, but unfortunately the very fine scalar waves (which he included in his research) were deliberately left out of his work by the 3 men, including Heinrich Hertz, who laid down the laws taught for physics as a discipline at colleges. They dismissed Maxwell's scalar waves or potentials as "mystical" because they were physically unmanifest and only existed in the "ethers" and so were determined to be too ineffectual for further study. These enigmatic (but more powerful than even microwaves when harnessed and concentrated into a beam) scalar waves may have been forgotten except that Nicola Tesla accidentally rediscovered them. He'd originally worked with Thomas Edison who discovered direct current, but Tesla discovered alternating current. The two men disagreed and eventually parted ways and Tesla later experimented using the research of the German Heinrich Hertz, who was proving the existence of electromagnetic waves. Tesla found, while experimenting with violently abrupt direct current electrical charges, that a new form of energy (scalar) came through.
By 1904, Tesla had developed transmitters to harness scalar energy from one transmitter to another, undetectably bypassing time and space. He could just materialize it from one place to another through hyperspace, without the use of wires, it was just sucked right out of the space-time/vacuum and into a transmitter and into a beam which could be targeted to another transmitter. Unfortunately he got no financial support for replacing electricity, which used wires and therefore earned money, and to this day, this is the reason why scalar energy is still not acknowledged in mainstream physics. Tesla, even though he discovered more for mankind in science than many others, is still not credited in science books for his discovery of scalar waves, a source of "free-energy" obtainable as a limitless source of power that costs nothing. Other inventors have sporadically rediscovered "free-energy" but have come to harm or have been silenced by the sum of millions of dollars hush money, a small sum compared to the sale of electricity, oil, gas and a myriad of other energy producers which would then be rendered worthless. Money hungry big business has harshly crushed any opposition to their own riches, generated by multiple obsolete earth polluting fossil fuels.
3. A CLOSER LOOK AT SCALAR WAVE-FORMS
These finer scalar wave-forms also have been discovered periodically by other mathematicians, who have been able to calculate new equations especially in harmonics (used in hyperdimensional physics) connecting the wavelengths of matter, gravity and light to each other and how all these lock in and create our expression of time (as it manifests in space) - which has been now discovered to be untapped 'potential' energy flowing in hyperspace. Time flows like a wave-form river in hyperspace in a grid pattern. This consists of interlocking great circles which circle the poles and include a lattice grid of lines that are 30 nautical miles or 55.5 km apart. When scalar beams charge through hyperspace these 'rivers of time' get blocked and redirected temporarily. There is a covert plan underfoot to change the way time is expressed on this planet altogether using hyperdimensional physics and Tesla technology, by splicing earth back onto a now defunct Atlantean timeline in which Lucifer hadn't fallen from grace. (see my other work on this in the books The Universal Seduction Vols 2 and 3 at the end of this article)
Our present 'reality' is expressed in the way time runs around the corridors in hyperspace by the pattern it takes. Other 'timelines' exist in a different kind of grid pattern, creating alternative versions of our 'present'. Multiple versions of reality (or for example 2 April 2004) can be manipulated given the right technology, and people can enter into parallel universes do all sorts of things and then enter back into this one. One needs a Tesla Zero Time Reference Generator, which can lodge a specific reality into the time at the center of the universe, in which it stays still, acting like an anchor. Both America and the UK govt are able to manipulate and enter into different realities.
The various dimensions each comprise a complex pattern of interlocking wave-forms. Matter has been found to be only one wave of a pulse comprising a positive cycle, while the negative cycle manifests as 'anti-matter'. The 'matter' pulse brings something 'into' physical visibility, then it disappears momentarily and returns. But the pulses are so rapid we don't see something as unmanifest while temporarily dematerializing. Physical time is only measured by the visibility of something's aging process, or in other words its passage through a journey starting at one measured time-reference point to another. Different wave-forms only appear to us to be solid because we are comprised of the same matter. If the frequencies governing the time between a matter pulse and an anti-matter pulse are shortened or lengthened with technology, time will go faster or slower in the surrounding space or what it effects. Therefore scalar waves belong to space-time in which anti-matter or hyperspace exists. Time can be altered by harnessed and directed scalar waves (including magnets which give off scalar waves which bend time) because they disrupt the pulse of matter and anti-matter and therefore the rate at which something normally passes through time with its usual smoothness. An experiment with scalar waves in USA once caused all the clocks and watches in the test neighborhood to go berserk for 4 days, until the flow of time resettled back to its normal flow and they returned as before. This was noted by Frank Golden.
Scalar 'potentials' can be created artificially and when focused into a weapon, can do major damage to an object's location in space-time. That which determines the object's natural pulse of matter and anti-matter cycle can become stressed when targeted by scalar waves made of artificial potentials, because they are almost always absorbed by the nucleus of an atom, not the electrons in orbit. Hyperspace can become warped temporarily, although space-time naturally curves around natural vortexes the earth has which form 'chakras' to absorb and release universal energies. These are opened and closed in natural cycles according to the positions of the sun and moon in relation to earth. Because scalar waves are finer than gamma waves they can pass through any physical substance undetected. However the damage inflicted can be so powerful that they can dislodge an object right out of time and space and cause it to temporarily disappear away from its normal movement in time. All objects move in time, and they will also move in space if a physical external force activates the object's own natural internal scalar waves to point in the direction it is sent to causing it to move from A to B depending on how much force is used. Or they are trapped motionless in space by the internal scalar energy within swirling around interlocking into a deadlock, (making it appear still) however the object still moves in time. A beam of scalar energy can cause the timeframe the object resides in to get warped, making it disappear into another reality.
4. HOW DO SCALAR WEAPONS WORK?
Particles which are unorganized in hyperspace (potentials) can be harnessed into recreating multiple frequencies of scalar waves and these can now be manufactured artificially and can include frequencies between infrared and ultraviolet. If a transmitter is at a higher reference 'potential' than the interference zone of 2 crossed scalar beams, energy emerges into the plasma 'bottle' which materializes physically and this is called 'exothermic' mode. This can cause explosions and can be 'nuclear like' if set at a high frequency. Even though no electromagnetic energy has flown through space between the transmitters and the target, and because it has bypassed physical space, the energy can suddenly appear faster than the speed of light and destroy something without warning. It is only as a locked in artificial potential that is a directed 'river of force' in hyperspace and it is entirely undetectable with conventional scientific equipment, which is where the danger lies. Nobody can ever know what the enemy is planning or who their enemies are and because it never gets any press normal military personnel without this knowledge would never know what hit them, especially if it is scalar mind control. To extract energy back to the transmitters from the energy bottle of 2 crossed scalar beams the potential must be set at a lower mode and this is called 'endothermic' mode and as energy is extracted out of the 'bottle' area, a freezing will occur, possibly causing a thunderous sound.
When 2 transmitters send timed pulses, which meet, an explosion will occur which either produces energy or extracts it. If 2 crossed beams are in 'continuous' mode the energy between beams is continuous and Tesla globes and hemispheres can be made which act as a continuous shield to either destroy incoming weapons and aircraft entering it. If multiple frequencies are transmitted on the beams, at the intersection a 3 dimensional globe appears. This can be manipulated to have very high infolded energy with any desired light emission, shape, color or intensity. It can even cause metal to soften or melt. This 'bottle' of energy can be detonated inside the earth to create an earthquake or into a building to make a 'nuclear like' explosion. This 'bottle' can be moved anywhere on the planet or through it and made any size.
The Russians in 1985 once threatened the earth itself by activating their scalar weapons with multiple scalar transmitters turned on at once, endangering the survival of the entire planet. According to nuclear physicist Bearden, they conducted a massive, 'full up' scalar weapon systems and communications strategic exercise. During this sudden exercise American Frank Golden discovered the Russians activated 27 gigantic 'power taps', established by resonating the earth electrogravitationally on 54 powerful scalar frequencies (27 pairs where the two are separated from each other by 12 kHz.) transmitted into the earth and they utilized this to stimulate the earth into forced electrogravitational resonance on all 54 frequencies. Each of the 27 power taps extracted enormous energy from the molten core of the earth itself, and turning it into ordinary electrical power. Each giant tap is capable of powering 4 to 6 of the largest scalar EM howitzers possessed by Russia. Bearden writes: "Apparently over 100 giant scalar EM weapons were activated and a large number of command and control transmissions and it lasted several days. By alternating the potentials and loads of each of the two paired transmitters, electrical energy in enormous amounts can be extracted from the earth itself, fed by the 'giant cathode' that is the earth's molten core. Scalar EM command and control systems, including high data rate communications with underwater submarines, were also activated on a massive scale. The exercise went on for several days, as power taps were switched in and out, and command and control systems went up and down. Bearden claims not one American intelligence lab, or scientist detected this as they didn't have a detector for scalar EM radiation, and that not one officially believes that the exercise ever happened." However, it was monitored on an advanced, proprietary detection system by Frank Golden for several days and by Bearden for several hours.
This exercise proved Brezhnev's 1972 statement that by 1985 the Soviets would be prepared to do as they wish, anywhere in the world. The Soviets are using unknown attributes of matter, phenomena and laws of nature by research covering the equivalent of 7-8 U.S. atom bomb projects back to back already. However both America and Russia are doing through the earth scalar beam transmissions and ever since then earth's internal dynamo has been affected. It suddenly experienced a sudden unexpected slowdown in rotation 1984. It has become like an unbalanced washing machine, wobbling as it spins. Scalar waves pass naturally between the center of the earth and the sun, and this coupled with multiple annual nuclear tests (which have been proven to disturb the ionosphere and magnetic field) the balance of the earth with the moon, may even cause the earth to flip, if the naturally produced scalar waves are diverted onto another course, which are keeping the earth spinning harmoniously.
5. WHAT CAN SCALAR WEAPONS DO?
A Tesla shield protecting a military target could be made of three or more concentric shields, that would produce multiple electromagnetic pulse energy and severe heating of anything which enters it. These concentric Tesla shields can also clean up and sterilize any gamma radiation resulting from an explosion of a nuclear warhead. Nicola Tesla even in the 1920s could create a protective 3 dimensional 'shield' or 'dome' formed by 2 or more transmitters sending widened scalar beams linked together over a target in a hemisphere shape. Instead of causing the target to explode which narrow more intense crossed beams would, a wider more encompassing beam could form a large plasma shell outside something to be protected. This acted like an electrifying force field shaped like a dome, which could cause anything which entered it to have its technology dudded, (inoperative) make incoming aircraft pilots die by destroying their nervous system and/or make an incoming missile, aircraft or tank blow up.
Multiple layers could be nested made of different kinds of plasmas which would ensure nothing could penetrate a protected target's groundspace or airspace. The Russians can make a Tesla shield up to 200 miles wide. These large luminous plasma shields have been witnessed by sailors over the oceans from time to time, as various nations test their scalar weapons in secret. Tesla, as early as the 1920s created globes or bullets of plasma with crossed scalar beams sucking the energy out of the air space in a 'cold explosion' causing it to freeze, or sending extreme heat into it to burn as a very powerful laser beam. These powerful beams can also travel right through the earth and create an earthquake at the antipodes of the earth and Tesla also experimented doing this. Hyperspace flux energy (potentials) flows as waves in a sea of intense power in the next dimension unharnessed, however when energy is manufactured artificially it can be made into different modes e.g pulse mode, energy extraction mode or explosion mode. If 2 timed pulses meet, an explosion extraction makes a sharp cooling and all heated energy is extracted out of the air back to the transmitter. This can make everything and everyone frozen. It preserves machines and buildings but not people. If a burning energy is sent the target has a nuclear like 'detonation' because energy emerges to a target destroying the nucleus of the atoms. Multiple scalar wave modes and frequencies can also be blended together into one beam as well.
Tesla globes can be manipulated to be small or large in manifold kinds of energy frequencies and directed to a target by 2 or more far away scalar transmitters. Many intense frequency small globes can be directed towards multiple incoming targets, like cannonballs causing major explosions. Alternatively a larger less intense globe sent can cause the electrics to dud in a plane, helicopter or missile causing it to malfunction and crash land. This technology has been used many times to crash planes or helicopters by using a portable scalar bazooka carried by a hidden terrorist or soldier. The Vietnamese and Soviets used this technology in the Vietnam war against American aircraft. Many planes crashes with inexplicable causes can be traced to this. These Russian made portable bazookas were also used by the Serbs against American helicopters during the Bosnian war. The Soviets used scalar weapons against the Afghanistans during their war. One may wonder if this explains current American helicopter crashes in Afghanistan and Iraq.
Scalar waves can be used for impenetrable communication inside an ordinary carrier wave. Artificial potentials can be used for 2 way communication with submarines, aircraft and ships. Scalar waves can be used to tap into normal communications even when encrypted. They can even destroy the enemies equipment if they wish using lock-in mode to locate the source or just continue eavesdropping. radar invisibility can be done by putting multiple transmitters around something to make a spherical interference shell in the bandwidth of the searching radar. Nothing in the air is safe with scalar weapons or anything on the ground, because any building can be penetrated and the inside contents destroyed from either narrow or wide crossed beams. There is nowhere to hide. Scalar beams can be sent by aircraft or satellite or even from the government UFOs of Russia, Britain, Australia and America. They can be sent from the UFOs the Nazis developed secretly in Germany during WW2, and which were relocated to their underground bases in Antarctica and all over South America before the war ended.
6. SCALAR BEAMS AGAINST INDIVIDUALS
To totally destroy a person's nervous system and kill them instantaneously, a scalar weapon can be set on 'high intensity pulse mode'. This will destroy every living cell, bacteria and all germs so the body falls down like a limp rag, not even decaying in even 30-45 days. There is no living aspect left to decay. Entire groups of people can be killed this way even in a 50 mile radius on peak power. Scalar beams set on a lower power can render a person unconscious to be revived at a later date for interrogation. Crossed scalar beams can cover a whole range of targets from something right through the other side of the earth, to anything under the sea or ground. Not even metal will suffice to protect, as a metal softening mode can be deployed. Scalar beams can be put into X ray mode where a screen can show what is inside something, even under the sea and earth or inside buildings. This is called a remote viewing radar.
Anything in the sky can be instantly destroyed even from one country to another. All one country needs to destroy anything skybound in an enemy's country is to put 2 or more scalar transmitters forming a scalar wave-form interference grid whereby a shield is locked over a country in high intensity mode and this will cause anything which enters it to be destroyed. This can also destroy anything in the sea and detonate mines. The explosion shows up on the screen as a blossoming of the moving light on the square. The Russians mainly use their interference grids over the USA to control the weather moving hot or cold air where they can meet and create storms, hurricanes, torrential rain or droughts as they please.
Earthquakes can be created along with volcanoes erupting according to Tom Bearden. Moisture can be brought from the ocean and sent overland and cold air from the north sent south. Violent thunderstorms can be created. He also claims since 1989 the Japanese Yazuka and Aum sects lease scalar interferometers from the Russians to do weather engineering over the USA.
However America can fight back with their own scalar weapons. One can silently down passenger planes as need be by sending low frequency scalar beam to make the engine fail, either from the interference grid squares or from even portable shoulder scalar weapon bazookas which can be targeted at helicopters or any aircraft above. Surface naval vessels can be attacked through their hulls as well as ocean bottom mines detonated. Any aircraft, or land vessels including tanks can be fitted with portable scalar weapons. Though tanks can easily be destroyed with them.
Tom Bearden claims that the Soviets and Americans have been silently downing each other's aircraft since the 1980s. Soviet made scalar weapons downed American aircraft in Vietnam. Right from when USA put up their first satellites the Russians have been shooting them down in cloaked Russian made UFO's with scalar and particle beam weapons. Between 1977 and 1982 Russia shot down many US satellites. At that time they wanted complete control over the skies and had put up killer satellites complete with beam weapons to target US satellites and even the space shuttles. It has been claimed by Tom Bearden that all the early space shuttles were shot down by the Russians and duplicate shuttles were landed from another base. There was a mad rush by the US govt to develop beam weapons to defend themselves against the Russians and they did this eventually shooting down a couple of the Russian made UFOs containing beam weapons. Revenge silently followed by passenger planes of each other's countries being targeted.
7. SCALAR MIND CONTROL
In the early 1970's Hundreds of inmates at the Gunniston Facility of the Utah State Prison were subjected to scalar wave mind control. Inmates tried unsuccessfully to fight back in court. The University of Utah researched at that time how scalar waves could induce the mind into hearing voices, overriding and implanting thoughts into the mind, as well as reading the thoughts. They also developed eye implants. In 1998 scalar waves were used to test subliminal voices in the head in 2 Utah prisons. In Draper Prison, Utah a man called David Fratus in 1988 claimed voices in his inner ears were induced in him as clear as if listening to a set of stereo headphones. The mind control victims of US govt implants are also subjected to artificial voices in the head which are sent on scalar beam by satellite and and the HAARP transmitters and relayed to the GWEN Towers placed approximately every 200 miles across USA. Many of the messages relayed into these American mind control victims are said to come from aliens, with a 'message for mankind'. These 'alien messages' were first given to the prisoners in Utah and they all got the same messages.
The Russians, having a head start on decoding the brain can send subliminal messages by satellite over whole countries in their own languages, in scalar waves so subtle that the victims think they are their own thoughts occurring. They could make people think "God" is speaking to them and can also give people suicidal thoughts. There is a suicide wavelength. The Russians and Israelis have been said to do this on mind control data websites.
As well, the Americans have been using these subliminals to give 'voices in the head' messages (which includes to those with CIA or military controlled implants) that are supposedly from 'aliens' or "The Holy Spirit" to say e.g. the Second Coming will be here soon or earth needs to be evacuated and the person has been 'chosen'. Only certain people can pick this up according to whether they have implants (which relay messages into the head) or if they are --natural telepathics--. The mineral --selenium-- when ingested beyond normal levels is said to increase the capacity to hear voices in the head. Though certain races have a higher hearing threshold and are able to pick up synthetic telepathy sent through the atmosphere more than others.
Russia's scalar transmitters are called "Woodpeckers" because of the woodpecker type tapping transmissions detected from them on the radio band. They have the technology to send subliminals right into a person's subconscious, bypassing the brain and could drastically influence the thoughts, vision, physical functioning, emotions and conscious state of a person by sending in subliminal signals even from a great distance. In the late 1960s the Soviets broke the genetic code of the human brain. It had 44 digits or less and employed 22 frequency bands across nearly the whole EM spectrum. But only 11 of the frequency bands were independent. The Soviets found they could make a person do something just by sending subliminals into the body, bypassing the ears.
Up to 16 of the Russian Woodpecker scalar transmitters have been observed to carry a common phase-locked 10 Hz modulation. 10 Hz is used to put people into a hypnotic state. The Russians can manipulate the moods of everyone in a 75 mile radius, with a circularly polarized antenna, and people's bodies have been shown to pick up the "new" mode of expression. Even "sleep" frequency will make everyone tired and fall asleep.
8. AMERICA'S 'NO CONTACT' MASS MIND CONTROLLING NETWORK
According to the book Project L.U.C.I.D by Texe Marrs, John St Clair Akwei claims that the US National Security Agency (NSA) has had the most advanced computers in the world since the 1960's. The Signals Intelligence (SIGINT) mission of the NSA uses scalar waves for blanket coverage of the USA and can wirelessly tap into any computer in the USA and read the contents. As well as track people by the electrical currents in their bodies, which emanates a particular 'signature frequency'. This is possible because everything in the environment gives off scalar waves at right angle rotations off the normal electromagnetic wave. These can be searched for and tracked and are not subject to constraints of time and space. A person's frequency can be stored on a supercomputer and this can be tracked anywhere. They can be sent subliminal words sent in scalar waves which are so subtle that the person will think they are their own thoughts. Also NSA uses a secret program (developed since the MKULTRA mind control program of the 1950s) what is called "Radiation Intelligence". Scientific research from this is withheld from the public and there are international intelligence agreements to keep this technology secret. Using this technology the NSA records and decodes individual brain maps of hundreds of thousands of people for national security purposes. It is also used secretly by the military for a brain-to-computer link. Activity in the speech center of the brain can be translated into the subject's verbal thoughts and can also show up activity from their visual cortex on a video monitor. NSA operatives can see what the subject is seeing. Visual memory can also be seen and the NSA can place images directly into the visual cortex, bypassing the eyes and the optic nerves.
When a target sleeps secretly images can be installed into the brain during REM sleep for brain-programming purposes. Speech, 3D sound, and subliminal audio can also be sent to the auditory cortex of the brain, bypassing the ears. This "Remote Neural Monitoring" (RNM) can completely alter a subjects perceptions, moods and motor control. Different brainwave frequencies are connected with various parts of the body and when the right frequency to activate a section of the body is sent a person is powerless to stop it. Pain can be induced in mind control victims this way by targeting a section of the body. This has been spoken of by many mind control victims, accompanied by 'voices in the head' by the operators cruelly asking if it hurt and all done remotely without any physical contact with the victim. There has been a SIGINT wireless scalar wave brain monitoring network in the US since the 1940s according to John St Clair Akwei. He tells us how it is done with digitally decoding the evoked 'potentials' (see first section for more on potentials) in the 30-50Hz, 5 milliwatt electromagnetic emissions from the brain. In these emissions spikes and patterns show as evoked potentials. "Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding "evoked potential" or set of "evoked potentials". These can be decoded into the current thoughts, images and sounds going on in a target's brain. When complexly coded signals are sent to a victim, bypassing the eyes, optic nerves and ears, the faint images appear as floating 2D screens in the brain. Auditory hallucinations can be induced, creating paranoid schizophrenia.
The frequency the brain areas respond to are from 3 Hz to 50 Hz. For each brain area these are used: Brain Area: Bioelectric Resonance Frequency: Information Induced Through Modulation. Motor control cortex: 10 Hz: Motor impulse coordination Auditory cortex: 15 Hz: Sound which bypasses the ears Visual cortex: 25 Hz: Images in the brain, bypassing the eyes Somasensory: 9 Hz: Phantom touch sense Thought center: 20Hz: Imposed subconscious thoughts Only the NSA modulates this signal band into evoked potentials or scalar carriers. There are about 100 people working 24 hrs a day for the NSA at Ft Meade on this "Remote Neural Monitoring" (RNM). John St Clair Akwei, after being harassed by this NSA technology brought a lawsuit against the NSA. During the lawsuit process he was harassed by 3D sound, and his associates were also harassed to keep him isolated. No action was taken against the NSA in the 1991 lawsuit.
In short, ETs communicated with us via modulated radio-waves, between 10,000 and 20,000 cycles below the known electromagnetic-spectrum. In the carrier-wave by amplitude modulation, mixed with frequency modulation. Single band energy, transmission power less than 25 watts. A naturally present wave on earth the brain modulated - a wave that resonates between the earth and the ionosphere. All humans influence the ionosphere in this manner. A reflecting technique involved. The brain modulation consisted of pulses, akin to those known from neuro pulses. Two humans can use this. Related to something akin to low frequency radar and to ultrasonic techniques but qualified. A mixed electro-acoustic wave function. The electromagnetic-wave induced an ultrasonic transduction in human tissue. The brain radiation has a sonic component to it as well as an electromagnetic component. Electromagnetic-radiation has a sonic component and it's dependent on the medium through which it travels. The scientist cut through months of work. Now HAARP is slicing up the ionosphere, the world-brain, like a microwave knife, producing long tear incisions destroying the membrane which holds the reservoir of data accumulated by all earth's history. HAARP has already punched 360 x 30 miles holes in the ionosphere.
9. INDUCING DISEASES WITH SCALAR WAVES
Tom Bearden also writes that a more advanced form of scalar weapon is known as a 'quantum potential' weapon has been developed by US, Russia, China, Israel and possibly Brazil . These weapons mimic the signature or frequency of a disease by recreating them on scalar carriers. Also any disease can be imprinted onto our cellular system using frequencies ranging from ---Classified--. Whole populations can have new diseases and death induced as well as latent diseases being activated with quantum potential diseases in targeted areas. Manufactured symptoms of radiation poisoning, chemical poisoning, bacterial infection and even the effects of many kinds of drugs including hallucinogenic ones can be induced with these very subtle scalar waves which flow in hyperspace or the sea of ether. They become imbedded right into the immune system or etheric counterpart of the physical body.
On the www.freedomdomain.com site a man called Kaznacheyev found that the induction of diseases could be effected by the Woodpecker scalar transmitters in the near ultraviolet range. Experiments at the University of Marburg in West Germany duplicated these disease inducing scalar wave experiments in infrared. Dr Popp of West Germany, after analyzing the virtual photon master control system of the cells found that scalar virtual particle flux which determines the genetic blueprint pattern of the cells can be easily entered with scalar techniques to induce disease and cell disorder at will.
10 . TESLA'S SCALAR WAVE TECHNOLOGY WAS SECRETLY CONTINUED BY RUSSIA AND THE NAZIS
While the American government rejected Tesla's energy without wires and left him penniless, Russia and Germany asked Tesla to work for them. He turned them down, but according to Preston Nichols he faked his death in 1943 and was spirited away to the UK. From then on it was a frenzied battle between the Soviets and Germany to develop scalar technology. Russia got a head start in learning how scalar waves can be drawn from hyperspace by sending an agent to seek out a man in Utah who built a machine for doing this Utah. A Soviet agent destroyed the device after learning how the machine operated.
11. IS THERE A SECRET WAR GOING IN THE SKIES?
Japan now has scalar weapons and has got together with Russia to develop them. In 1991, according to Harry Mason, Russian President Gorbechev offered to lease the Japanese the super-secret intercontinental scalar weapons, capable of producing earthquakes for $900 million, which they'd used in the Soviet Union since the 1960's. Tom Bearden also claims they leased them in 1989. A Joint Russian-Japanese university was set up to develop new weapons with Japanese microchips to overpower the US and jointly rule the world. After Tesla "died" in 1943, his papers were sent to a Tesla Museum in Yugoslavia, where the Japanese obtained the knowledge of Tesla technology. The scalar weapons were developed by a Japanese scientist an IQ higher than Einstein.They too, like the Americans tested their scalar weapons in the outback of Western Australia, possibly using a base in Antarctica in which to send scalar waves to their Australian transmitter to produce earthquakes and Tesla globes. The Japanese scalar scientists are tied up with various cults and feel that the Japanese emperor should rule the planet, as well as having a policy of exacting revenge on former enemies culminating in a "Final War" against the Christian west and Islamic world. It is the Japanese Aum sect and Yakuza mafia who are still leasing the Russian scalar transmitters and have steadily used them for weather engineering over America since the nineties for target practice. Bearden claims that the Japanese may be allowed by the Russians to down planes now and then. The Japanese cult members in their govt are also tied up with North Korean cult members. The Russians have been weather engineering over America since the 1960's using their interference grid to target specific areas.
12. WHO ELSE IS CONTINUING TESLA'S SCALAR TECHNOLOGY?
Unlike Western universities, Eastern Europe and Russia have always included Tesla's scalar wave research openly in their curriculum and so they got a head start with multiple facilities built all over the Soviet Union to build scalar weapon transmitters starting from the 1950's. America, even though they had Nazi scientists working for them after the war at Area 51 on anti-gravity, didn't realize how advanced the Soviets had become with scalar technology until they found out they'd been secretly attacked during the 1950's undetected. In 1960 the Soviet premier Kruschev announced to the world, that they had "superweapons". In 1963 they deliberately destroyed a US atomic submarine undersea by Puerto Rico with scalar weapons. They next day over the Puerto Rico Trench the Soviets used scalar weapons in a different mode to produce a giant underwater explosion. US was defenseless against an unknown type of weapon. In 1965 the Great Sandy Desert in Western Australia was mapped out and chosen by the US govt to begin scalar weapons testing. Even though 'officially' Tesla's papers were kept by the FBI after he died and were labeled 'top secret', lest they get into the hands of the enemy, Tesla had passed all his knowledge and research onto a young American physicist 2 weeks before he died in 1943. The US military in Western Australia tested crossed scalar beams aimed into the ground to create earthquakes on a target map of squares and also created Tesla globes from crossed scalar beams in the sky. Pine Gap the secret underground American military base has 2 scalar transmitters and they also have at least another in Exmouth, N Western Australia. Other American scalar transmitters besides various ones all over USA are at Alaska, Puerto Rico, Greenland, Norway and Antarctica.
Though many countries have scalar weapons now, other countries could easily be a target of those with scalar weapons and never know what was the cause of their explosions, mind control or possible weather engineering. So of course more and more countries are getting the scalar technology needing it to defend themselves as well and this keeps getting passed on especially by the Russians. The other thing is one may know it is a scalar attack but have no idea who did it. The known countries which have scalar weapons are: America, Russia, France, Australia, Germany, Japan, China, Taiwan, South Africa, Israel, Brazil, UK and Argentina as well as various populations of Nazis still operating in Antarctica and all over South America. It is unknown how Brazilians got scalar weapons and quantum potential weapons, but the Brazilians have had alien technology for some time and also the Vatican has covert technology and has been said to have a base for this in Sth America for their secret space program. There is extensive coverage of Brazil's space program in my 40 page article "Scalar Weapons: Read it and Weep" in Vol 3 of the www.theuniversalseduction.com book series. This covers China and Japan's weapons as well as extensive coverage of Russia's attacks on America, especially the space shuttles and the technology of the Nazis in Antarctica. Others may have them such as Ukraine and Nth Korea but as yet no proof exists for these countries. Even in the alternative press not enough has been said about scalar weapons to the extent where normal conspiracy researchers and writers are as familiar with their dangers as they should be because even online they hardly get a mention on conspiracy sites. Yet they are probably the most life threatening thing on the planet.
Tuesday, September 18, 2012
Gang Stalking Help!!
Surviving Remote Neural Monitoring
As i was searching the internet looking for more information on these attacks i stumbled upon a comment from a kind soul who gave us all very useful information which is being re-posted here. I suggest you study the following information as it may help you look past their "Illusions" or "BS". I hope this helps you fight these attacks and build an inmune system to them.
(This information was gathered on the internet and i do not own rights to it)
I'm reposting this here because I believe it will be useful to anyone who is experiencing these attacks. Yes they are attempting to read your thoughts and you can limit both their ability to manipulate you as well as their system's ability to translate your thoughts if you're fully aware of its influence on you. Note that none of this is speculative. By possibility I simply mean that those reading may or not have experienced a specific method of attack but there appears to be common intent and centralization.
At this point everyone should see that I'm pressing for targets who are experiencing audible harassment and/or directed energy attacks to pay attention to what I've described as an integrated system which is being used to monitor our thoughts and behavior, then use the collected data to trigger attacks which will allow these terrorists to directly manipulate our behavior, injure us, impede or induce biological function, or flood us with abusive input resulting in daily psychological torture.
I would like to bring to your attention the possibility that your daily motives and emotional perceptions are being altered by this 'system.' As I mentioned in previous posts these people will pretend to be investigators and harass you in a manner which to an unknowing person may seem to have reasons based on some past event(s) related to this person when the accusations and information/images are completely fabricated by their system.
What these people are doing to you has nothing to do with investigation (obviously) and their system has no forensic capability whatsoever other than retrieving mostly erroneous data collected during the monitoring period so keep this in mind when they try to pretend they've been monitoring you for your entire life or that there has been some ongoing investigation which has been open since some date which will change every time you point out that they're full of s***. The system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references. Once they have consistent statistics the system will use previous 'references' and inject them into your subconscious thought during normal activity in conjunction with what I have previously described as 'impulse injection' to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action. You can fight and/or control this if you learn to defeat the memory attacks as I have mentioned in the post titled "Doing something about it".
Once they see what you respond to emotionally they will fabricate 'conversational' scenarios based on events or topics they know will capture your attention enough to distract you from the system's influence. Everything these people say to you is a lie and they really don't care about truth or accuracy - their intent is to manipulate your behavior for reasons you will never be able to determine. They will constantly run you through a 'verification' routine where the system probes you for a particular set of responses repeatedly. If you are interacting and countering these probes the operator will vary the routine in an attempt to 'verify' via different methods. Once the system 'verifies' the selected responses they will be used in the next wave of harassment routines - the process is endless and you will see the effects clearly if you are consistently defeating the system.
They will try to give you the impression that you are being evaluated based on random criteria related to your personal goals and begin running a routine which will again use the above mentioned methods of injection and blocking to convince you that you that they are erasing and/or controlling your mind/memory when in reality the system is controlling the 'fabricated or falsified stream' while interfering with [overriding] your recollection. Once you become dependant on the system's output (or they believe your responses to it are consistent) they will begin to fabricate 'subconscious responses' which they will pretend are indicators of honesty/dishonesty, positive recognition, anxiety, etc, and they will use 'impulse injection' to convince you that the fabricated responses are your own. If you are unaware of this constant manipulation the system will begin to shape your thoughts and behavior. They will use this to [attempt to] restrict your thoughts and behavior by blocking [interfering with] your memory while these suggestions are being provided - the interference is triggered and can be activated at will by the attackers. Again if you learn to defeat the memory attacks as mentioned previously you can not only see through the system's attempts to manipulate but also manage their ability to evaluate your responses by controlling the verification process, work through the 'memory blocks,' and counter the system's ability to influence your choices. It will begin to feel as though you are thinking in two 'threads.'
None of what these people are collecting could ever be used in a case against you. Every piece of information collected by their system can be considered falsified and/or fabricated because the system is designed to continuously provide 'suggestions' according to data which has been previously collected about your current activity and the accuracy of the reference descriptions [definitions] is extremely low since the attackers don't really care about truth and the system will fabricate statements and/or imagery while they are abusing you. The fabrications are generally the result of misinterpretation of references and emotional indicators as well as distortion of 'injection feedback' in addition to false entries added manually by the attackers as a result of their inability to understand what they are viewing or their malintent. There is no reliable way for the attackers to determine what is true even if they try to apply their observations to the aforementioned indicators. An attempt to prove guilt with their system would be the equivalent to a cop dropping a gun at a crime scene and claiming it belonged some individual who happened to be passing by - RANDOM and FALSIFIED. There is no legal application for this system or anything generated by it. They will only capture what they want to abuse you with and when they decide to 'censor' your thoughts they will force you into an abusive or incoherent thought pattern using the injection and blocking methods mentioned above. You can limit and counter this effect by learning to read memory while blocking their system however it takes quite a bit of skill and self-awareness. I have described this as 'quenching' in a previous post. If you can do this their attacks will simply be an annoyance to you as you can work around it, but it will still hinder performance tremendously as you will be forced to test and validate memory constantly and the physical sensations of the system radiating your brain will be both irritating and distracting. Note that these attacks can be performed successfully at lower intensities and you will only notice them in you are frequently testing. I believe the attackers raise the intensity simply out of incompetence or malicious intent since they obviously dont comprehend the values of stealth.
Understanding the memory attacks are key because if you do not recognize modification of your 'active memory' the system will cause you to briefly lose time perception which may be enough *procedural [functional] disorientation to influence you to respond to an injected impulse. Forced speech for example. It is possible for the system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example if you are susceptible to the systems influences you may not realize the it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline] to perform the tasks it is influencing you to do. Now in combination with this motivation to speak the system uses past references to direct you - for example you personal memory of turning to speak to your wife and the associated impulse - and when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system's control. They will test this on you frequently with 'word substitution' and if you can learn to control this in thought then you can control it while speaking but you must learn to multitask constantly! If you do not have a 'working state reference' to return to after this attack it is possible that you will have no recollection of making the statement.
*i chose to describe this as 'procedural' because these attacks are most effective when you are stepping through sequenced tasks so try to avoid 'zoning' on your activities.
This same attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.
The goals of these attacks appear to be Censorship, Memory Management, and Direct Behavior Control, however these people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they negate it and torture you nightly.
If you keep a constant handle on your 'state of activity' as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state. Unless you have been tortured to near-incoherency you should be able to fight the system's influences.
What these people do is purely deceptive, there is no valid or even good reason for any of it. Do not allow them to deter or manipulate you for any reason.
If anyone has read my other posts they already know my belief and position on what they're doing and how to respond. Yes they can read your memory references remotely as well as your emotional states. One thing I neglected to mention in the post abour neural manipulation is that their system's ability to interpret your thoughts is wholely dependant on its ability to predict and influence your 'reference' choices or impulse sequencing during thought composition. The system maps patterns with impulses and identifiers and uses statistical data about your 'composition habits' to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system's ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers' ability to make sense of what they see visually or what they can guess based on your past activity. In some cases they may not even care and will simply fill in nonsense which is counterproductive on their part because the nonsense will invalidate prediction or translation of future activity related to the 'mislabeled' references.
As you learn to defeat the predictive capabilities of the system the attempts to restrict your reference choices will become increasingly evident and you will begin to perceive what I will describe as 'functional duality' [it might also be described as focal duality] within your working memory. The system's prediction error rate will dramatically increase and its attempts to predict your thoughts or intentions will become humorous if not simply annoying. Seeing the relationship between your memory references and the systems output [which can be a specific directed energy attack, an audible sequence, or 'change of mode'] is critical to understanding how to control and ultimately defeat 'thought-tiggered' attacks in addition to preventing the attackers from deceiving you with their cognitive magic tricks. You should be able to redirect the system during formulation or prevent 'predictive integration' altogether but when you learn to stop integration, realize that the system will be waiting for completion and will 'probe' you for a response. It will begin to 'inject' if you attempt to ignore it so unless you have extremely high memory skill and have learned the 'quenching' technique, redirection may be the easiest option. They will also abuse you in every way possible to convince you that they're in control when you will be able to see clearly that they are nothing more than idiots who need to spend more time studying the systems they are abusing people with.
If the system's suggestions are not acceptable to you [and they won't be if you're consistently blocking and/or redirecting it] then this will result in you making a continuous effort to counter the imposition of thoughts and impulses while contrasting your 'working state' to maintain active focus. Although by cooperating and allowing the system to interpret and define your daily activity you may find that the suggestions become more tolerable as the system is designed to mimic your normal cognitive behavior, I would recommend not allowing this as you will tend to more readily accept the system's influence, and the purpose of the system influencing you in this manner is to give the attackers the ability to restrict you at will and to allow them to deceive or manipulate you subconsciously. You can only counter these restrictions if you are able to contrast the system's influence from your own willful activity. Everyone who is hearing "V2K" is being monitored in this manner and very probably being influenced as well. The phrases you are hearing should be related to information captured during the 'silent monitoring period' and will eventually be used as the foundation for your endless verbal harassment.
What they do is a game of deception and manipulation, nothing more. Do not accept anything they say as truth and do not acknowledge anything the system interrogates you about as truth. The system will take random bits of anything it captures through your senses and fabricate stories which they will use to harass and interrogate you with no intention other than to distract and torture you into submission [to the system's influence].
A poster at FFCHS mentioned 'Brain Fingerprinting' in response to one of my posts regarding neural monitoring and the method descriptions definitely match some of what these attackers have done to me. If you learn to defeat the memory attacks I have described above then you can render 'Brain Fingerprinting' useless or manipulate it to your advantage.
As I write these idiots continue attacking me. We need to consider the potential future (or classified current) applications of the systems which are being used to atttack us. I am at least 99% positive that the system I have described is the heart of their operation and I intend to drive a stake through that heart by showing those who are responsible for the development and deployment of that system that unwarranted torture and manipulation are not gainful uses for their system and that the idiots attacking us are simply wasting their resources and undermining our government.
We have a war on our hands. These people are trying to use this system to convince people to accept the influences of this system by injecting subliminal impulses which will coerce people who are unaware to behave in accordance with the attackers' will. With correctional and investigative applications on the horizon we cannot allow these methods to become a standard. The validation error rates are phenominal [meaning the system couldn't detect truth even if the victim told the interrogator repeatedly] and the system is mainly designed to manipulate rather than detect therefore interrogators who are unaware of the depth of the system's manipulative features may not realize that the system is generating the response characteristics which might be attributed to a suspect's habitual or subconscious behavior. This may result in waves of false trials and convictions and permit attackers to falsify test results and testimony in a way that the legal system is not designed to detect or accommodate.
We cannot allow this to be ignored any longer.
NSA Mind Programming
NSA Mind Programming
Information taken from http://www.whale.to/b/nsa4.html#5. Stage 1 (Prescreen Evaluation):
1. INTRODUCTION:
1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA's Behavioral Modification Procedure Outline documented for the non-technical person.
2. TECHNOLOGY TITLE:
1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. "Computer Simulated Subconscious Speech Language".
3. APPLICATIONS:
1. Intelligence:
1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen's opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.
2. Counterintelligence:
1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).
3. Behavior Modification and Accelerated Resocialization:
1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.
2. The NSA uses this technology to resocialize (brainwash) the US civilian voting population into "Giving their lives to Christ" (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a "Personal Relationship with Jesus Christ" (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.
4. DEFINITIONS AND ACRONYMS:
1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.
2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic suggestion.
3. NSA: United States National Security Agency, Fort Mead, Maryland.
4. ODO: On-Duty Officer, or officer-on-duty.
5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term "Command" is more commonly used when the hypnosis is forcibly given to the subject and when the subject's will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index
increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the "Suggestion" any longer thereby making it a "Command".
6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.
7. Posthypnotic Suggestibility Index: An index or rating of a subject's susceptibility and sensitivity to hypnosis.
8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.
9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;
(1) an identifier (subject's name, description, or other identifying factor),
(2) trigger activation condition or conditions (when, what or how the suggestion will trigger),
(3) the content (what the trigger will precipitate in the perception of the subject),
(4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to "strengthen" or reinforce the central posthypnotic command.
10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.
11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject's subconscious mind.
12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject's site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.
5. TECHNOLOGY OVERVIEW:
1. In addition to the ability to see and hear what is going on inside people's homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.
2. Thought Labels (Response Labels):
1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or "read minds" so to speak.
2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation "thought labels".
3. Post-Hypnotic Delivery Method:
1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. "How can hypnosis be used?" you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words "Drink Coca Cola" were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.
2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting "sped-up" script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions.
1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA's Behavioral Modification Procedure Outline documented for the non-technical person.
2. TECHNOLOGY TITLE:
1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. "Computer Simulated Subconscious Speech Language".
3. APPLICATIONS:
1. Intelligence:
1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen's opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.
2. Counterintelligence:
1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).
3. Behavior Modification and Accelerated Resocialization:
1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.
2. The NSA uses this technology to resocialize (brainwash) the US civilian voting population into "Giving their lives to Christ" (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a "Personal Relationship with Jesus Christ" (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.
4. DEFINITIONS AND ACRONYMS:
1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.
2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic suggestion.
3. NSA: United States National Security Agency, Fort Mead, Maryland.
4. ODO: On-Duty Officer, or officer-on-duty.
5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term "Command" is more commonly used when the hypnosis is forcibly given to the subject and when the subject's will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index
increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the "Suggestion" any longer thereby making it a "Command".
6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.
7. Posthypnotic Suggestibility Index: An index or rating of a subject's susceptibility and sensitivity to hypnosis.
8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.
9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;
(1) an identifier (subject's name, description, or other identifying factor),
(2) trigger activation condition or conditions (when, what or how the suggestion will trigger),
(3) the content (what the trigger will precipitate in the perception of the subject),
(4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to "strengthen" or reinforce the central posthypnotic command.
10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.
11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject's subconscious mind.
12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject's site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.
5. TECHNOLOGY OVERVIEW:
1. In addition to the ability to see and hear what is going on inside people's homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.
2. Thought Labels (Response Labels):
1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or "read minds" so to speak.
2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation "thought labels".
3. Post-Hypnotic Delivery Method:
1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. "How can hypnosis be used?" you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words "Drink Coca Cola" were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.
2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting "sped-up" script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions.
The empty space
between words is minimized and pitch rise is compressed and filtered.
Repetitive sine waves are also removed from the phonetic element's
acoustic wave train thus reducing the actual number of sine waves
making up a word by 50% or more. This reduces the actual length of the
time it takes the phoneme to be delivered prior to accelerating
(speeding-up) the delivery (like fast forward). This helps the message
to be played at higher speeds and reduces the subject's ability to
recognize it as accelerated speech. The technique of using optimized
digitally sampled and edited phonemes appended together to for words
and then sentences structured as hypnotic suggestions can be termed
"computer simulated subconscious speech language".
4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many "subliminal tapes" on the market to program your subconscious mind. These tapes have their "messages" recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won't hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA's high-speed audio subliminal message.
5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA's message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the "posthypnotic" script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:
1. Professional state-of-the-art technology recording equipment.
2. Digital acoustic wave editing equipment.
3. Advanced engineering knowledge of acoustic wave science.
4. Phonetics and linguistics expertise.
5. Hypnosis theory and scripting.
6. Ideal environmental conditions for recording.
7. NSA ignorance of the subject's intent and ability to capture a message.
6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can "program" or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.
4. Using the Post-Hypnotic Delivery Method with Thought Labels:
1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be "Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice." From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever:
1) cheated on your taxes, and:
2) If the IRS could catch you in an audit.
2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book "1984". As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.
3. The NSA's goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a "voice print" from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.
4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many "subliminal tapes" on the market to program your subconscious mind. These tapes have their "messages" recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won't hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA's high-speed audio subliminal message.
5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA's message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the "posthypnotic" script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:
1. Professional state-of-the-art technology recording equipment.
2. Digital acoustic wave editing equipment.
3. Advanced engineering knowledge of acoustic wave science.
4. Phonetics and linguistics expertise.
5. Hypnosis theory and scripting.
6. Ideal environmental conditions for recording.
7. NSA ignorance of the subject's intent and ability to capture a message.
6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can "program" or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.
4. Using the Post-Hypnotic Delivery Method with Thought Labels:
1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be "Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice." From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever:
1) cheated on your taxes, and:
2) If the IRS could catch you in an audit.
2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book "1984". As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.
3. The NSA's goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a "voice print" from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.
If the person is aware
that the NSA has this capability and remains silent, the NSA can
transmit a periodic worldwide subliminal message that addresses the
person by name and causes them to dream and talk in their sleep. After
the person talks, the voiceprint would be eventually identified and the
person's location can be identified nearly anywhere in the world. Yes,
it is a small world, and getting smaller all the time.
4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950's and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.
4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950's and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.
Originally, after
noting the behavioral effects in visual subliminal effects like the
highly publicized event where stating "Drink Coca Cola" on a single
movie frame "delivered a higher rates of speed than normal movie
viewing raised the obvious question, "Does the human hearing work as
good as eyesight accepting subliminal messages?"
Preliminary theory
work was transferred to Fort Mead NSA who had expertise in
characterizing language in analog domains where a sampled phoneme could
be edited (shortened by removing excess sine waveforms from the
"acoustic wavetrain") and electronically reconstructed back into
shortened words of language.
Some of the early
experiments included "Remote Viewing at NSA where the Viewer would
relax, open their mind and explain the clarity of images that were
described by the NSA using this technology. These early experiments
allowed the NSA to refine the specifications of the "Computer Simulated
Subconscious Speech Language" and the scripting formats to maximize
the ability to deliver an accurate "vision or picture" into the subject.
Pictures already seen by the subject could simply be recalled using
"Age regression" script variations.
6. OTHER REFERENCE MATERIAL:
1. Please refer to the book "Inside America's Most Secret Agency, The Puzzle Palace" by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA's history and the NSA's first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.
7. NSA CASE HISTORY EXAMPLE SUMMARIES:
NSA Self-Initiated Execution (Suicide):
1. Bamford's "The Puzzle Palace" references one of the NSA's first self-initiated execution (suicide) with this "Thought Control" technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.
6. OTHER REFERENCE MATERIAL:
1. Please refer to the book "Inside America's Most Secret Agency, The Puzzle Palace" by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA's history and the NSA's first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.
7. NSA CASE HISTORY EXAMPLE SUMMARIES:
NSA Self-Initiated Execution (Suicide):
1. Bamford's "The Puzzle Palace" references one of the NSA's first self-initiated execution (suicide) with this "Thought Control" technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.
2. NSA Initiated Execution to Cover-up in the News:
1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could "read minds" and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news "The gunman was demanding to talk with the Director of the CIA" etc. disappeared quickly (suppressed?) from later news accounts.
3. NSA Initiated Execution to Cover-up in Music:
1. Curt Cobain of the musical group "Nirvana" was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the "Friends inside his head". Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.
4. NSA Initiated Executions in Overseas Defense Project:
1. Some years back several employees of the United Kingdom's Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not "Staged" suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.
5. Musical references of NSA Technology:
1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA's brainwashing technology in a song called "Wild Wild Life". The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that "They (NSA) talk so fastà " and that the musical group had spent "All their time and money" unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.
6. NSA Counterintelligence Experiments:
1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.
2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA's behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn't figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.
3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject's health degraded.
4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for "God" to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, "God spoke to them and said to commit suicide" and they did securing another one of the NSA's great experiments in mind control and social pathology.
5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA's technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.
7. The cases of NSA activities go on and on. With access to the FBI's Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their "Thought Control" technology.
8. Currently, the NSA has many subjects in the field (our society) that need only a series of "triggers" (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them "Shooters on a Shelf". A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that "someone" (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.
9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have "Friends inside their heads" also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency's Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.
2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called "reborn" by the church, with the subject's life-long goal of "a personal relationship with Jesus Christ".
1. ABSTRACT, Behavioral Modification:
1. The NSA's behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject's net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject's posthypnotic suggestibility index, the subject's intelligence and reasoning ability, moral and superstitious beliefs, and the subject's social status and the weakness of the subject's primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.
2. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject's will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.
3. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject's neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of "Implants" in their body.
1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could "read minds" and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news "The gunman was demanding to talk with the Director of the CIA" etc. disappeared quickly (suppressed?) from later news accounts.
3. NSA Initiated Execution to Cover-up in Music:
1. Curt Cobain of the musical group "Nirvana" was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the "Friends inside his head". Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.
4. NSA Initiated Executions in Overseas Defense Project:
1. Some years back several employees of the United Kingdom's Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not "Staged" suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.
5. Musical references of NSA Technology:
1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA's brainwashing technology in a song called "Wild Wild Life". The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that "They (NSA) talk so fastà " and that the musical group had spent "All their time and money" unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.
6. NSA Counterintelligence Experiments:
1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.
2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA's behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn't figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.
3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject's health degraded.
4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for "God" to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, "God spoke to them and said to commit suicide" and they did securing another one of the NSA's great experiments in mind control and social pathology.
5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA's technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.
7. The cases of NSA activities go on and on. With access to the FBI's Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their "Thought Control" technology.
8. Currently, the NSA has many subjects in the field (our society) that need only a series of "triggers" (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them "Shooters on a Shelf". A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that "someone" (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.
9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have "Friends inside their heads" also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency's Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.
2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called "reborn" by the church, with the subject's life-long goal of "a personal relationship with Jesus Christ".
1. ABSTRACT, Behavioral Modification:
1. The NSA's behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject's net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject's posthypnotic suggestibility index, the subject's intelligence and reasoning ability, moral and superstitious beliefs, and the subject's social status and the weakness of the subject's primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.
2. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject's will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.
3. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject's neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of "Implants" in their body.
It is important for
the subjects to understand that the NSA controls this technology from
nuclear hardened underground shelters and the neighbors next door have
nothing to do with the subject's experiences. Nobody has the time or
inclination to follow a subject around with a microwave gun to tickle
various parts of the body. We are saturated with microwaves all the
time from television stations, communication satellites, etc and yet we
do not have any symptoms because microwaves do not have the ability to
trigger localized synaptic responses in our brains. Furthermore, when
the subject is in a room surrounded by several people, and the subject
is the only one experiencing the "thoughts", tingling feelings, etc.,
then obviously a delivery method is being employed that affects only
the subject; high-speed acoustic delivered hypnosis.
4. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow "God or Jesus to speak directly to the subject" and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA's technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and "Gives their Life to Christ" and the NSA achieves total control of the subject.
5. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as "God and Jesus works in their life". Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).
6. The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA's electronic surveillance system captures and sorts the prayers by "Keywords". The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to "God's will". If the subject resist's the NSA's instructions, additional punishments are inflicted on the subject.
7. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other "Christians" to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject's problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).
8. A subject that has successfully completed the NSA's behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject's lives are relatively unproductive because their focus is on their "Life after death" and not what they accomplish while they are alive. They avoid "worldly activities", and usually are confused and disjointed in rational thoughts and concepts. For instance, they don't believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.
3. BEHAVIORAL MODIFICATION PROCESS:
1. Triggering Techniques:
1. The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.
2. Real-Time Subconscious Implant Delivery:
1. Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject's response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a "voice" heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA's activities.
3. Prescheduled Subconscious Implant Delivery:
The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script's transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can't be associated with a commonly recurring situation like event-triggered scripts precipitate.
4. Event-Triggered (conditional) Implant Delivery:
1. Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.
2. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to "script" and use them.
3. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want's to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject's behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject's mind.
4. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow "God or Jesus to speak directly to the subject" and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA's technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and "Gives their Life to Christ" and the NSA achieves total control of the subject.
5. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as "God and Jesus works in their life". Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).
6. The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA's electronic surveillance system captures and sorts the prayers by "Keywords". The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to "God's will". If the subject resist's the NSA's instructions, additional punishments are inflicted on the subject.
7. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other "Christians" to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject's problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).
8. A subject that has successfully completed the NSA's behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject's lives are relatively unproductive because their focus is on their "Life after death" and not what they accomplish while they are alive. They avoid "worldly activities", and usually are confused and disjointed in rational thoughts and concepts. For instance, they don't believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.
3. BEHAVIORAL MODIFICATION PROCESS:
1. Triggering Techniques:
1. The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.
2. Real-Time Subconscious Implant Delivery:
1. Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject's response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a "voice" heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA's activities.
3. Prescheduled Subconscious Implant Delivery:
The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script's transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can't be associated with a commonly recurring situation like event-triggered scripts precipitate.
4. Event-Triggered (conditional) Implant Delivery:
1. Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.
2. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to "script" and use them.
3. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want's to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject's behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject's mind.
Example: This script
will always cause a girl or boy not to sleep with the opposite sex:
"You will feel very tense and not be able to relax if you kiss, sleep
with, or stay long at your (boy or girl) friend's house and you will
feel a deep peace when you leave their house to go back home". These
types of scripts left unmanaged and not removed can cause great harm as
the subject develops and social conditions and behaviors change over
time.
4. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject's decision uninfluenced by anyone else that the subject should avoid the person, place or thing.
5. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject's decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.
5. Stage 1 (Prescreen Evaluation):
1. The subject's Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject's speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion "You will not be able to remember the name of "____" no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject's ability to overcome it is evaluated.
2. A full study of the subject's religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.
3. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are "Open-ended Questions" (similar to multiple choice with response labels pre-assigned to each choice) or "Reject if Disagreeable" (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.
4. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject's overall social status, abilities, attitudes, and communication skills with primary support groups and friends.
5. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.
6. The NSA technology affords powerful control over the subject, the subject's environment, and the subject's ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject's physical and mental condition is depleted. The subject's ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject's testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.
6. Stage 2 (Standard Process):
1. This stage is where most subjects are behaviorally modified to serve and follow "God" (AKA NSA management of the subject's civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject's relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.
2. Coincidence:
1. Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject's life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that "God" or some other supernatural being is taken interest in their life.
2. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject's church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject's mind into concern and contemplation about the sermon's topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God's mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.
3. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject's relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.
3. REM Sleep Deprivation:
1. The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject's ability to heal after physical damage or after periods of extensive exercise. The result is that the subject's general health degrades as does social bonds and work/school performance.
2. The NSA performs control of REM Sleep through various methods. Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be
discussed later).
3. Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.
4. Dark rings' surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem. When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject "will feel energetic and rested", the subject will not recognize the REM Deprivation. Additional posthypnotic commands can be implanted that will make it difficult for the subject to "see or perceive" the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.
4. Shame Factor Enhancement:
1. Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject's life.
5. Religious Relevance and Convictions:
1. The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the "Word of God". When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God's presence and force. "Thou shall not disobey God".
6. Paranoia:
1. Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject's distrust of other people including the subject's primary group that could provide positive support during this time of distress in the subject's life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject's testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.
2. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a "schizophrenia" label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.
3. The subject is led to believe that the subject's neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement
personnel.
7. Stage 3 (Extreme Process):
1. This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.
2. Increasing Dependence on Drugs and Alcohol:
1. As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject's index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject.
3. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from "God". It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.
3. Poor Nutrition:
1. The poor nutrition reduces the energy the subject has and serves later as another justification of God's punishment. The subject will be taught later that "the body is the temple" and that to abuse it is to violate God's will.
4. Apathy:
1. After the subject's self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of "not persevering through faith" which is later used on the subject later to increase a feeling of guilt.
5. Depression:
1. Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.
6. Insecurity:
1. The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can't be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject's life.
7. Journals and Diaries:
1. Most of the subjects are directed to keep a "Journal" or diary by the NSA so that the subject can record and review feelings, events, observations, and "God's directions" that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject's Journals in a variety of ways.
8. Degrading Spelling and Grammatical Performance:
4. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject's decision uninfluenced by anyone else that the subject should avoid the person, place or thing.
5. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject's decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.
5. Stage 1 (Prescreen Evaluation):
1. The subject's Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject's speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion "You will not be able to remember the name of "____" no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject's ability to overcome it is evaluated.
2. A full study of the subject's religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.
3. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are "Open-ended Questions" (similar to multiple choice with response labels pre-assigned to each choice) or "Reject if Disagreeable" (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.
4. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject's overall social status, abilities, attitudes, and communication skills with primary support groups and friends.
5. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.
6. The NSA technology affords powerful control over the subject, the subject's environment, and the subject's ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject's physical and mental condition is depleted. The subject's ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject's testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.
6. Stage 2 (Standard Process):
1. This stage is where most subjects are behaviorally modified to serve and follow "God" (AKA NSA management of the subject's civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject's relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.
2. Coincidence:
1. Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject's life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that "God" or some other supernatural being is taken interest in their life.
2. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject's church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject's mind into concern and contemplation about the sermon's topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God's mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.
3. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject's relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.
3. REM Sleep Deprivation:
1. The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject's ability to heal after physical damage or after periods of extensive exercise. The result is that the subject's general health degrades as does social bonds and work/school performance.
2. The NSA performs control of REM Sleep through various methods. Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be
discussed later).
3. Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.
4. Dark rings' surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem. When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject "will feel energetic and rested", the subject will not recognize the REM Deprivation. Additional posthypnotic commands can be implanted that will make it difficult for the subject to "see or perceive" the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.
4. Shame Factor Enhancement:
1. Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject's life.
5. Religious Relevance and Convictions:
1. The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the "Word of God". When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God's presence and force. "Thou shall not disobey God".
6. Paranoia:
1. Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject's distrust of other people including the subject's primary group that could provide positive support during this time of distress in the subject's life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject's testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.
2. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a "schizophrenia" label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.
3. The subject is led to believe that the subject's neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement
personnel.
7. Stage 3 (Extreme Process):
1. This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.
2. Increasing Dependence on Drugs and Alcohol:
1. As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject's index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject.
3. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from "God". It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.
3. Poor Nutrition:
1. The poor nutrition reduces the energy the subject has and serves later as another justification of God's punishment. The subject will be taught later that "the body is the temple" and that to abuse it is to violate God's will.
4. Apathy:
1. After the subject's self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of "not persevering through faith" which is later used on the subject later to increase a feeling of guilt.
5. Depression:
1. Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.
6. Insecurity:
1. The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can't be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject's life.
7. Journals and Diaries:
1. Most of the subjects are directed to keep a "Journal" or diary by the NSA so that the subject can record and review feelings, events, observations, and "God's directions" that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject's Journals in a variety of ways.
8. Degrading Spelling and Grammatical Performance:
1. Subjects in these
prolonged stages of REM deprivation, confusion, and emotional distress,
have very poor grammar, spelling, and short attention spans.
9. Slowed Speech:
1. Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.
10. Confusion:
1. Confusion results from three primary sources; REM Deprivation, specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject's life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA's objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA's security risk.
11. Poor Concentration:
1. Difficulty concentrating impairs the subject's productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without "God", thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.
12. Loose Association and Personality Disorders:
1. The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.
13. Anger:
1. The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial "communication intercept" channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.
14. Delusions:
1. Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.
15. Audio Hallucinations:
1. Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc.
2. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.
16. Voices in the Subject's Mind:
1. The voices in the subject's mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject's internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, "I should go to church today". With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, "You should go to church today!"
9. Slowed Speech:
1. Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.
10. Confusion:
1. Confusion results from three primary sources; REM Deprivation, specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject's life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA's objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA's security risk.
11. Poor Concentration:
1. Difficulty concentrating impairs the subject's productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without "God", thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.
12. Loose Association and Personality Disorders:
1. The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.
13. Anger:
1. The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial "communication intercept" channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.
14. Delusions:
1. Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.
15. Audio Hallucinations:
1. Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc.
2. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.
16. Voices in the Subject's Mind:
1. The voices in the subject's mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject's internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, "I should go to church today". With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, "You should go to church today!"
Notice that by
implanting the posthypnotic command into the subject's subconscious
mind to think the pronoun "You" instead of "I" the subject will
perceive that they are being directed by a voice even though the
majority of the internal thought content is their own naturally
occurring thought. This subconscious implant can be used in combination
with other implants to increase the subject's perception of threat,
fear, and therefore paranoia. It can be used with other posthypnotic
suggestion implants that will give the subject the perception of either
a "good" or "evil" voice or spirit is directing him/her.
This implant is
powerful because it gives the subject the perception that the spirit,
angel, God or Holy Spirit knows and directs the subject's every
thought. It provides a convincing proof that "God knows every thought
of his children". Subjects that don't have a superstitious frame of
reference and seek professional help are usually misdiagnosed as
schizophrenic.
17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.
18. Complete Quiet Silence:
1. Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has "The Lord's Peace Restored", and secondly, the subject has achieved a milestone toward being released by God (the NSA).
19. Quiet Wind:
1. The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin's lyrics of a song that has the chorus "I can get so scared, Listen to the wind".
20. Visual Hallucinations:
1. Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc.
2. The television show "Sightings" has had numerous reports of people seeing "Aliens" at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA's technology secure (disinformation).
21. Tactile, Olfactory hallucinations and Muscle Spasms:
1. Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:
1. Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or "deception of Satan").
3. Temporary sensation of pressure to the center of the right palm (symbolizing Jesus "Sitting at the right-hand of God").
4. Temporary sensation of pressure to the ball of the right foot (symbolizing "Get on the Ball" or "hurry-up").
5. Temporary sensation of pressure to the tip of the right foot big toe (symbolizing "Right Direction").
6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing "Fucking-up Direction").
7. Temporary sensation of pressure to the tip of the left foot big toe (symbolizing "Wrong Direction").
8. Temporary sensation of pressure to the buttocks (symbolizing "Bad Attitude" or "subject is acting like an ass").
9. Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).
10. Temporary sensation of pressure to the left ear drum (symbolizing "do not listen").
11. Temporary sensation of pressure to the right ear drum (symbolizing "listen").
12. An involuntary blink of the right or left eye (symbolizing: right eye = God's agreement or left eye = Satan's agreement).
13. Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or "Having no balls or strength").
14. Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like "being attacked with microwaves" or being caressed by Angels.
15. Muscular spasm or perceived pressures near the jugular vein on
right side of neck (symbolizing Satan having subject by Jugular or
throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.
17. Perceived odor sensation of a thick, sweet smell (symbolizing Satan's sweet victory over the subject's soul).
9. This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA's civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.
1. Reverse engineering of the NSA's technology to prove it's abuses against the American people is quite difficult. Consider the following.
2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers.
17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.
18. Complete Quiet Silence:
1. Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has "The Lord's Peace Restored", and secondly, the subject has achieved a milestone toward being released by God (the NSA).
19. Quiet Wind:
1. The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin's lyrics of a song that has the chorus "I can get so scared, Listen to the wind".
20. Visual Hallucinations:
1. Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc.
2. The television show "Sightings" has had numerous reports of people seeing "Aliens" at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA's technology secure (disinformation).
21. Tactile, Olfactory hallucinations and Muscle Spasms:
1. Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:
1. Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or "deception of Satan").
3. Temporary sensation of pressure to the center of the right palm (symbolizing Jesus "Sitting at the right-hand of God").
4. Temporary sensation of pressure to the ball of the right foot (symbolizing "Get on the Ball" or "hurry-up").
5. Temporary sensation of pressure to the tip of the right foot big toe (symbolizing "Right Direction").
6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing "Fucking-up Direction").
7. Temporary sensation of pressure to the tip of the left foot big toe (symbolizing "Wrong Direction").
8. Temporary sensation of pressure to the buttocks (symbolizing "Bad Attitude" or "subject is acting like an ass").
9. Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).
10. Temporary sensation of pressure to the left ear drum (symbolizing "do not listen").
11. Temporary sensation of pressure to the right ear drum (symbolizing "listen").
12. An involuntary blink of the right or left eye (symbolizing: right eye = God's agreement or left eye = Satan's agreement).
13. Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or "Having no balls or strength").
14. Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like "being attacked with microwaves" or being caressed by Angels.
15. Muscular spasm or perceived pressures near the jugular vein on
right side of neck (symbolizing Satan having subject by Jugular or
throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.
17. Perceived odor sensation of a thick, sweet smell (symbolizing Satan's sweet victory over the subject's soul).
9. This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA's civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.
1. Reverse engineering of the NSA's technology to prove it's abuses against the American people is quite difficult. Consider the following.
2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers.
These perceptual
effects can be confusion, lack of attention to important details,
oversights, bad assumptions, incorrect interpretation of the test data.
These same misperceptions will also be incorporated into the research
test subjects. The technology cannot be developed and optimized if the
NSA has any access to the test subjects. The test scripts given to the
test subject delivered from the researcher can be neutralized by the
NSA delivering a canceling script immediately after the researcher's
script. The NSA's test script can also include a hypnoamnesia script at
the end to cancel any residual perception in the subject so that the
test subject would report no effects and the researcher would conclude
the test script had no effect.
3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world.
3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world.
The research personnel
and their subjects must never leave the secured area of the facility
so that they cannot be subliminally interrogated by the NSA. The NSA
would take this opportunity to deliver disinformation scripts to the
subject or researcher. Foodstuffs and supplies would be the logical
choice of NSA intrusion if all other security measures were effective
against the NSA.
4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it's surrounding grounds. The minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.
3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.
6. Any facilities existing will have to be debugged before habitation and research begins.
7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.
8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA's intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.
10. Conclusion: America's greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population?
11. May God help us all in protecting the American public and preserving and managing this vital technology's vital potential to serve America's National Security.
http://www.topica.com/lists/EDD/read/message.html?mid=1601892956
4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it's surrounding grounds. The minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.
3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.
6. Any facilities existing will have to be debugged before habitation and research begins.
7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.
8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA's intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.
10. Conclusion: America's greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population?
11. May God help us all in protecting the American public and preserving and managing this vital technology's vital potential to serve America's National Security.
http://www.topica.com/lists/EDD/read/message.html?mid=1601892956
=============================================================================================
From Newshawk:
Mass Mind Control in the Present-Day U.S. -- The big picture
There are a number of interlocking systems, technologies and techniques
which are currently being deployed against the citizens of the United
States of America by certain segments of our national government.
First, there are literally COUNTLESS mind-control projects and
sub-projects in operation at this time which target SPECIFIC
subjects/victims in a variety of ways; using one or more of a number of
technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply
of different EM/RF mind control technologies, repetitive conditioning,
hypnotic trance induction, and so on and on and on.
Reliable reports from MANY different sources indicate that as many as
TEN MILLION individuals many be ACTIVE subjects/victims of these kinds
of mind control activities, and huge quantities of hard documentation on
a great many of these projects DOES exist.
However, in addition to these kinds of mind control operations, there are
ALSO mind control and mind manipulation activities that target MASSES
of people in large geographical regions at the same time. Indeed, there
is VERY strong evidence that the operators of HAARP for example, have
ever since HAARP's earliest days intended that it be used for, among many
other things, GLOBAL mind control.
There is in FACT much evidence to show that HAARP is NOW being used for
just such utterly evil purposes by the United States federal government.
Of course, there are many other EM/RF technologies and systems which
are, or may be, applied to mass-scale mind, mood, thought and
consciousness control/manipulation operations: such as the nationwide
"GWEN" (Ground Wave Emergency Network) system, certain ELF and ULF
transmitter systems, and so on (such as your TV set, even IF it's turned
OFF!)
Another way to manipulate and "regulate" the minds and consciousness of
a mass of people at a VERY basic, fundamental level is to CONTROL the
population's PRIMARY sources of INFORMATION. This is one of the MOST
powerful ways shape the collective consciousness of the public, and it is
CLEAR that many mass media outlets in the United States are both
willingly and un-wittingly aiding and abetting the manipulation of
our minds by the government, and are assisting the FedGov in carrying out
many social-engineering agendas.
The mass media's treatment of school shooting incidents, for instance,
plays DIRECTLY and TOTALLY into the schemes of those who deployed the
mind-controlled killers to carry out these shootings, in a grand plan to
shut down our Constitution's 2nd Amendment, among other things.
Moreover, very carefully designed CONDITIONING programs and tactics have
been brought to bear against nearly EVERY segment of society;
disseminated throughout the nation and the world by mass media and
entertainment industries and corporations; and imbedded in ALL forms of
so-called entertainment at this point, such as movies, TV shows, video
and computer games ESPECIALLY, some pop music, and so on.
This condition of constant, relentless bombardment with grotesquely violent
imagery, which the general population, ESPECIALLY its younger members, is
inundated with by nearly ALL forms of popular contemporary entertainment
and sources of "information", is indeed directly derived from those
mind-conditioning programs and systems developed at Fort Detrick (and
other similar locations). San Diego shooter Charles Williams' father
worked at the Army's Fort Detrick facility for THIRTEEN YEARS.
Specifically, indoctrination/conditioning programs were developed at
Fort Detrick in which subjects were repeatedly, continually and
continuously immersed in virtual reality-type video/computer "games"
of extreme and GRAPHIC brutality, for long stretches of time and
over an extended time frame.
This kind of psychological assault proved very effective in rapidly
obliterating subjects' ethical and moral values and cultural norms with
regard to violence, brutality, killing and so on.
These systems were perfected, applied to the brainwashing and
conditioning of members of the U.S. military and also turned over to
the intelligence sectors for other applications. The intelligence sector,
in turn, DELIBERATELY and successfully undertook to have this same kind
of HIGHLY negative, destructive and effective conditioning applied to
SOCIETY AS A WHOLE, via mass conditioning of our consciousness through
the entertainment and information industries, as noted.
One OTHER method of mass mind control/manipulation/conditioning which is
NOW being utilized MORE and MORE -- ESPECIALLY against the most
vulnerable members of our society, our CHILDREN -- is the
highly-reprehensible/questionable and increasingly common MANDATED
DRUGGING of ever-growing numbers of children through hugely intrusive,
invasive, ill-advised, psychologically unpredictable and often
destructive programs mandated, usually for young males, by psychiatrists
and social workers. More and more of our children are being dosed on a
long-term basis with any of a number of psychotropic/psychiatric drugs
like Prozac, Ritalin, Luvox, and so on.
These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT
psychotic reactions among a significant percentage of subjects, but ALSO
clearly and provably create a stupefied, dumbed-down, zombified mental
state in targeted subjects which is a PERFECT "ground state" for the
carrying out of yet OTHER mind control/manipulation/conditioning activities
on these very same subjects. In general, this kind of psych-drugging makes
the job of further mind control programming MUCH easier. And this kind of
drugging is being done to ever-increasing numbers of our children, down to
toddlers as young as TWO and THREE YEARS OLD!!
Now, there is ANOTHER way in which our present-day society is being
literally and effectively mind-controlled en masse.
Most all of the individually-targeted mind control programs we noted
above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT
PERSONALITY in the victim/subject. In fact, one or more of these
deliberately-induced split personalities formed as a result of
psycho-sexual abuse or other conditioning are those facets of the
subject's psyche which ARE actually "programmed"; to kill, or whatever
else. It's been shown that forcing victims/subjects to witness, experience
or participate in just about any highly-traumatic and shocking events on a
repeated basis will induce the kind of psychotic break(down) that is a
necessary prerequisite for intensive mind control programming/conditioning.
SO: WHEN our society as a whole is FORCED to confront and WITNESS over
and over and over again something as FUNDAMENTALLY shocking as having
our young people perpetrating inconceivably horrific mass murders of
peers and others on A REGULAR BASIS, as is NOW THE CASE in the
present-day United States, then the population as a whole AND on an
individual basis to some extent develops an analogous, similar
psychological break, and in FACT to some extent develops split
personality/multiple personality disorder conditions... READY FOR
FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarily disturbing events which impact society AS A
WHOLE, such as these school shootings by young people that have just
occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO
social controllers who set these terrible mass killings off; and the
incidents themselves serve to further condition, manipulate and "mind
control" the population of the United States in the year 2001.
Mass Mind Control in the Present-Day U.S. -- The big picture
There are a number of interlocking systems, technologies and techniques
which are currently being deployed against the citizens of the United
States of America by certain segments of our national government.
First, there are literally COUNTLESS mind-control projects and
sub-projects in operation at this time which target SPECIFIC
subjects/victims in a variety of ways; using one or more of a number of
technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply
of different EM/RF mind control technologies, repetitive conditioning,
hypnotic trance induction, and so on and on and on.
Reliable reports from MANY different sources indicate that as many as
TEN MILLION individuals many be ACTIVE subjects/victims of these kinds
of mind control activities, and huge quantities of hard documentation on
a great many of these projects DOES exist.
However, in addition to these kinds of mind control operations, there are
ALSO mind control and mind manipulation activities that target MASSES
of people in large geographical regions at the same time. Indeed, there
is VERY strong evidence that the operators of HAARP for example, have
ever since HAARP's earliest days intended that it be used for, among many
other things, GLOBAL mind control.
There is in FACT much evidence to show that HAARP is NOW being used for
just such utterly evil purposes by the United States federal government.
Of course, there are many other EM/RF technologies and systems which
are, or may be, applied to mass-scale mind, mood, thought and
consciousness control/manipulation operations: such as the nationwide
"GWEN" (Ground Wave Emergency Network) system, certain ELF and ULF
transmitter systems, and so on (such as your TV set, even IF it's turned
OFF!)
Another way to manipulate and "regulate" the minds and consciousness of
a mass of people at a VERY basic, fundamental level is to CONTROL the
population's PRIMARY sources of INFORMATION. This is one of the MOST
powerful ways shape the collective consciousness of the public, and it is
CLEAR that many mass media outlets in the United States are both
willingly and un-wittingly aiding and abetting the manipulation of
our minds by the government, and are assisting the FedGov in carrying out
many social-engineering agendas.
The mass media's treatment of school shooting incidents, for instance,
plays DIRECTLY and TOTALLY into the schemes of those who deployed the
mind-controlled killers to carry out these shootings, in a grand plan to
shut down our Constitution's 2nd Amendment, among other things.
Moreover, very carefully designed CONDITIONING programs and tactics have
been brought to bear against nearly EVERY segment of society;
disseminated throughout the nation and the world by mass media and
entertainment industries and corporations; and imbedded in ALL forms of
so-called entertainment at this point, such as movies, TV shows, video
and computer games ESPECIALLY, some pop music, and so on.
This condition of constant, relentless bombardment with grotesquely violent
imagery, which the general population, ESPECIALLY its younger members, is
inundated with by nearly ALL forms of popular contemporary entertainment
and sources of "information", is indeed directly derived from those
mind-conditioning programs and systems developed at Fort Detrick (and
other similar locations). San Diego shooter Charles Williams' father
worked at the Army's Fort Detrick facility for THIRTEEN YEARS.
Specifically, indoctrination/conditioning programs were developed at
Fort Detrick in which subjects were repeatedly, continually and
continuously immersed in virtual reality-type video/computer "games"
of extreme and GRAPHIC brutality, for long stretches of time and
over an extended time frame.
This kind of psychological assault proved very effective in rapidly
obliterating subjects' ethical and moral values and cultural norms with
regard to violence, brutality, killing and so on.
These systems were perfected, applied to the brainwashing and
conditioning of members of the U.S. military and also turned over to
the intelligence sectors for other applications. The intelligence sector,
in turn, DELIBERATELY and successfully undertook to have this same kind
of HIGHLY negative, destructive and effective conditioning applied to
SOCIETY AS A WHOLE, via mass conditioning of our consciousness through
the entertainment and information industries, as noted.
One OTHER method of mass mind control/manipulation/conditioning which is
NOW being utilized MORE and MORE -- ESPECIALLY against the most
vulnerable members of our society, our CHILDREN -- is the
highly-reprehensible/questionable and increasingly common MANDATED
DRUGGING of ever-growing numbers of children through hugely intrusive,
invasive, ill-advised, psychologically unpredictable and often
destructive programs mandated, usually for young males, by psychiatrists
and social workers. More and more of our children are being dosed on a
long-term basis with any of a number of psychotropic/psychiatric drugs
like Prozac, Ritalin, Luvox, and so on.
These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT
psychotic reactions among a significant percentage of subjects, but ALSO
clearly and provably create a stupefied, dumbed-down, zombified mental
state in targeted subjects which is a PERFECT "ground state" for the
carrying out of yet OTHER mind control/manipulation/conditioning activities
on these very same subjects. In general, this kind of psych-drugging makes
the job of further mind control programming MUCH easier. And this kind of
drugging is being done to ever-increasing numbers of our children, down to
toddlers as young as TWO and THREE YEARS OLD!!
Now, there is ANOTHER way in which our present-day society is being
literally and effectively mind-controlled en masse.
Most all of the individually-targeted mind control programs we noted
above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT
PERSONALITY in the victim/subject. In fact, one or more of these
deliberately-induced split personalities formed as a result of
psycho-sexual abuse or other conditioning are those facets of the
subject's psyche which ARE actually "programmed"; to kill, or whatever
else. It's been shown that forcing victims/subjects to witness, experience
or participate in just about any highly-traumatic and shocking events on a
repeated basis will induce the kind of psychotic break(down) that is a
necessary prerequisite for intensive mind control programming/conditioning.
SO: WHEN our society as a whole is FORCED to confront and WITNESS over
and over and over again something as FUNDAMENTALLY shocking as having
our young people perpetrating inconceivably horrific mass murders of
peers and others on A REGULAR BASIS, as is NOW THE CASE in the
present-day United States, then the population as a whole AND on an
individual basis to some extent develops an analogous, similar
psychological break, and in FACT to some extent develops split
personality/multiple personality disorder conditions... READY FOR
FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarily disturbing events which impact society AS A
WHOLE, such as these school shootings by young people that have just
occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO
social controllers who set these terrible mass killings off; and the
incidents themselves serve to further condition, manipulate and "mind
control" the population of the United States in the year 2001.

Subscribe to:
Comments (Atom)