Sei sulla pagina 1di 67

Posted by (Geeldon) SEP 6

Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 1 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 2 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 3 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 4 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 5 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 6 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 7 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 8 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 9 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 10 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 11 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 12 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 13 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 14 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 15 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 16 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 17 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 18 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 19 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 20 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 21 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 22 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Generated with www.html-to-pdf.net Page 23 / 67
Posted by (Geeldon) SEP 6
Leave a comment
Posted by (Geeldon) MAY 28
Leave a comment
Posted by (Geeldon) JAN 18
Leave a comment
Posted by (Geeldon) DEC 25
Category Archives: Implantable
Microchips
What is Mind Control / Psychotronic Torture?
BY DEB CHAKRABORTY
The term Mind control basically means covert attempts to influence the thoughts and
behavior of human beings against their will (or without their knowledge), particularly when
surveillance of an individual is used as an integral part of such influencing and the term
Psychotronic Torture comes from psycho (of psychological) and electronic. This is actually a
very sophisticated form of remote technological torture that slowly invalidates and
incapacitates a person. These invisible and non-traceable technological assaults on human
beings are done in order to destroy someone psychologically and physiologically.
Actually, as par scientific resources, the human body, much like a computer, contains myriad
data processors. They include, but are not limited to, the chemical-electrical activity of the
brain, heart, and peripheral nervous system, the signals sent from the cortex region of the
brain to other parts of our body, the tiny hair cells in the inner ear that process auditory
signals, and the light-sensitive retina and cornea of the eye that process visual activity. We
are on the threshold of an era in which these data processors of the human body may be
manipulated or debilitated. Examples of unplanned attacks on the bodys dataprocessing
capability are well-documented.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal
messages or to alter the bodys psychological and dataprocessing capabilities, might be used
to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the
various sensory and data-processing systems of the human organism. In both cases, the goal is
to confuse or destroy the signals that normally keep the body in equilibrium.
Definition of psychotronic (psycho-physical) weapons.
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means
(techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden,
forced influences on the psyche of a person for the purpose of modifying his consciousness,
behavior and health for what is desired in the way of influencing aspects of control This is
not only dangerous, this is deadly!
Actually, the goal of mind control is to access those areas of the brain that are outside of the
conscious control of the individual by circumventing the normal inhibiting response of the
cerebral cortex: an individuals voluntary conscious selfcontrol must be bypassed or short
circuited. This unconscious coercion is done through electromagneticwave bombardment of
the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne
waves can travel over distances and are known to change the behavior of animals and humans
in their path. Such remote control makes possible potentially frightening uses for altering the
brains functioning. These are invisible and deadly waves. This waves goes directly to the
subconscious parts of the human brain for receiving or transcoding the messages and without
the person exposed to such influence having a chance to control the information input
consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting
mind control requires the creation of profound and deep emotional states. Recommended
are fear, shock and anxiety, which have an intense disinhibitive effect on the human brain.
What this means, in essence, is that emotional trauma facilitates the accessing of dissociative
states. In order to disable the brains cortical block, Verdier recommends alcohol, euphoric
drugs, isolation, solitary confinement, and the most dramatic and unique item in the
brainwashing arsenal hypnosis. All of these are methods that have been extensively tested
by the CIA under the rubric of the MK-ULTRA program.
The technology is rooted in surveillance devices, such as audio and video bugs, through-the-
wall and remote sensing devices, and biosensors both remote and implanted. This provides
the feedback for the influencing, as well as any entertainment value for voyeur/sadists and
intellectual property theft for thieves. Coupled with the surveillance is some sort of
effectors or feedback path for influencing an individual.
Thus there are several categories of mind control operations, for example covert drugging,
hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks,
and ongoing feedback control setups for long-term torture and exploitation of victims, to
mention a few. What they have in common is the attack against the mind of the victim, as
well as the deniable and denied nature of the attack. The exact means being used in any
particular case are beside the point here. These techniques do not just violate one or two of
what everyone knows are fundamental human rights: In one fell swoop they violate almost
every fundamental human right a person has.
The electromagnetic technology works on the theory that the mind and body are an
electromagnetically mediated biophysics system and the electromagnetic signals form outside
sources can mimic the mind and bodys electromagnetic signals and therefore a weapon can be
developed based on these principles.
There is evidence that since the 1950s the U.S. and other government have been developing
electromagnetic weapons which can remotely target the electromagnetic system of the human
body for military and intelligence purposes.
The First phase is the harassment/surveillance program
During the first phase of this Govt. program a person is broken physically and mentally. The
methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon,
Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-
conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs,
homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family,
friends. The isolation is needed to have access to the person to conduct many of the
experiments on them. All privacy and constitutional rights are thus stripped away.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of
regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During
this time many have been implanted with microchips. Many begin experiencing extreme pain
to their head. Some hear voices. Then pain is delivered to various other parts of their bodies.
The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing
the pain and no one is touching them. It is an invisible energy force. Along with drugs being
administered by the scientist through either a drip system which!has been inserted into an
individual, food tampering, or injection all without the victims permission. Then Mind
Entrainment begins.
Directed Energy Weapons
Some of the weapons were known as non-lethal weapons. They use such weapons as
extremely low frequency Elf electromagnetic weapons (which has been used in mind control),
acoustics, harmonics (which have been used as a mind control technique), ultrasound,
microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic
energy beam can be used to induce considerable agitation and muscular activity or induce
muscular weakness and lethargy this weapon is know as Ultra High Frequency EM.
Psychological warfare tactics are being used against unsuspecting citizens to destroy their
jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to
utterly destroy a person, very often resulting in a person taking his or her own life, or ending
up in a mental hospital. This has been taking place for years and nothing is ever said about it.
Nothing is ever written about it. For the sake of those who came before us, and those who
come after us, the world needs to know what is happening.
For many people, this comes out of nowhere. They dont know whose toes they stepped on in
order to warrant such a brutal attack. For others who are whistleblowers, they know full well
how they garnered such attention. For some, they dont even realize that they are the
targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is
difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that
something unspeakable and devastating is happening.
What makes this crime so heinous is that the most sophisticated techniques of psychological
warfare are employed against a person in order to make them look like they are crazy. Friends
and family members dont believe the things that are happening and often believe the
targeted person is crazy.
This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking
part of it, which targets experience to varying degrees. This involves stalking by a multitude of
individuals both on foot and while youre in the car. Known as street theatre by those who
experience it, it involves vandalism to house, car and personal property. Gang stalking can also
be referred to as cause stalking, vengeance stalking and multi-stalking.
Some people also experience electronic harassment. This is extremely distressing, painful and
invasive, and feels like ones mind and body is undergoing constant rape, 24 hours a day, 7
days a week. The technology used to do this is unknown, but hundreds of victims report the
same physical sensations and experiences. Many take their lives in an attempt to escape the
horror. It is so distressing that only fellow targets can really understand what another target is
experiencing.
In either case, the attacks are so well orchestrated that only the victim is aware of them. This
is intentional, and it appears that these groups have perfected these techniques over many
years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do,
since new targets are completely bewildered as to what is happening to them, having never
heard a peep out of the media about such occurrences (except in relation to mental illness).
Their actions are based on many of the same tactics as those employed in ritual abuse, and are
designed to weaken the targets mind and perpetrators are becoming increasingly addicted to
this game of predator/prey, always needing more targets to satisfy their unending thirst for a
thrill.
Electronic harassment or eharassment is a catchall term used to describe a group of
circumstances which a large number of people are currently experiencing in common. In
general, this term refers to the use of electronic technology to view, track and/or harass a
person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by
neighbors) is largely personal opinion. There is no definitive proof that would allow any of the
present victims to launch a court case, but the numbers of victims and the commonality of
experience speaks for itself.
The technology involves the use of electromagnetic waves of various frequencies to achieve
different results. Some frequencies will make a person tired, while others may cause confusion
or memory loss. With the rapid increase in cell phone usage, many experiments have been
conducted on the detrimental effects of those particular frequencies on animals. The results
indicate that the invisible e.m. signals from cell towers can cause a wide range of physical
ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is
even more likely the case with the frequencies which may be used to cause direct, intentional
harm to a person.
Electronic harassment is sometimes referred to as psychotronics, but would more accurately
be described as criminal psychotronics.
Types of Weapons:
Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons
Soft Kill Weapons
Less-Than-Lethal Weapons
Posted in Brainwashing, Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips,
Psychiatric Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance,
Torture, Zersetzung
Tags: psychotronics, synthetic telepathy
Hearing Voices: Audio Implants by Intelligence Agencies
AUDIO IMPLANTS
BACKGROUND INFORMATION
The concepts used in audio implants had been discovered in the first half of the 20th century,
but the refinement of technology to take advantage of what had been discovered waited until
the second half of the century. The development of audio implants ran on two tracks, one was
the public medical research and the other was the secret Illuminati/Intelligence Agencies
research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati
was experimenting on some victims at this stage, and the military in the Vietnam war used
auditory implant devices to aid communicating to their men who were sent into tunnels and
who were placed into forest situations where audible noise would compromise their locations
to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the
experimentation secret. It appears from looking at the worldwide research on audio implants
that the Illuminati realized that the field was so ambiguous, and open to so many different
approaches, that rather than straightjacket the research community by a specific strategy,
they encouraged a wide variety of approaches in the research. Consequently, research by one
group would overlap or duplicate research by another. Much to their credit, a few researchers
rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the
intelligence agencies were willing to start using hundreds of people to experiment
operationally with the implants. People in every state of the U.S. were selected as victims.
Many of these implant victims had programmed multiple personalities already. The controllers
were very heavy handed with the people they implanted, and they used the full force of the
Illuminati/Intelligence agencies power to keep these people under their control at all times.
These innocent victims have had their lives totally destroyed. Some tried to fight back,
spending thousands of dollars to get out from underneath the incessant audio messages that
the implants sent, but the system was too big and too powerful to fight. Police, congressmen,
psychologists and many other people turned their backs on these victims. Some victims who
initially fought back gave up resisting, some committed suicide, and some continued to fight.
Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting
more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the
U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia,
France and other countries began to receive the cochlear implants. Australia was so proud of
their audio implant research/development they issued a postage stamp showing an implant
device (bionic ear) developed in Australia. The question begs asking, if thousands of people
have publicly received audio implants, isnt obvious that the secret societies and secret
intelligence agencies have done at least as much if not far more?
BRIEF CHRONOLOGY OF AUDIO IMPLANTS
1790first known attempt by Volta to electrically stimulate the ears. He shot approximately 50
volts of electricity into his auditory system, and experienced the sensation of a blow to the
head followed by a sound like the boiling of viscous liquid.
1850Electrootiatrics was begun by otologists who hoped electricity could help ear diseases in
various ways.
1925Sounds were created in people by radio engineers by placing electrodes near the ear with
a modulated alternating current.
1930Weaver & Bray discovered the principles used later in the cochlear microphonic implants.
1937By passing an alternating electrical current in the audible frequency range from an
electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear
sounds. For a number of years these men studied this phenomena.
1957Djourno and Eyries in France woke the world up concerning the ability to electrical
stimulate the auditory nerves and produce sound with their reports. A patient from France
reportedly gets William F. House, MD interested in developing an implant device.
1961William House implants two patients with shortterm audio implants. One patient
receives a multiple electrode implant.
1960sintense research for audio implants is conducted in California in places like Sanford, the
Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to
soldiers in situations where external noise would compromise the location of the American
soldiers, such as exploring tunnel system.
1970sVarious researchers around the world begin publicly implanting audio implants into
people. The Illuminati and intelligence agencies begin to secretly implant people, this is known
because many of the early victims can pin point at time in the 1970s when they got their audio
implants.
1980The FDA establishes Federal regulations regarding cochlear audio implants.
1984By this year, 369 people have publicly received the House Cochlear Audio Implants, which
have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for
use in adults, which is already in hundreds of adults, receives FDA approval in Nov.
1990sAudio implants along with other implants begin to be used more aggressively by the
mind-control programmers. Successful intelligence operations are carried out with the aid of
audio implants.
BASICS OF HOW THE IMPLANTS CAN FUNCTION
Thousands have publicly received audio implants, and thousands have received audio implants
without their permission by the New World Order. The implants (whether secret or public)
basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or
electrical stimulating device. When sound waves arrive to the human ear, the sound causes
biological reactions all along the auditory pathwayfrom the cochlea, the auditory nerve, the
brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game
for machinations of the mind-control researchers. There are brain stem potentials which
originate in the auditory brain stem nucleiprimarily in the inferior colliculi. The public auditory
implants produce a small electrical stimulus that bypasses damaged hair cells and directly
stimulates the remaining auditory neural elements. This means that for the secret implants,
the electrical impulse that is generated to stimulate the person to hear a sound or sentence is
totally unnoticed by everyone but the victim. As mentioned before, psychologists are being
used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do
these psychologists know that the person isnt hearing voices from an implant? Some
psychologists are declaring the implant victims are crazy, delusional, & insane, because
audio implants supposedly dont existtherefore it is useless to give any credence to the
complaints of victims. In other words, psychologists are being used as the establishments
witch doctors to cover up the mindcontrol activities of the New World Order. Whats new?
Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the
programmedmultiple slaves paranoid schizophrenics. During experiments, it was discovered
that the skin of a person can pick up auditory vibrations, so tests were run to see if implants
in other parts of the human body could be used for auditory implants. The vibrotacticle system
of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system
had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The
auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-
35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the
brain was a very limited way to create sound. For most purposes it isnt a viable approach,
even though some experimental auditory implants were placed in places like the chest. The
ones that were tested only reconfirmed the suspicions that the best results are by using the
inner cochlea and the auditory canal area. Dr. Begichs and later others showed that a
nonlinear function will translate one frequency to another frequency, but although it does
jump, this method is inadequate for the current mind control signals, and a linear function is
used which operates simply on the energy that the implants have.
Originally single channel devises were used, but then multichannel devices were soon found
superior. The processing units of a device, had to have an extraction method to determine
the pitch of the signal and then would present a square wave at the rate of that frequency.
Soon the miniature computers that made up part of the audio implant were made so that they
were programmable. Some of the publicly implanted people (for instance some who got a 4
mm. cochlear auditory implant), who thought they were getting medical help, were later
followed up a decade later by the intelligence agencies for their own agenda, and instead of
just hearing the world, they got to hear mind-control drivel from some handler communicating
via the implant. As sound waves come into the public implants, they are fast Fourier
transformed into many channels lying between say 100 and 4000 Hz. Each channel may be
assigned to a specific electrode located on an array of electrodes. The electrodes are
stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators
that then stimulate the subject to hear something. (Fourier transforms have also been
identified being used by human brains to encode memory.)
In order to keep their signals to their implanted victims secret, the Network employs a tactic
called piggybacking where they piggyback their own audio transmission onto standard FM
frequencies.
CANAL is the acronym for an system that is used simultaneously for transmission and reception
via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals
are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.
USES OF THE IMPLANTS
a. by themselves
b. with other implants
c. in conjunction with other mind-control devices
TYPES OF AUDIO IMPLANTS
Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.
Part A. Publicly admitted audio implants.
The entire world has gotten involved in audio implant research. The British Cochlear Implant
Group has been setting up implanting centres for the UK. Not all the publicly known implants
will be listed here, for instance, some of those I chose not to list include some developed in
Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made
implants, and several made in East and West Germany before the wall went down, and the
Swiss implant which was simply the Austrian audio implant used with their own processor.
3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGNMODEL 7700 (AKA ALPHA)
BANFAI, EMG Several models developed by Banfai in CologneDueren, West Germany. It is
digital, with a pulsatile signal and a programmable memory. The implant can be communicated
with using an interface device hooked to a computer. The patient has a keyboard. It was first
implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of
people.
BRITISH, for instance UCH Developed by Douek, Fourcin and Moore in London and implanted
with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and
promontory grooves for the electrode, and neural network programming in its computer
memory.
CHEN AUDIO IMPLANTdeveloped in Guangzhoi, mainland China and first implanted in 1984. It
was said by the chinese that 20 people received this implant.
CZECHOSLOVAKIANImplants were created by Volvoda and Tichy in Prague and implanted in
the 1980s into a few people.
FRASERDeveloped in London, and first implanted in 1983. It was notable because it had a
round window in the implant. In the first few years it was implanted into 56 people. The
encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other
European researchers had done
FRAYASEDeveloped in Toulouse, France, this audio implant was implanted with its receiver in
the chest. It was first implanted in 1981, and 22 people were said to have received it.
GOAdeveloped in Shanghai, China by Lee and Lin.
INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the
Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a
woman who had an implant in one ear and not the other. She was asked to compare the pitch
signals from natural sources versus the right ear audio implant. The most apical implanted
electrode was not as accurate as the more basal located electrodes using an Ineraid implant.
IMPLEX COM 12Comes with an interfacing computer and a Syncom patient selftester
LAURADeveloped at Antwerp, Belgium. These were first implanted in 1986, and had an
internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an
antenna, and a data control circuit. Only a few subjects got this implant. It comes with a
computer, and an interface unit. It does have a programmable memory.
MEDEL Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in
1977. Hundreds of people were implanted with this audio implant. Some were implanted
externally with it and some internally inside the ear canal. It has one channel and a multitude
of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It
does not have a programmable memory.
MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by
1990 into 179 people.
NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARKs
Implants)At least two models developed in Australia at Melbourne. This audio implant was
first implanted in 1978. The implant is programmable from the outside. It has been implanted
into many hundreds of people. It has a multitude of electrodes that stimulate the audio
system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant
comes with a diagnostic and programming interface computer. The Australian government
heavily subsidized with millions of dollars research into audio implants and got the Cochlear
Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-
frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid
succession, and special algorithms are used which change the relationship between the pulse
amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The
Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.
Storz Instrument Co.s Implantdeveloped at Univ. of Calif, San Francisco.
Part. B. Secretly implanted audio implants.
There were several profiles of people that were used in the World Orders selection of secret
victims to implant. The following were criteria that they liked in the selection process, a.
vulnerable, such as single women, b. people who were already programmed with trauma-based
mind-control, c. psychics, who had already told people they heard or saw things ordinary
people dont, d. people, not highly regarded by society such as minorities, criminals, street
people, mentally insane, who would not be able to find a support system to help them fight
the experimentation. They also did the audio implants into some of their own intelligence
agents, apparently to some who were getting somewhat difficult to their superiors. Because
of this type of profile, and some other things this author learned, it appears that the initial
two decades were used more for experimentation and development than they were for actual
operations. However, with more than 2 decades of experience, they are now fully operational.
From watching their interaction (messages) with victims of audio implants, it is clear that they
are not in the testing stage, but are fully operational, and have a full cadre of trained
operatives (men & women) to staff the secret bases from which the monitor and broadcast
signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx.
6 a.m. In other words, from what we can tell they are using standard shift times for the audio
implant control staffs.
COCHLEAR IMPLANTSThere are Cochlear implants for auditory control secretly implanted
without permission. A rubber molding skin color covers the outer lining of the ear canal. There
are tiny slits in this lining, which when pushed to the side would show the presence of coils
and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face
due to intense heat generated by implants, which is painful.
DENTAL AUDITORY IMPLANTSAt least a dozen victims have complained that after their teeth
were capped they began hearing voices. Other sources indicate that during the filing process
implants are being put into people. This is the type of implant placed into J. Z. Knight and left
dormant for many years until they decided to activate her as New Age guru.
RIDGE IMPLANTS These implants can produce Theta waves and even voices. They are
designed to suppress a particular type of thinking. The body may be sent into paralysis or
given various stimulus-response stimuli in order to suppress certain thought patterns. If the
slave begins to have certain thought patterns that threaten the programming and programming
structures, these implants kick in to divert the persons mental activity to something else.
Posted in Brainwashing, Gaslighting, Human Experimentation, Implantable Microchips, Torture,
Zersetzung
Tags: audio implants, hearing voices
Forced Dreams (Mining for Information)
Thought reading, i.e. MINING someones brain for information from a distance is
SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we
do know that we are fed hypnotic signals to force consistent neutral content DREAMS(but
of different character than prior to becoming test subjects,).
These forced, neutral content (bland content) dreams occur every single night and may
represent the harassers (or experimenters) efforts to have our experiences portray
themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION,
but it seems very logical. It is therefore extremely likely that these forced dreams can be
displayed on the experimenters screens in an adjacent apartment or adjacent house, (which
are
made obvious to the involuntary experimentee.)
Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers
either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us
about events inside our homes at times when they could not have seen from the outside.
Some of the forced dreams are pretty much surreal and disconnected from normal dreams
pattern.
This is the basic idea for the movie INCEPTION.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture,
Uncategorized
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
The British Mind Control Agent
By C L Heywood (Copyright 2006)
Contents
1. THE BRITISH MIND-CONTROL AGENT (An Introduction)
Introduction
Battle for the Mind
The Mind Controllers (MCs)
The Human Brain and Behaviour
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
2. Electronic Harassment and Implant Technology (Mind Control in Practice)
Alien Abduction and Medical Exploration
The Human Body, Radio Communication and Electromagnetic Stimulation
The Implant Specialists
The Gaffer
The Design, Testing and Analysis of Implants
3. The Human Body and Private Home is a Sacred Temple?
the British MindControl Agent
(An Introduction)
Introduction
Conspiracy theory is a very controversial subject and has captivated the medias attention for
countless years. Journalists, due to their exceptional capability to sniff out a story, have
actively leaked and exposed information of a classified nature in an effort to prove to
themselves and anyone who will listen just how prominent government corruption really is.
On a global scale every nation funds its own team of secret police and military enforcers whose
prime objective is to sustain and develop national-security strategies and policy.
Understandably the majority of their activities are conducted covertly on an extensive level;
MI6, the CIA and the KGB being prime examples. Their various dealings have always been
enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged
and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis.
It is also proven fact that these intelligence-gathering establishments have conducted
unethical testing on their own soldiers and intelligence personnel using a varied range of lethal
arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their
books, magazines, movies and television documentaries. Mind Control in particular has taken
centre stage. John Marks The Search for the Manchurian Candidate, for instance, highlighted
extensive CIA pursuits of mind-control intelligence and weaponry.
Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources
to interview places restrictions on the research avenues that journalists may pursue. As a
result, the secrecy surrounding mind control developments has now piqued unquenchable
global curiosity.
Battle for the Mind
Since the beginning of civilisation topical issues concerning the human brain have always
attracted substantial attention for a number of obvious reasons. The human brain is a most
valuable asset and extremely unique, as it holds the precious cocktail of individuality and
personality. It is what separates the timid from the aggressive and the academically gifted
from Mr Average. The brain controls physical movement, all cognitive capabilities (memory,
counting and language) and regulates a vast array of bodily functions.
Although substantial headway has been made in pursuit of understanding the brain and its
function, scientists are still a long way from mastering and controlling the mechanisms that
work within it. This situation has uncovered many dilemmas for law-enforcement agencies,
the military and medical communities, who all believe there is great potential to be found in
mastering physical control of the brain and mind.
Criminal psychologists, for example, are no longer blaming environmental circumstance and
adverse social conditioning as the sole cause of criminal activity. They stress some individuals
may be more susceptible to committing murders and assaults due to their inherited genetic
wiring. This theory asserts that there are chemicals within the brain which can trigger anger
and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical
imbalances which they are unable to control without the intervention of drugs and other
inhibitors. Naturally it is hoped that brain exploration will offer some answers.
Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may
be supplemented or suppressed by drugs which in the long run can make an individuals
behaviour more desirable and manageable. They foresee great potential in the use of implants
and other artificial aids to assist the bodys performance and maintain organs to optimal
working condition. Consultants view the exploration and control of the brain as a fascinating
realm of discovery where new breakthroughs in psychiatric treatment and disease can be
made. Utilising medical research and analysis, their sole objective is to rid the world of every
brain dysfunction and life-threatening condition known to mankind.
The military, unlike the medical and law-enforcement professions, hold slightly different
interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world
domination, biological warfare and intelligence gathering. They wish to discover newfound
ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations.
They strongly believe that the man who can crack the complex code of human behaviour is the
man who has the power to manipulate, control and modify the actions and thoughts of
another.
It is abundantly clear why so many government-funded establishments are interested in
methods which control human brains and minds because the capability to detect criminals,
advance medical technology and win wars runs paramount with the security and advancement
of British society.
1. Criminals cost the British government millions of pounds in surveillance, rehabilitation,
punishment and victim-support services.
2. An unhealthy nation places pressure on the social services and hospital staff, as well as
spreading disease and infections which are difficult to eradicate. Humans with permanent
illnesses are repeatedly forced into unemployment as a consequence.
3. Intelligence agents and soldiers are very expensive to pay; the government could cut MoD,
MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations,
expose spies and ascertain threats to national security using quality technological surveillance
and interrogation techniques.
Scientists who can unravel the mysteries of brain function are worth billions of pounds to the
British government and are now in mass abundance. Ultimately, it is the unhealthy and often
stressful state of government politics, and heightened security fears, which have led to the
emergence of the mind-control professional.
Many will have their own definitions of mind control and its meaning, and these definitions
often vary slightly. This paper follows the assertion that Mind Control encompasses all
theoretical and technological applications which are used to gain minimal or complete control
over an individuals brain or psychological state of mind and behaviour, both covertly and
overtly. The aim of the game is to control an individual to the point where he will do the
manipulators bidding against his will or, alternatively, to adjust his behaviour in a desirable
way in order to satisfy an expressed agenda, whatever this may be.
British research into mind control technology is a very important issue and stands high on the
political agenda.
The Mind Controllers (MCs)
Scientists who conduct mind control research for British intelligence agencies are commonly
referred to as Mind Controllers (MCs). Their main aim is to:
design and produce lethal and non-lethal mind-control weaponry which can be used against
criminals, foreign government spies and military personnel;
design and use equipment which can counter the affects of foreign mind-control techniques, and
prevent spies and terrorists from extracting/intercepting information from British agents,
military scientists and politicians.
MCs are a special task force of multi-skilled professionals who are funded by the British
government as secret agents. These operatives are deployed and assigned to a diverse range
of projects depending on their expertise and, as a cohesive force, comprise doctors,
psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists,
telecommunications technicians and child-development professionals, etc. For the most part
MCs are employed within the social care and public service sectors and, as a result, have
primary contact with members of the public. This brings them closer to observing human
behaviour in its rawest form and enables interactivity with personalities and, ultimately,
functioning brains. They are by necessity a rather corrupt lot as their research methods often
take them down roads which lead to performing both invasive and non-invasive procedures on
the brains and psyches of well-adjusted citizens without legal consent. These operatives, for
instance, are notoriously known for their involvement with implant technology, psycho
chemicals and the brainwashing of military captives.
As active behavioural scientists MCs are great believers in trial-and-error experimentation and
follow this principal like a bible. A practising mind controller must torture a real human being
to acquire credible information on torture and its effect on the physical body and mental
state.
Mind Control Applications:
Sensory deprivation (to create disorientation
and fear)
Torture/physical assault (kicks, punches,
burning, cutting, electrocution, sexual assault,
chronic induced sickness, cramps, vomiting,
temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/
punishment versus reward
Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of
electromagnetic waves to influence the human
brain)
Sound technology (the incessant use of music
and voices to arouse certain thoughts and
feelings)
Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors
polygraph tests
This table represents just a snippet of the work MCs are primarily responsible for, and
accounts for the substantial amount of mind and behaviour research circulating university
lecture theatres and colleges.
The most alarming aspect of mind control research is that experimentation on the unwitting
human being is condoned by security bureaucrats and military personnel, who have convinced
themselves and the involved parties that their sometimes ruthless investigations are honest
attempts to search for scientific truth. It is of small consequence if the pregnant mother is
given LSD without her knowledge as the investigative results may revolutionise the way LSD is
used in the future by the British population; and by business sectors who treat LSD addicts,
and pharmaceutical companies that produce and examine LSD properties.
The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human
experimentation when the scientist plunged to his death from an upper-floor window after
CIA mind-control agents spiked his drink with LSD.
The phrase one life for many is the core golden rationalization here and, irrespective of links
with law enforcement, MCs arent strangers to unconstitutional murder as some of their
projects are terminal, meaning the victims life is expendable and the objectives of the study
must be fulfilled by any means necessary.
Mind-control operatives establish themselves as law abiding social scientists whose prime
objective is to nurture society to help it flourish and develop to its full potential. In the idyllic
society man is co-operative, productive, law abiding and happy to help his fellow man. He is
flawless, a well-balanced individual with the drive and motivation to promote and encourage
happiness wherever he goes. There is no place in harmonious society for his exact antithesis.
Via tampering with the human brain MCs hope to determine what causes differences in
behaviour and find ways of manipulating the natural processes of thought and behaviour with
the intention of ultimately dictating it.
British security acts legislate MI5 (the security service), MI6 (the secret intelligence service),
GCHQ (Government Communications Headquarters) and national crime services to work in
partnership and direct support of one anothers schemes. Mindcontrol agents are no
exception to this rule and have the full use of government services at their disposal, including
the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates
of criminal activity identify them as some of the most influential and dangerous civil servants
functioning in political arenas today.
The Human Brain and Behaviour
To run a plausible mind control operation MCs must remain informed about new developments
within their field. This means being open to the idea that theorists from a variety of
occupational sectors may inadvertently offer new, healthy, innovative notions from which
feasible mind control strategies may be born. This section explores two fundamental mind and
behaviour theories.
One very famous pioneer interested in the advancement of brain exploration was Dr Jose
Delgado. He became the Professor of Physiology at Yale University and wrote the controversial
book Physical Control of the Mind: Toward a Psychocivilized Society. Dr Delgado highlights
the need to study the brain as a quest for human survival. He stresses that man survived life
where other species, like the dinosaur, failed because of his unique ability to acquire
knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way
since realising he could increase his welfare and wealth by investigating the properties of the
planet and manipulating their function to his own devices. He portrays the human being as a
master manipulator of the environment, flawless in many ways but ignorant of the conscious
mind working behind the innovations and formations he creates. Ideally the doctor hoped to
use his findings of brain exploration as a stepping stone to creating a healthier society.
His genius lies within his ability to carefully weigh up the advantages and relevance of brain
activity in everyday living. He states the following issues as being at the foundation of his
theory.
There are basic mechanisms in the brain responsible for all mental activities, including
perceptions, emotions, abstract thought, social relations, and the most refined artistic
creations. These mechanisms may be detected, analyzed, influenced, and sometimes
substituted for by means of physical and chemical technology. This approach does not claim
that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious
fact that the central nervous system is absolutely necessary for any behavioural
manifestation. (Delgado J, 1969)
What Dr Delgado highlights is the fact that the human body is a machine (controlled by the
brain), and that its overall behaviour, response and function may be predicted and modified.
This theory reaffirms the MCs suspicion that, with the right selection of armaments and
expertise to hand, they could manipulate a human into doing anything they so desired.
1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning
and thought-reform techniques. Ultimately, the soldier switches sides and starts working in
partnership with the enemy feeling and believing the enemys pain.
2. A human being may be drugged and suspended in an emotional high of acute depression or
prolonged euphoria for weeks at a time.
3. Mindreading machines could extract a human beings personal thoughts and decode them into
actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer
be inviolable.
To understand further the full implications of brain activity on human behaviour, academics
Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in
violence and anger management, highlight some interesting points in their book Violence and
the Brain. Although Vernon and Frank agree there are a number of factors such as poverty,
family background and negative social conditioning that may contribute and nurture violent
behaviour, they also believe the functioning brain holds substantial influence. They claim that
all states of being and behaviour are an indication of the functioning areas of the brain; the
brains interaction with the external world, memory and the association the brain makes with
past and present information and experience. Chemical balances within the brain, its physical
composition and response to transmitted information from the rest of the body are all
significant influences.
Vernon and Frank stress that there are parts of the brain that, in susceptible individuals,
help trigger violence. These areas can be pinpointed clearly and are often associated with
aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts
that there are different types of violent behaviour, and that these negative outbursts can be
analysed and categorised into predictable causes, influences and outcomes.
From a political perspective, violent acts help to whittle away and undermine respect and co-
operation for the laws the British government uphold in the regulation of civilian behaviour.
On a global perspective, governments are placed in the inevitable position where they must
spend billions of pounds on an annual basis paying for the damage that (foreign and native)
rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs
responsibility to help contain this problem and redress the balance of power.
Due to the nature of their work (espionage, sabotage and military enforcement) MCs are
active participants in violence and aggression, but are also frequent casualties themselves. It
is only logical, therefore, that they maintain a vested interest in this arena.
Covert Wars With Civilian Populations Human Experimentation and MKULTRA
Mind-control victims (MCVs) are very diverse characters of differing background, age, race and
class. Individual claims of victimisation tend to be extremely uncommon and are especially
sparse in relation to the worlds population as a whole. One is more likely to come across
witches and Santa Claus than genuine MCVs.
First of all, there arent any apparent limitations as to where MCVs and MCs are found.
Evidence clarifies that they are actively resident in America, Sweden, England and Canada,
and most likely the rest of the world too. Secondly, human subjects are usually Mr Average
and have no social links with either government agencies or dissident groups. Only a sparse
number are members of spy networks, or terrorists who pose a genuine threat.
The general characteristics of mind control victimisation suggest MCs are running extensive
experiments on MCVs ranging across continental borders.
1. The British are deploying their MCs to foreign countries to acquire experimental subjects.
2. Operatives are picking to order individuals of varying background and personality trait for
experimentation at home and abroad. Subjects are administered mind control arsenal
unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments
are most beneficial and conducive to mind control research as potential victims are
incarcerated for the immediate. This provides MCs with the opportunity to control the
treatment that subjects receive, enabling greater flexibility. Operatives are able to use the
results provided as indicators of how their arsenal would realistically perform in the field.
3. Victims range from the newborn child to the elderly, suggesting there is a great need for
extensive studies spanning a possible eighty years of an individuals life. Undoubtedly human
development and age influence the efficiency and practicality of some forms of arsenal. When
administering hallucinogens, for example, the dosage must be customised to the size of the
person, and gender is an obvious issue.
Perhaps the most notorious mind control experiments known to mankind were those
conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began
their research in the early 1950s under the code name MKULTRA and it was rumoured that
superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding
with the testing and intelligence gathering. The CIA were particularly interested in studies
concerned with memory enhancement, psychotherapy for psychological-warfare purposes,
truth serums, poisons and electroconvulsive therapy.
The CIA had an extensive requirement for human subjects and strove hard to find them.
Unwitting victims were the most prized as their reactions to arsenal realistically put theory
into practice and was the ultimate indication of success or failure.
Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric
Press), published the book Psychiatry and the CIA: Victims of Mind Control to shed some
light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to
his fathers admission to the Allan Memorial Psychiatric Institute (Canada), where he was
treated by the renowned professional Dr Ewen Cameron who at the time had been
commissioned by the CIA to undergo testing on his patients. The experiments hoped to
provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy,
LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique
Psychic Driving.
Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were
rumoured to have burned all their mind-control files during the 1980s. However, conspiracy
theorists and members of the American military remain sceptical, believing that the MKULTRA
project is thriving but has evolved into a new scheme utilising exactly the same techniques
and regimes.
Britains MI6 might not have officially been charged with MKULTRA dealings like the CIA but
were equally active in the programme, and were major players in the race for political power
and world domination. Whilst mind control techniques and strategies may have changed
throughout the decades, the ethos and concept remains the same. The British Empire hasnt
faired badly in war on a global perspective and their pursuit of mind control strategy may be
one of the many reasons why.
Definitions of some of the most prevalent mind control specialisms are listed below.
ESB (Electrical Stimulation of the Brain)
ESB involved the transmission of electrical currents (using electrodes) to different parts of the
human brain. Using ESB, MCs could influence the human thinking process, manipulate motor
movements and place victims under a number of different emotional states, like anger,
happiness and fear. ESB proved the human body could be controlled externally via the brain by
use of permanently implanted electrodes and a remote control.
Sound Technology
Sound technology focused on the effects music and sound have on mental health; how certain
lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings
within the mind. Tunes that were played repetitively, for instance, induced depression,
violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked
thoughts of freedom, anarchy and happiness. This led to the understanding that
concentrated, prolonged, highly explicit lyrics could aid interrogations and the breaking of
captives. This is because musical lyrics and their topical content (love, family, aspirations, sex
and guns) linger within the realms of the brains thoughts via association even after the tracks
have stopped being played. MCs ensure the captive hears music prior to and after
interrogation to invoke emotional instability and lack of confidence.
Brain Mapping
Brain mapping was of great interest and concerned research that helped MCs pinpoint which
parts of the brain and body were responsible for different physical capabilities, e.g. the ability
to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line
of research was pursued primarily with the intention of finding ways to understand and define
human behaviour for eventual manipulation.
Sensory Deprivation
Sensory-deprivation studies investigated the psychological and physical effects the prolonged
absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques
included those of:
blindfolding captives using goggles and bags;
forcing captives to wear sound-proof earmuffs;
afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
bright, fluorescent, flashing lights, which blinded the eyes;
exposure to severe temperatures of heat and freezing conditions.
Military captives who were consistently denied their physical senses for weekly and monthly
periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal
thoughts. Captives also lost track of time and were unaware whether it was night or day.
Brainwashing and Behaviour Modification
The capability to surreptitiously alter an individuals point of view and direct him towards
another way of thinking attracted radical attention from MI6. They believed human beings
could be influenced during interrogation and incarceration periods with greater efficiency,
manipulating individual viewpoint and attacking personality trait. This strategy was achieved
in the following three ways.
1. Attacking the identity of the person. Subjects are racially abused; prominent physical features,
like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This
depletes the subjects confidence in himself and, in an ideal scenario, the subject takes on the
manipulators viewpoint and wallows in selfhatred and pity whilst striving for new perfection.
2. Stripping the person of all decency. The subject is denied clothes and forced to face the
humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food
and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up
and down for an hour. This technique reinforces the idea (in the subjects mind) that he is
owned property (a slave) and that to cough, laugh or urinate without being granted permission to
do so is a sin and a direct act of defiance, punishable through death.
3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement,
the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed
acceptable. This means extra recreation time, larger food rations, a clean shower and the
acquirement of items like books, pens and paper. In the case of negative reinforcement, the
subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane
instruments. The subject lives by the perpetrators rules without questioning them and does
what he is told. Out of genuine necessity the subject sees conformity as a means to survival.
Sleep Deprivation
Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling
the nervous systems ability to function to optimal performance. The manifestations of
prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations,
slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and
forgetfulness. British agents involved in the interrogation of suspects rely heavily on this
method as it makes the extraction of information from prisoners easier.
Torture Techniques
Torture basically incorporates any act used to cause pain and suffering of a captive with the
intent of orchestrating severe punishment, obtaining a confession, coercing individuals to
take on a given viewpoint or enforcing behaviour modification. Torture is an ancient
technique often favoured for its aid in interrogations. Usually the inflictions made on an
individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious
reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence
information through fear for their lives. The torture of enemy troops has always been deemed
beneficial because even the smallest details of information can turn a war around and gain the
captor a substantial advantage. Strategies utilised included the following.
1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing
uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-
fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of
discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron
rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin
gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are
century-old techniques, valued because the instruments used are cheap and easy to come by, and
most British soldiers carry matches and knives as a basic utility. MI6 dont value this highly as a
preferred technique because permanent marks of disfigurement are clearly noticeable and
wounds caused by cutting and burning, if left uncleansed, turn sceptic.
3. Starvation. The captive is denied food and water. The body left without basic sustenance begins
to deteriorate. Within one to two weeks the captive is desperate to divulge information that the
captors have requested; anything to relieve the demoralising, painful and desperate suffering of
dehydration and malnutrition.
4. Electrocution. Electrocution is utilised because it doesnt leave cuts or abrasions to the body,
and the intensity can be amplified and decreased using a remote control. The use of
electrocution as a torture technique is illegal in most nations but is utilised on civilians in the
form of an electroshock stun gun or taser gun by American and UK police forces.
Hypnosis
Hypnosis is a state of mind which is induced using concentrated focus and thought aided by
the guidance of an interrogators reassuring and convincing voice. Visual stimulation, physical
movement, external noise and environmental influence are restricted so that verbal
suggestions are easily assimilated into the targets subconscious mind. It is hoped that, once
the target leaves the hypnotists presence, the information assimilated into the subconscious
mind will be recalled by the brain at relevant intervals. The target then believes the
knowledge/information which pops up from his subconscious is the ultimate truth and follows
this truth as a gut reaction without questioning its logicality. MCs often administer drugs to
help induce heightened hypnotic states.
As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD,
hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation,
which makes mind control a worthy adventure.
MCs have managed to unravel an entire realm of questions and answers regarding humans and
behaviour. They have divulged the great possibilities empowered to civilisation if the brain is
controlled right down to the minutest components.
If mind-control scientists succeed in their technological pursuits, society will undoubtedly
have to make way for these new developments and evolve with them. Over a period of
countless centuries, MCs will manipulate human-being behaviour using a range of artificial
devices, biological technology and social conditioning to create the British governments ideal
harmonious civilisation. MCs will also utilise this same technology to bring down populations
and foreign armed forces to the brink of destruction. Mind control is a developing science,
which is becoming ever more sophisticated as greater numbers of contract-funded
intellectuals join the rat race.
ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY
(Mind Control in Practice)
Alien Abduction and Medical Exploration
Human beings throughout the twentieth century have always claimed to be victims of mind
control technology. Aliens from outer space have arrived in UFOs and whisked them away to
unknown planets and subjected them to endless routines of torture. Implants have been
surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a
frequent basis. Some individuals claim to have been abducted more than twice and believe
they suffer continuous harassment from their alien antagonists.
Dr Helmut Lammer, author of the book MILABS: Military Mind Control and Alien Abduction,
brings to attention his analysis of implant technology and the alien abduction saga. The doctor
claims mind control practice is rife, and pays particular attention to the CIA and global-warfare
history, both past and present. He suggests that some alien abductees are disillusioned
subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities
have befallen them. He backs up this theory with case studies of abductees who have proof of
medical tampering, and the unauthorised deployment of treatments which physicians havent
mentioned in the consultation room. Brain implants in particular (of various designs) are most
commonly discovered by chance due to a patients persistent pursuit of a competent doctor
and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance
Imaging) and x-rays, and can be as small as a grain of rice.
He claims the existence of aliens and their extraterrestrial implants are, therefore, not a
reality, rather some fabrication of the truth brought into existence by mind-control
professionals attempting to quash suspicion and hide illegal activities.
Dr Helmut Lammer alleges implant technology was developed sometime after World War II due
to increased global military competition, and that the research conducted encompassed
aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information
from brain activity to a computer. The correlations of biological activity are in eventuality
decoded into actual behavioural manifestations, allowing the subjects lifestyle to be
understood and analysed. The doctor states that the similarities between alien implants and
man-made telemetric devices are uncanny, and follows the assertion that the implants
abductees refer to are readily available and marketed to research professionals across the
world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the
telemetric implant called the stimoceiver, which he designed in the 1960s.
The stimoceiver is an implantable device used for direct communication with the brain. The
instrument is fitted with electrodes, which monitor the electrical emissions occurring within
different parts of the skull and, most importantly, can send electrical signals to defined parts
of the brain to produce involuntary actions and mental states. The bio-feedback from the
stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on
psychiatric patients undergoing treatment and surmised that he could block the thinking
process, inhibit speech and movement, and produce fear and hallucinations. The doctor
engineered research which helped establish the fact that correlations of electrical activity
within the brain directly correspond with specific types of behaviour.
Modern stimoceivers are often referred to as acute probes and have been miniaturised to a
mere 4mm in size. The acute probe is still in its early stages of development and, on a legal
medical note, is being used to treat illnesses like dystonia and severe depression in suicidal
patients. University students and lecturers also utilise them (usually in the operating theatre
and in animal experimentation) for scientific inquiry.
The alien-abduction conspiracy follows the assertion that humans are experimented on: first,
as a means to impregnate them for racial mixing; and second, to cause the eventual downfall
of the human race using a strong concoction of biological warfare and space-age technology. It
appears that in twenty-first century Britain extra-terrestrials have some mighty stiff
competition from a growing number of laboratory technicians and medics.
The Human Body, Radio Communication and Electromagnetic Stimulation
Since the mid-1990s the World Wide Web has become a major player in global communications
and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy
theorists converge and exchange information. Mind-control websites are in clear abundance
and victimisation claims of electronic harassment highlight that MCs are using a number of
prevalent tactics and techniques.
Audible Voice to Skull and Microwave Hearing
Voice to skull is a form of radio communication, which enables MCs to transmit conversation
directly to the brain. The sound (as described by victims) appears to radiate from behind the
head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound
distance and intensity of radio signal remains the same regardless of the heads orientation.
The hearing of voices in the head has always been associated with the onset of schizophrenia
but military science suggests the transmission of spoken word to the brain isnt an enormous
impossibility, and that the science behind its application is coveted by MI6.
The truth is that humans can hear themselves think in spoken word and perceive sound
without the aid of their external ears, and it is the complexity of the brain which empowers
this. When human ears detect acoustic sound frequencies from external sources the sound
waves are funnelled via the external ear, hit the eardrum and are translated into nerve
impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.
When MCs transmit voice to skull, they speak into a microphone, which transforms verbal
speech/sound signals into encoded electrical pulses. These radio-frequency pulses are
directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes
the electrical pulses into understandable spoken word and sound. Ensuring the encoded
electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears
the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and
communicate with a subject many miles away.
Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-
modulated microwaves at the auditory nerve during their time at the Walter Reed Army
Institute of Research. The transmission of sound via the auditory nerve has been practised
since the mid-twentieth century and has proven successful even in hard-of-hearing subjects.
The employment of ESB enables targeted subjects to perceive sound depending on the
frequency and amplitude of stimulation. The auditory symptoms include those of constant
buzzing, clicks and what is called ringing in the ears. If utilised for extended periods of time
the loudness and variation in noise causes lack of concentration, distress and high irritability.
Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had
unlimited communication, thus enabling the abandonment of conventional
earpiece/microphone headgear, which is a visible target on the battlefield.
Voice to skull brings into focus the growing number of psychics, alien abductees, witches and
psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise
with the devil on a frequent basis. The realisation that MCs may effectively talk themselves
into a human beings life and pose as supernatural powers seems blasphemous. What is clear is
that intelligence agents and medics have tried hard to master this skill and that there are a
growing number of MCVs confirming its deployment.
Electromagnetic Torture Involuntary Motor Movements and Actions
A brief consultation with any practising neurologist would confirm that the brain is primarily
responsible for all voluntary movements and the co-ordination of a vast number of muscles
within the body. The fluid movements and precision of muscle control executed by break
dancers and gymnasts are very much representative of the brains capability. Neurologists can
map the functional areas of the brain in diagram form, enabling them to pinpoint the regions
most responsible for independent movement. The motor cortex, for example, is responsible
for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.
MCVs have long claimed that MCs have the capability to physically torture them irrespective of
global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle
movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of
the acute probe and the electrical signals it produces to cause involuntary actions.
MCs arent content with the medical professions notion of brain stimulation as consultants
utilise electromagnetic research primarily to improve health, not damage it. MCs are
interested in the acute probe as an intelligence aid, so it helps to know what happens when
levels of brain stimulation are increased beyond the brains natural capacity and capability.
Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding
that ESB may realistically be used as a torture weapon that surpasses conventional methods.
MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening
contractions) within the human body by applying variations of electrical stimulation, causing
pain as the muscles and tendons are strained beyond their maximum range of motion. This
form of torture is useful, the main advantage being that sensitive areas of the body, like the
genitals, eyes and tongue, may be isolated and afflicted independently. The acute probes
electrical signals travel from the brain into the spinal cord and stimulate the nerves and then
the muscles; the muscle tissue then contracts. In general the severity of pain and wounds
inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and
spine.
Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with
ringing, clicking and buzzing
Repeated spasms and contracting of muscles
and tendons within the body
Bleeding and discharge from the nasal cavity
Electromagnetic torture is unique as it is performed without the necessity of incarceration, so
MCs neednt be in close proximity. The victim may, in fact, be over 5,000 miles away on a
distant continent. The greater advantage is that the victim cant escape his tormentor
without appropriate medical intervention, i.e. surgical removal of the implant.
The Implant Specialists
The culprits responsible for the upsurge in implant technology are unsurprisingly not alien
invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to
implant technology and for the sake of espionage work for the British government under the
umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense
that, by preference, enemies are fought not in the field using guns and bombs but through
utilising electronic-communications technology. This way they may collect information,
analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the
potential number of casualties lost in battle. Implantable devices are just one of the many
sophisticated communications products British security forces employ, and they are granted
ample funding because they are multifunctional devices favoured for the following three
reasons.
1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant
on their exact function, and enable researchers to establish the whereabouts of their target
using a receiver that detects the implants transmitter signal. This scientific technique is
frequently used on mammals like sharks where their movements are tracked within the vast
open seas. Conservationists, as a result, are able to locate their shark many miles away and
monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small
now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest
Mice roaming wild and cultivated fields.
2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct
link between the human body and computer, like electrocardiograms. These devices enable
researchers to study the intimate functions of the body closely by monitoring organ activity and
reactivity. They are frequently used in the monitoring and assessment of mental illness, heart
activity and brain dysfunction. From an intelligence agencys perspective, monitoring devices
may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression.
This type of research is essentially useful to the MoD (Ministry of Defence) as these common
conditions often influence soldiers and their performance on the battlefield, interfering with
perception, physical co-ordination, eyesight and, ultimately, performance.
3. Manipulation and Control. These implants are probably the most controversial of all as they are
both intrusive and obtrusive to the human body. They empower an external party to influence
the thoughts, functional body parts and behaviour of another. The devices themselves are often
telemetric instruments and are frequently inserted into laboratory animals undergoing
behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to
a dogs brain every time the animal disobeys a command. The dog quickly learns via association
and negative reinforcement that if he doesnt sit when told to hell be harmed.
Implants are attractive in the sense that they are hidden from view within the body and are
difficult to detect and remove without professional intervention. One would have to gain
access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.
Bearing in mind the surveillance perspective, the possibilities are vast for intelligence
agencies: audio equipment may be inserted under the skin, possibly within the face or arms,
and enable operatives to eavesdrop on all of an implanted subjects verbal conversations. This
tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are
limited once the subject leaves his bugged household. Interaction with strangers and
associates in the street is also acquirable without operatives having to rely on second-hand
information from bystanders and culprits who may deceive. The most advanced implantable
device is undoubtedly one which incorporates all five features of tracking, monitoring,
manipulation, audio technology and radio communication.
The Gaffer
Perhaps the easiest way to understand the IS strategy is to view the entire operation as a
business where there is a clear, identifiable organisational aim and staff hierarchy; a unified,
cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there
is twentyfour hour monitoring of a victims life.
Project Co-ordinators
Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is
the strategic driving force behind the operation and is often in control of funding initiatives,
equipment, staffing levels and the distribution of workloads. The co-ordinator knows his
department and subject area well, and may spend precious time holding talks and
presentations throughout Great Britain at renowned universities, such as Cranfield. He is a
well-paid specialist and more often than not has a Masters degree or PhD title to his name. As
the head co-ordinator it is his task to be on the lookout for new opportunities to market,
network, expand and spread the word about his work and team. Primarily the co-ordinator
services the government but, dependant on the political environment, secrecy acts and
commercial influences, expertise and implantable devices are granted deployment by private
institutes and overseas military forces. A project coordinators investigations, for example,
may uncover a way to cause temporary paralysis in implanted victims without the use of drug
administration but using electromagnetic stimulation. This research is likely to remain
classified for the immediate but, eventually, could be used for mob-management strategy on a
global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to
calm rioting crowds would be replaced with an electromagnetic beam (transmitted from
portable transmitters and receivers), which would hit all human brains within a ten-metre
radius. The beam would cause immediate paralysis in marching rioters, making the booking and
arrest process considerably easier. This strategy would lessen the damage to property,
decrease the number of police casualties and relieve pressure from emergency services. An
electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield
to incapacitate enemy forces without killing them, instead rendering them too sick to fight.
Consultants
The consultants comprise an invaluable team. Like the project co-ordinator, they are high-
flying, wealthy academics the best and brightest specialists Britain has to offer. They are the
intelligence scientists who oversee projects and advise on all aspects of the mind control
scheme.
The development of an implant in general requires the full attention and expertise of many
consultants, some of them foreign if absolutely necessary. They comprise of the following.
1. Neurologists and associate medical staff who understand the brain and its complicated activity.
2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for
miniaturised implants to be tested on animals and, eventually, humans. These implants must be
easy to insert, hygienically clean and safe to use on a permanent basis.
3. Sociologists and statisticians who understand human culture, economic trends and factors that
influence them, e.g. birth rate, life expectancy, educational standards, the British populations
health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
4. Factory contractors who can mass produce implant technology in secret and at a reasonable
price.
5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental
influences and produce behavioural models based on induced mental states.
6. IT and telecommunications staff at GCHQ who can produce customised communication systems,
software and interactive devices to enable the safe, covert detection, monitoring and
transmission of information over vast areas of space quickly.
Without appropriate input from consultants to advise, research, direct observations and
analyse data, the project co-ordinator and the rest of the mind-control team are completely
lost in their pursuits and lack the skills to forward the project to greater heights.
Field Agents
Field Agents are the mind control administrators. Their role is primarily concentrated on
interacting with the victim in liaison with the project coordinator and consultants requests.
They ensure the close monitoring of the victims life and the networking of information
between internal staff.
Field agents must find an effective way to induce and nurture the behaviour that the
consultants wish to observe in the victim. This means attempting to control the environment
and anything else that may influence the victims behaviour. Harassment revolves around the
victims lifestyle and identity, which may be split into two major areas of activity.
1. Home Life and Recreation.
2. Work Life.
Where home life is concerned, field agents concentrate on family relations and activities. In
this arena agents make frequent contact with the subjects kin, flashing lawenforcement
badges to establish authority. A study on depression and trauma, for instance, requires that
the subject be depressed for extended periods of time, and sometimes chronic depressive
states have to be induced to acquire the necessary electrode readings. Family contacts ensure
the subject is spoken to at necessary intervals and treated accordingly to aid the research
process. This may entail boosting the subjects selfconfidence or lowering it using instructed
verbal communication, physical body language and inclusion/exclusion tactics. Families are
more often than not happy to comply with demands, especially if led to believe that co-
operation may improve their loved ones welfare in some way.
Observation of the employment work-place routine enables agents to familiarise themselves
with the layout of the building and environmental psychology the lunch room, toilet
facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify
where the victims work station is situated and how he will move in and around the office on
a daily basis. Agents endeavour to create an artificial environment where the victims every
move is interacted with, controlled and manipulated on cue to produce prolonged depressive
states. Work associates and managers are spoken to in attempts to ensure the environmental
psychology is in the correct balance and remains so for the duration.
Field agents work in numbers of two or more and, in cases of voicetoskull harassment, its
the radio communication from these agents which victims hear. They are also active
networkers who keep intact the sourcing of contacts like the local GP. Victims suffering
electromagnetic torture are likely to visit the doctor more often perhaps than average. The
subject will convey information to the GP about his health, which may be of extreme interest
and aids the research gathering process. In this event, field agents ensure the victim is sent
to the relevant specialist and receives meticulous medical examination. Copies of the results
are forwarded to the IS who, upon receipt, will understand the influence their electronic
harassment is having.
Field agents are great believers in economic sabotage, which is often utilised in attempts to
force a victims lifestyle to diversify in accordance with research expansion. Great Britain, for
instance, is run by hundreds of different governmental authorities who as a collective help
manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated
withdrawal of these services can both damage and improve human welfare relatively swiftly.
The following two theories identify the key ideologies behind economic sabotage.
Employment = Pay Cheque
The employment = pay cheque concept surmises that human survival in Britain comes down
to career prospects and financial status. The capital raised from employment ultimately
dictates the quality of lifestyle and opportunity a subject may pave for himself. This
encompasses educational advantage, his stake in the property market, travel capability,
nutritional diet and size of family he may comfortably afford, investment opportunities in the
stock market, recreational activities and the possession of commodities like cars, computers,
digital TV and telephones. Using their law-enforcement status, field agents illegally force
subjects into substantial bouts of employment and falsified redundancy to best accommodate
their mind control project.
Welfare State = Public Welfare
The welfare state = public welfare theory surmises that partial aspects of a British citizens
welfare arent necessarily dictated by individual financial status. The welfare state and tax
system ensures funds are allotted to those who most require them as this strategy creates a
sense of equality and inclusion amongst the classes. Most importantly, the minimal human
requirements of food, water and shelter are met because British citizens are granted access to
a number of statutory public services. Organisations like the Home Office, NHS, Social Services,
Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this
welfare strategy. In this arena the field agents aim is to manipulate the advice, welfare
service quality and customer care that the subject receives in a way which meets project
criterion. The marginalisation of the victim within society is most essential; it is important
that every aspect of the subjects life is under magnified analysis and is controllable down to
the minutest components.
Experimental Subjects Locating Specimens
Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The
NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit
consultants for a vast variety of ailments and treatments. Registered citizens across Britain
have an allocated NHS number and medical record, which enables security forces to identify
individuals by:
Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations
The IS search the NHS medical-file databases for potential victims of relevant identity, and also
have access to medical departments within prisons, military bases and psychiatric institutes to
maximise catchments.
In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This
isnt to say, however, that medical staff are acutely aware that the patient concerned might
be molested while under the influence of anaesthesia.
1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical
intervention or for surveillance and torture?
2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient
without falling foul of the law himself?
Doctors have no jurisdiction over their patients welfare where security forces are concerned.
Security forces still retain the legal right:
to transfer a patient to another hospital against his wishes;
to extradite a patient without medical treatment; and
to administer whatever medical intervention to a patient they so wish, with or without his
consent and knowledge.
Looking at the experimental subjects theory, its easy to understand how MCs pick to
order their subjects and distribute implants to so many.
The Design, Testing and Analysis of Implants
There are six essential stages to the IS testing and analysis strategy.
Research
Design
Testing and Refinement
Implementation
Analysis
Conclusion
Where Research is concerned, consultants analyse the success of bygone experiments as well
as appreciate the modern. This entails briefings with professionals of the relevant field and
scouring the bookshelves of medical and military libraries for data-collection purposes. Case
studies will be sought and investigated (depicting both success and failure) to highlight
potential complications and spark innovative ideas. Foreign intelligence, if available, dictates
the plans of action and overall development of implant design, which must be competitive on
a global scale and outperform those already in circulation.
Using all the relevant research the consultants have collated, they must then Design a strategy
that will help them achieve their objective. They will have to decide whether or not it is
feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a
human being, the individuals identity, age, race, class and occupation will be important. It
will be decided whether or not the experimentee is consenting or unwitting, and how one is
to go about finding an individual who meets the criteria and specified characteristics. The IS
work in networked multi-disciplinary groups, so at some point relevant participants like
doctors, military men and psychologists will meet and discuss the options available, and the
feasibility and funding of the proposed operation. Various implant designs are sought and their
properties investigated.
A pilot study will be performed for Testing and Refinement purposes. Obviously there is the
chance of the project design being flawed; it may be that newly programmed equipment is
faulty, staff arent sure of their role or invaluable resources and funding are withdrawn or
dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point
and extensive adjustments made to the overall scheme of things. It is possible in rare
circumstances that the entire project is abandoned and that the IS decide to start anew. At
this point in the testing phase they have a vague idea of how the study will pull together, the
budgeting costs, the risks involved and the quality of research likely to be acquired.
At the Implementation stage the team have ascertained where and when the research will be
conducted. They will have acquired a number of human subjects who they may tap for
research at relevant intervals. Surveillance and monitoring equipment is set up and
professionals who can translate the output are hired. Telemetric data is recorded and archived
whilst undercover field agents are deployed to subjects places of domicile to cover
environmental and social influences. The manipulation and sabotage of the subjects lives will
commence only if deemed crucial to the objective.
The Analysis and Conclusion involves the dissemination of research. Dependant on the
surveillance systems used, results may be sent away to laboratory scientists who test and
analyse data. The majority of scientists approached arent necessarily part of the IS team and
are unaware that the research has been acquired illegally.
Once the reports are compiled, the IS set about building a picture of individual case files and
eventually incorporate the information into a larger overview. They can look for common
correlations and patterns of behaviour in the data and statistics. How the data is analysed will
obviously vary, dependent on whether the study was to offer investigative, interventive or
preventive insight.
The experimentees dont have faces; they are simply part of a statistic, which is extracted
from a computer database for intelligence committees to scrutinise. The final conclusion
basically encompasses all the information based on the extensive analysis. If the experiments
proved successful there is the option of pursuing research further or remaining content and
assessing ways of incorporating the intelligence into future operations.
From a military perspective the IS have made substantial headway with implant technology.
They have come to the realisation that the human body is a magnificent weapon in itself, and
that all they need do is add a few refined capabilities.
1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to
eavesdrop on the verbal interactions occurring within their targets physical range. This replaces
the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing)
also enables field agents to speak to their target by transmitting electromagnetic radio
frequencies directly to the auditory nerve.
2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict
serious illness, physical wounds and pain. This replaces the common requirement of torture
instruments.
3. Self-destruct Equipment. Throughout military history it hasnt been uncommon for captives to
carry poison pills as a means to commit suicide in the event of capture. Nor has it been
uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A
miniaturised bomb may be implanted within the targets body and detonated on cue. This way
bombs get through Customs undetected and may be carried into high-security establishments,
such as the Pentagon.
4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain
their whereabouts by country, borough and street name.
5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert
operatives to their targets general state of health, like levels of pain and sleep patterns.
Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress,
body temperature and breathing, etc.
Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of
terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and
disperses, and where funding and resources are sourced. The agent may sabotage the
operation from the inside whilst adding to Her Majestys Secret Services wealth of
intelligence.
MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board.
The implants they carry are the early indicators of the British governments Big Brother
nation. Mind-control implants are primarily designed to be carried by British spies and
dissidents (for covert-surveillance purposes) to track and annihilate the operations of
terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate
casualties of the governments experimental testing phase, not the longterm ultimate
targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is
disastrous, the knock-on effects are limited.
To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic
embarrassment to the British government and could, in extreme circumstance, damage
American and British relations. The Americans would detain the spy, torture him for
intelligence and demand a full explanation from the British. If a suitable explanation wasnt
forthcoming, they would consider the death penalty if their security had been compromised.
Preliminary testing phases are only extended to those whose identity is inconsequential. Only
once a technique has been tried and tested over and over with guaranteed results will it be
used on an enemy of the state.
The IS are repeatedly committing crimes in attempts to enhance the safety and security of
their country. In this vicious game of silent warfare all casualties are expendable.
THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?
Mind-control developments bring into question a number of moralistic issues, which are
fundamental in preserving the British legal system and human rights.
Britain has willingly signed up to the European Convention on Human Rights, United Nations
Universal Declaration of Human Rights and, of course, created the British Human Rights Act
1998. The British constitution believes:
everyone has the right to life, liberty and the security of person;
no one shall be held in slavery or servitude slavery and the slave trade shall be prohibited in all
their forms;
no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
no one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, or to attacks upon his honour and reputation everyone has the right to the
protection of the law against such interference or attacks;
everyone has the right to work, to free choice of employment, to just and favourable conditions
of work and to protection against unemployment;
no one shall be subjected without his free consent to medical or scientific experimentation;
everyone shall have the right to freedom of expression this right shall include freedom to seek,
receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in
writing or in print, in the form of art, or through any other media of his choice.
The Right to Privacy, Freedom of Thought and Health
The right to privacy grants citizens to live in domestic domicile without interference from the
government. Citizens may develop close relationships with whom they wish whether they be
social or sexual. The right to undress and bathe oneself in a dignified fashion goes without
debate.
Humans are private creatures and in their element when they have unlimited control of their
environment. They may control who enters their house, may divulge information about
themselves in private conversation, and dictate what they wear and eat. The privately owned
house and the goings-on which occur within it give the individual an impression of territory,
ownership and power.
Brains enable humans to be independent thinkers; to thrive on the freedoms and
opportunities free thought provides. The right to personal autonomy, to develop personal
interests, dictate direction and seek stimulus are major components of a healthy, balanced
mental state.
MCs work hard to challenge the longstanding assertion that a mans home environment is
sacred ground, that his physical body and psyche are inviolable, and that any proposed
manipulation or violation is an unholy adventure. They believe the following.
1. It is dangerous for humans to have freedom of thought, as it isnt always in check with
government idealism.
2. Humans shouldnt have a right to privacy if it distorts truth. Who knows what information the
average human is concealing?
Agents want to live and breathe (in real time) the targets domesticated lifestyle to ultimately
investigate and understand it. They have so many questions regarding human behaviour and
must violate human privacy to make way for their research team of prying eyes and
surveillance equipment. Only by accomplishing this will they learn how a human personality is
formed and understand the intimacy of relationships.
Unfortunately for the victim, betraying every private thought and intimate moment with
government agents is highly likely to traumatise him to the point of severe depression and
humiliation and, in an extreme scenario, provoke suicidal thoughts.
Victimisation
Mind control is a form of brain rape and torture; whether the affliction is caused by drug
administration, electromagnetic stimulation, brainwashing or the nurture of personality
disorders, the end result remains the same. The target is forced to endure continued
harassments. IS mind control, in particular, is likened to slavery because the targets brain and
mind are tapped for research against his will. He is helpless to prevent the intrusion and resist
the brains physical and mental reaction to electrode stimulation.
To date the American Guantanamo military base displays the most public flagrant disregard for
human rights where systematic mind control is highly prevalent. Freed captives have accused
the CIA of utilising sensory-deprivation and sound-technology techniques to install in them
fear and hypnotic suggestions. Theyve been denied physical exercise, exposed to severe
temperatures and prevented from prayer and conversation. When captives have disobeyed
they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs.
On the odd occasion captives have been doused with urine and threats have been made
towards their families if information wasnt forthcoming in the interrogation room. Slowly but
surely the restraints which have kept the human brain and mind inviolable are being eroded by
science.
So long as it remains national policy to protect the security of the British nation and its
interests, the government will strive to produce mind control techniques that are ever more
invasive and efficient. Mind control is such an integrative component of military warfare now
that research pertaining to its use is highly classified.
The government, of course, denies that Mind Controllers exist. Exposure of their antics would
prove undoubtedly that the government is committing criminal acts against the people it is
sworn to protect. Exposure would also make folly of the laws which govern civilised society.
The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as
such. Greater openness and education regarding mind control will help aid the legal process
and eventual conviction of the perpetrators who wish to make political and financial gain from
the suffering of others. It is especially important that those involved in mental health
understand mind control methodology and find ways to effectively treat and reverse the
prolonged physical and psychological effects endured by victims and their families.
Bibliography
1. Andrew, George (2001). MKULTRA: The CIAs Top Secret Program in Human Experimentation &
Behavior Modification, Healthnet Press.
1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin
Company.
1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper
Colophon Books.
1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction,
IllumiNet Press.
1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North
Carolina Press.
RECENT POSTS
SOOL SANAAG CAYN = South China Sea:
offshore exploration and territorial tension
Exit polls show Enrique Pea Nieto winning
Mexicos presidency | ANA
KOURNIKOVA PRESIDENCY
Death of the Birds and the Bees Across America
Pentagon establishes Defense Clandestine
Service, new espionage unit for Africa
Space Mirror in Russia ( Father of HAARP
in USA)
Mercury News: Man with defibrillator wants to
know what his heart is saying
NSA & Artificial Thought Control ( IBM
Blue Beam)
THUGOCRACY: U.S. FED-POLICE VIGILANTES
PERSECUTE CITIZEN TARGETS
BRAIN AND SATELLITE SURVEILLANCE,
ASSAULT AND TORTURE
The New Torture / Murder Surveillance
of America
Russian spy agency targeting western diplomats
using Zersetzung
Conditioning: Aversion therapy
& Desensitization
The scientific foundation of no touch torture
Interview with a CIA non-consensual human
behavioral modification project
Synthetic Telepathy or Psychotronics Movie
(Nowhere Man Episode 4)
ARCHIVES
July 2012
June 2012
March 2012
January 2012
October 2011
September 2011
August 2011
June 2011
May 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog
and receive notifications of new posts by email.
Join 88 other followers
Sign me up!
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
J une 2014
M T W T F S S
Jul
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
BLOGROLL
Artificial Telepathy
Bad Experiment
Center for Victims of Torture
COINTELPRO Original Documents
Freedom from covert harassment
Gang Stalking Journal
Jane Departing
Joel B H File
No Stasi in America
People Zapper
Singapore MC Victim
Spy Chips
Swedish Victims
CATEGORIES
Brainwashing
Gaslighting
Group Stalking
Human Experimentation
Implantable Microchips
Psychiatric Reprisal
Remote Neural Monitoring
Surveillance
Synthetic Telepathy
Through Wall Surveillance
Torture
Uncategorized
Zersetzung
META
Register
Log in
Entries RSS
Comments RSS
WordPress.com
Psychotronics & Psychological Warfare !
Top secret government harassment programs against
citizens!!
HOME ABOUT
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 24 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 25 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 26 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 27 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 28 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 29 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 30 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 31 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 32 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 33 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 34 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 35 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 36 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 37 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 38 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 39 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 40 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 41 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 42 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 43 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 44 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 45 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 46 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certainly just the other
harassment techniques mentioned above result in a grotesque human rights abuse.
But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment
How do you deal withordinarysocialinteractionswiththepigsharassingyou
constantly in yourmind?Doyouactethicallyandwarneveryoneyouinteractwith
that their privacy is also being invaded, by way of you, against your consent? People
youinteractwitheitherbelieveyouortheydont,buteitherwaythesocial dynamic is
completely changed. The pigs invade the privacy of everyone around you, by using
you, even that of your spouse and children. They may also impersonate anyone you
see, in your mind, to make it seem as if that personistheonecontactingyou.
They try to make it seem like everyone can hear your private thoughts, that you are
broadcastingtoeveryone.(Of course some victims might actually be doing that; if
they can read your thoughts they could then broadcast them wide-field or local-
field)
What sort of careerareyouallowedtohaveinasystemwhereyourintellectual
property is stolen the minute you think it up and where you have to cope with both
regularharassmentaswellasharassmentinyourmind?Allthisisin addition to
theordinarystressesofthejobandnottomentionthatsome jobs require actual
mental concentration. How sociable are long-term harassment victims with serious
cases of Ongoing Traumatic Stress Disorder? In American society there are also
plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived
weaknesses in people and home in on them. The Nazis can often just wound a
person and then throw him or her to the sharks, bleeding.
It is natural for humans to think about other people. It is even natural to run a
mental simulacrum process to imagine and empathize with other people. Monkey
see,monkeydo,airguitar,Iwasjustthinkingofyouetc.The rapist pigs try to
turn this against the human beings they torture. Sex is also a natural process, as is
farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.
The rapist torturers try to turn this against their victims. They constantly attempt
to demean their victims. Worrying and anxiety are also normal human emotions.
The torturers, though, try to turn all of these human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry
about or feel anxious about. It is like taking a dynamical system and driving it at its
natural frequency in order to purposely destroy it. Of course this is not to say the
idiots know anything about dynamical systems. If you ever read Lord of the Flies in
junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive
feedback processes in the brain that constitute torture. (If I am teaching these
idiots anything by this, then you had better watch out because they have already
tortured me.) They will purposely injure you and then pick at your scabs if you start
to heal.
This process also happens because you know damn well you are under surveillance
and the pig ridicule squad is there to taunt you. Try not thinking about something
youareconditionedwithcattleprodsintoknowingwillresult in harassment. You
knowthetorturerswillzapyouthatiswhytheygoadyouwithtriggersattimes
but it is like not thinking of a pink elephant on command. Yins produce yangs, so to
speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public
speech. Theytrytosubjectyoutoalltheignoranceandpoliticalcorrectnessand
everything else that someone at a podium in a public place might be subjected to.
The sadist nanny state is not just concerned with what you say in your own home,
they want to regulate what you think inside your head also. That can really cause
yourmoronanticipatorthoughtpatterntodistractfrom your normal private
thinking, because you cannot even think your private thoughts without knowing they
willbereviewedforyoubyrapistmorons.
The Possibility of Magician-Like Illusions to Deceive Victims
The technology for thought inference does exist, but it is important to keep in mind
the ways in which magician-like deception operations can be applied to a person to
make it seem to themthattheirmindisbeingread.Whilesomevictimsthoughts
are read, all of these techniques have likely been tested on nonconsenting American
citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsa
thought into a victims brain and then later the magicianrevealswhattheperson
was thinking. By waving his hands and strongly suggesting to the victim that his
thoughts are being read, the victim seesthephonyevidenceandtendstobelieve
that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced
profiling and prediction, based on standard surveillance techniques, is another
possible means for deceiving a person into thinking their mind is being read. While
some victims have undoubtedly had such deceptions inflicted on them, the black
budgettorturersbeforetheywilladmitthetrueextentoftechnological
advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefully
setting up the illusion of mind reading on a victim, though, is every bit as despicable
and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic
voice-to-skull projection device with the victim in range for some period of time.
Suppose you wanted the victim to think about blue violets, for example. You could
beamatthevictimveryquietsuggestionsofblueviolet.You could send them a
song that they thought just got stuck in their heads. You could use voice cloning
technology and try to fake their own voice in their head. Another technique is to
transmit a word or phrase that is closely associated with what you want the victim to
think about or do, and lettheirbrainsassociativememorydotherest.Now,after
the subliminal send, the tension and drama build until the sadist magician culminates
this particular deception operation against the mark (a.k.a. human being). The
magician sends an email to, say, a public mailing list the victim is known to read. In
the text of the message the magician works in the phrase bluevioletperhaps
combined with a subtle threat.
Multiple Victims, Multiple Perpetrators
The above example is only the most elementary, of course. What if two victims were
interacting, how could a pair of them be manipulated? The variations include two
nonconsensual victims, or a consensual harasser messing with a nonconsensual
victim. There are also witting and unwitting victims; some have figured out parts of
what is going on (intended or not) while others have not. Some have been
purposely dupedintomisinterpretingwhatisgoingon they may think they are
psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you
werentpayingcloseattention,wouldyouknowifyou were the sender or the
receiver? Especially if the manipulation continued for a long period without your
awareness, perhaps even from childhood. When PTSD is purposely induced, the
victim is that much more susceptible. Then you can consider the case where there
are far more than two victims interacting: a society of would-be slavemasters and
those they would hold as slaves. The general situation involves multiple victims and
multiple perpetrators, all interacting.
There are many, many different scenarios. I even considered writing an academic
paper onthetopic,somethinglikeMindControlGamesPeoplePlay.Supposeyou
assume a particular set of technologies is available. What logically follows from that?
It is like science fiction except that the reality these days is beyond science fiction.
The military might call it wargaming. It is amazing the hideous sorts of operations
that are possible with only your basic secret video/audio surveillance of an individual.
Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out?
What countermeasures could be adopted? When it really does exist and the
consequencesaresofarreaching,isntit unconscionable to leave the public in the
dark about it? Could a politician resist abusing this secret power?
For the purposes of the rest of this essay I will assume our composite victim has
beeninjectedorimplantedsomehowwithabrainbugthattransmitstracking
information as well as audio and video of the sights, sounds, and internal
subvocalized thoughtsthenonconsentingvictimexperiences.Thisissomething
like anadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,wherea
cat was wired up as a motor-controlled listening device to be used in spying. The
differenceismanyyearsoftechnologicalrefinementintegratedcircuitswere not
evenavailablethen,letalonenanoscaledevicesandtheobviousdifference that a
human being is being tortured. I assume that this device can also inject sounds
whichthevictimperceivesasifheorsheheardorthoughtthemininternal
speech. This is somewhat less control than what some victims report experiencing,
but nonetheless is sufficient to illustrate most of the methods. Even if such devices
are not available to some particular group, variations of most of the techniques can
be created by lower-tech methods like standard surveillance devices and external
zappingor voice projection devices which are publicly known to exist. The point is
not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig
The term I use foranexternalvoiceprojectedintoavictimsmindistherealtime
idiot. Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret
studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswho
sit and listen to the violated thoughts of the victim. These torturers also have
microphoneswheretheycanconversewiththeunfortunatevictim in realtime. The
victim hears these transmitted voices in his or her head. Perhaps the rapists also
have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly whatthevictimseesthroughhisorhereyes.Any
thoughts the victim has, the realtime idiots try to pretend it is like a conversation
with them. You could not think a rhetorical question to yourself in your own private
thoughts withouttherealtimeidiotscomments.Youcouldnotpauseforamoment
of silent mental reflection. They comment on things, they harass, they goad, they
distract,theytrytoissuecommands,theyattempttodemeanthevictims(Go
brushyourteeth).Thisallwhilethevictimtriestolivehisorherregular,ordinary
life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and
voices into the mind of the victims in order to harass and torture them. This
requires too many low-level Auschwitz guards, though. These dumb sadists may get
drunk and start talking, or they may get religion and try to expose their former
activities. The need for personnel also limits the number of victims,orsubscribers,
who can be controlled by the system. The American answer, of course, is to use
technology to automate the process and increase productivity. This results in a
device I call the autopig (or the Cameron/Delgado memorial autopig).
The autopig atitssimplestisjustadigitalrecorderthatsendsfixedmessagesto
thevictimsatrandomtimes.ThisisverysimilartoCameronspsychicdriving torture
that he inflicted on people coming in for psychiatric health care. I sometimes call
theserandompulsesBergeronpulsesafterVonnegutsshortstoryHarrison
Bergeron(notthemovie,whichisgoodbutdifferentfrom the short story). In the
storyallpeoplewereforcedtobeequalby handicapping those with exceptional
abilities, and strong thinkers had to wear a device which would periodically emit a
loud tone designed to disrupt the their thought stream.
Of course an autopig could also be used as a computer-aided torture device so that
a single human torturer could switch between victims, secure in knowing that none of
themwasbeingleftaloneintheirprivateminds.TheDelgadopartcomes in when
thedevicegetsfeedbackfromthevictimsbrainandsendsanappropriate
message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital
voice simulator constructs it and sends it. Thus each victim has his or her own
electricfenceorsomethingliketheinvisible fencing they use on dogs but more
technologically sophisticated. (You can consider things like stateful autopigs and
stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A
Delgado button is a button the harassers can press and which stimulates some part
of the brain. There may be many Delgado buttons, for example, and the harassers
learn what each one does empirically by observing the victims. To the victim a
Delgado button would just feel like some sensation, experience, or emotion came
over them all of a sudden. It might occur at a particularly inappropriate time, for
example. It might also serve as a distraction when the pigs wanted to stop some
particular thought train you were having. It might be difficult to notice; some
subjects in published research would rationalize such induced behaviors and say that
they just decided to do whatever behavior the buttons evoked. A Delgado button
also need not literally be a button and a brain electrode, it could also be something
like a microwave beam at a particular frequency and with a particular modulation
aimed at a person.MetaphoricallytherecanalsobeconditionedsoftwareDelgado
buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture
Now that I have described the basic mind control operation, in this section I consider
the problem ofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry
to understand the hideous position they were thrown into and which they in no way
got to choose. Naive science-dude has probably not spent 5 minutes considering
what victims are forced to agonize over for years. The situation is closer to game
theorywithamaliciousopponentratherthantotheusualstudy of natural science,
where natural phenomena are considered to be repeatable (or at least indifferent).
The victims must rely mostly on their own sensations and introspection; that is just
the nature of this sort of advanced, secret torture. This is not to say that evidence
oftheordinarysortsofharassmentshouldnotbecollected,or that a
breakthrough will not occur and someone will learn how to detect whatever signals or
devices are used to inflict the mind control torture and make it available to the
victims. The first challenge for the victim, though, is just to figure out what is really
going on. Many do not even have the language to describe what is happening to
them. They have to seebeyondthestagecraft(tradecraft)oftheNazitechnical
illusionists. The victims need to live their lives each day with whatever mental firewall
countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that
for the time being the court system, like the psychiatric system, is part of the
problem.
How many times does someone have to beam a clearly external voice into your head
before you have to question all your thoughts? Not too many times, once really.
Somevictimsofthisoneshotvoiceprojectionmindcontrolmaystillsufferfor
years. When will you believe they are not reading your thoughts or that they are not
trying to manipulate you? When the truth commission reveals the crimes? No, you
will never believe them again once you know how the pigs operate. Most victims
suffer from far more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs
Inside the mind, the torture victims really are human beings just like everyone else
(even though they are treated worse than anyone would treat a dog). They see with
their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned
earlier, these are the processes the mind controllers attempt to hijack. For the
victims we can consider that their thoughts fall into three categories: internals,
conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the
person consensually engages in. The usual thought model that most people have
the luxury of believing is that all of their interactions are consensual and that their
private thoughts are actually private and not tampered with. That is, they only
experience internals.
An externalisanonconsensualinput,likeCameronspsychicdrivingwhereaperson
is strapped down and forced to listen to manipulative recording loops. In the
modernsense,theexternalsarethevoicesprojectedintoapersonsmind from an
external source. (You can theoretically have consensual externals, even of this sort,
but the victims certainly never saw a consent formandyoudbeafooltoconsentto
having the pigs the victims are familiar with have anything to do with your mind.)
The signal from a programmed autopig chip in the head would also count as an
external. An external could also be an email from a Nazi that is based on mind-raped
data. Any normally consensual interaction becomes an external when mind-raped
data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought
process thatisadirectresultofthetorturebyexternals.Thementalfruitof the
poisonedtree,sotospeak.Afteraweekorsoofhavingyouareagoodmarine
drilled into your head from nonconsensual externals, then when the machine is
turned off there will likely still be the tendency to hear the phrase. (Besides whatever
other damage such harassment causes.) This is especially true if the conditioning
was specifically focused on certain stimulithoughrandomstimulialsobecome
conditioned in the same way that a bell ring is associated to the bowl of food by the
salivating dog. A similar-sounding phrase, for example, can serve as a trigger for a
conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their
own homes like controlledrobots.Peoplessensitivitytowhatisinternalorexternal
intheirheadwouldvaryaccordingtotheperson.Age,lengthofabuse,and the
particular technology and techniques used would also influence who becomeswitting
nonconsensual.Perhapsthisisapartofwhatdetermineswho they harass and try
tobreakandwhotheysecretlycontrol.Thosesusceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it
terrorism to call for blowing upaNazitorturecenterthatdoesntexist?)
The Protocol
A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel
you wish to authenticate. In practice, what you learn is that if there is such an
external channel you do nothaveafriendlywittingontheother end. (And victims
know from long experience that there is such an external channel.) That is, the
protocolisawaythatafriendlywittingcould authenticate to you the existence of
an information channel that supposedly doesntexist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It
is better if they cannot see or hear you, since that constitutes another, uncontrolled
data path.) Suppose you can hear a person talking. Then the protocol is to think to
yourselfsomethinglike,say4533.You may wish to choose something else they
could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for
a response. Either they hear your thoughts or not, and they either respond or not.
In this case the channel is specific to a person and may not exist or the person may
notbeafriendly.Forvisualcontactthesituationissimilar,youcan think
somethinglike,holdupthreefingers.Noticethatthisprotocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol
worksforwrittenmedia,thinkwritethenumber6423andemailittomeorputitin
your newspaper column. Note, though, that in all cases there may still be a hidden
maninthemiddle.
You can actually verify a pure external send and receive without visual, auditory, or
tactile contact.Justthementalcontact.Thisappliestoanyoneandeveryone who
can hear your thoughts and send a reply. It requires that you have a calculator, and
a cooperative person with a calculator on the other end of the channel. The protocol
is,Whatisthecosineof1999?The first four digits after the decimal, in radians,
one at a time. If the pigs cannot send that data they are either retarded or engaging
in a conspiracy. There are a couple of other possibilities, including pure internals, but
the point is to have a cryptographic authentication challenge to verify a pure external
send and receive. Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator. I
do not know the answer, but I can check it easily. [You should change the number
1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to
yourself," and choose a new challenge number each time you check a response with a
calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do
send numerics, though, and could presumably program the answer into the autopig.
And they get sloppy sometimes and you get a good strong piece of data that
indicates external reads and sends, even though they do not send the protocol.
This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous
situations. But keep in mind possible magician-like deceptions as were mentioned
earlier.
The Calibration Problem
In evaluating uncertain data in the real world, including that from hostile sources, it is
important to calibrate the expected level of background noise. If you are reading the
torture between the lines, you also need to keep your head and not go off on too
much unconnected symbolism. Keep this in mind when reading items that truly could
not possibly relate to you or your situation. This gives you an idea of the basic
background level for symbols, etc., to appear. Keep a threshold and discard any
questionable data. The good data points tend to be frequent enough, and at some
point even they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you
get them angry they sometimes screw up. Say you were taunting them by asking
them whether they picked up your thoughts in Niger (as an random example of a
far-off place). By the way, you can taunt them all you want in your head, since it is
only you and the Nazis there. Likewise, curse the pigs that bug your house all you
want. They just do not seem to understand that if they reveal anything they know
about your private mentation or private conversations in your home they cannot call
you crazy. It would be like entering the FBI tapes of Martin Luther King saying the
FBI wasouttogethimasevidencethathewasparanoid.Thevoiceinmyhead said
Iwascrazy.BacktotheNigerexample,supposeyouthenget email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he
went to Niger and could not escape the harassment. That seems pretty unlikely for
a coincidence. Then the question is, is the person a witting or unwitting harassment
agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro
agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty
One thing that themindcontrollersdoandwhichmanipulatorsandpropagandists
have done foralltimeistoexploitweaknessesinhumanreasoning.Thebrainis a
fantastic, beautiful organ of the human body; no human being on the earth should
ever be tortured. But humans also tend to have some weaknesses in evaluating
data compared to, say, a mathematical algorithm. One difficulty lies in dealing with
uncertainty. The mind control victim is literally overwhelmed with uncertainty and
must sort things out as best as he or she can. The victim has to consider every
weird thing that has ever happened to him or her, whether it is related, and knowing
that the mind rapists will see this thought process and try to reinforce any
misconceptions. Another difficulty is dealing with distractions, especially when they
comeinonahostilechannelthat the brain was never meant to be accessed on.
Proportionality and scale are another difficulty, and people tend to think binary rather
than continuous, and one-dimensional rather than multi-dimensional. People often
have a tendency toward superstitious thinking. Finally, in a social sense, people are
very bad at dealing with big lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As
an example, you know that there are some people in the world you can trust; you
justdontknowexactlywhichonestheyare.Youcanoftenestimateaggregate
statistics better, since if you get one wrong here or there it all averages out.
Suppose you estimate, based on a great deal of data, that posters on some mailing
list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who
probably consider themselves scientific, nonsuperstitious thinkers looking for the
truth, and another 10% who are unclassifiable. There are some who you are sure
enough about to not worry with percentages, but in general any particular person on
thatlistissuspect.Nonetheless,the list can still function as a way to reach and
connect the 35% of mind control victims and activists. It may also serve as a way to
convince and educate some of the actual open-minded decent people who are not
mind control victims. Another use of aggregate statistics is to reason from historical
records. We know that there are thousands of mind control victims in the
population, at the least. We just do not know which particular people claiming to be
victims are the actual victims (or which still unwitting people were/are victims). Never
forget the humanity of the real human beings involved in the statistics, though.
The Asymmetry of Dignity
You are a human being with unalienable human rights. Unalienable means that they
cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being
with unalienable human rights. This means that the tyrant is always a tyrant, and
remains a tyrant, to meet the fate of tyrants. The same holds for the lackeys and
collaborators of tyrants. This is a fundamental asymmetry between the citizen and
the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken
away by the torturer, but the act of torture destroys the dignity of the torturer.
This is not enough punishment for such hideous crimes, but gives cause to pity the
torturer even as you work to hang the pig. Let me explain about what I mean about
justice for the victims of these treasonous Nazis, who commit crimes against their
fellow American citizens in peacetime which would be war crimes even against an
enemy in warfare. Under a legitimate government such people would receive life
sentences in a humane prison system. That would be my preference, but the United
States currently has neither. So when I talk about hanging the pigs I am referring to
whatever justice-type processes can be set into motion. That was the subject of
Part II. Get the right ones. We will not forget, and when these pigs are 75 years old
they are still Nazi pigs and still serve the rest of their worthless lives in a humane
prison cell if such exists. The legitimate government treats mind control torture like
the true crime it is, even when government agents are involved in committing the
crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought
is unalienable.
The Nazi Pig Theorem
Theadjective,Auschwitzlevel,to describe these crimes, is not hyperbole. If you
do not feel like you need to vomit, you probably do not really understand the full
sickness of mind control crimes. Gordon Thomas wrote in the introduction to his
book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse:
Inworking on this book I have had to come to terms with my own emotions
disbelief, bewilderment, disgust, and anger and, more than once in the early stages,
a feeling that the subject was simply too evil to cope with. Nothing I had researched
before could have prepared me for the dark reality of doctors who set out to
deliberately destroy mindsandbodiestheyweretrainedtoheal. Torturers can never
blame their victims, though they invariably try. These torturers are the sorts of
people who will repeatedly hit a bound and gagged victim with a stick and then try to
claim the victim causedit.Theyllstealfromyouandthencomplainaboutthe
propertytheystoletheyllrapeyouandsneeratthequalityofthesex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it
is a metaphorical axiom, but it can be very useful to the torture victim. It basically
asserts that if you act like Mengele then you are a Nazi pig. Then there are a few
obviousconclusionsthatarealsopartofthetheorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your
brain/mind/mentation using Mengele-like
methods is a Nazi pig.
You do not care what a Nazi pig thinks. You do
not care aboutaNazipigsopinions.Youdo
not respond to a Nazi pig ridiculing you,
threatening you, trying to distract you, or
otherwise trying to manipulate you.
You work to get a Nazi pig hanged.
Isntthatobvious?Dontyoubelieveit?Thenrememberitandact like you know
it. NPT is as sharp as a razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not
raping yourbrain.Soyoucanthinkanythingaboutanyoneitsjustyouandthe
Nazis in your mind, and their opinions do not matter at all. If you have a passing
thought about someone and the Nazis try to harass you with it or make you feel
guiltyaboutit,itdoesnotmatter.TheNazipigsopinions do not matter (unless
they somehow help to get the pigs hanged). If you think some thought about
someone who really is raping your brain, then you have some worse things to think
about that Nazi piece of human garbage than what floated through your brain
originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are
being tortured and you know the true, evil nature of the society you are living in.
Spend some time each day working for justice in the physical world, and the rest of
the time try to ignore the Nazi pigs and get on with your life as best as you can. My
philosophy is basically to wish people well, and any differences I have had with people
are all water under the bridge after not too long. But atrocities never, ever pass
under the bridge. The victims never forget, and never should forget. Of course any
victim is free to choose to forgive his or her torturers, but for torturers to lecture
theirvictimsaboutforgivenessistheChristianityoftheoppressor.Forgiveness
also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a
non-Nazi. Torture makes it that clear. This is the top node of the decision tree for
the torture victim, and it is a stark split. The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly
who is a Nazi pig and who is not. So you might start off with a reasonable benefit of
the doubt and collect evidence from there to update your current assumptions. But
how do you deal with someone you think has a 10% chance of being a Nazi pig?
How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make
decisions based on imperfect information all the time, but this purposefully inflicted
torture pushes it past what people are accustomed to have to deal with in ordinary
situations. Nonetheless, the government is accountable for the aggregate situation
where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you
do not care in the slightest bit what Mengele thinks. Analyze the external incomings
for nature and source, as well as for other evidence if you choose to, and then send
them straight to your mental /dev/null. Then work each day to get the pigs hanged
in the real world, in the best way you can figure to do it (see Part II). There is also
an internal firewall theorem: Your brain is your own to think whatever you want
with. Simply invoke IFT and think about something entirely different if you are
thinkingsomethingthatyoudontwanttobethinkingabout.Train yourself toward
that, at any rate.
Some Suggestions for Thinking about the Harassment
The way to think of a nonconsensual external is as an advanced cattle prod that can
be modulated in various ways to cause you pain. The modulation happens to be with
words or clicks, but that is secondary. It is a modulated cattle prod. Notice it and
try to get a feel for the nature and source of the signal. Where does it seem to be
coming from? What is the quality of the signal? Later you can analyze the psyop
sentence the pigs modulated onto the cattle prod signal if you feel like it. (This may
reveal more about them than aboutyouthemodulationisbasedonyoureflected
off of their filthy Nazi distortingmirrorwiththeirintentionbeingtocauseyou
harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language?
Probably not. But basically understand that the Nazi pigs are complete, pathological
liars.Iftheyflatteryouonesecondtheyllkickyouinthe head three beats later, you
can almost count on it. Pathological liars only tell the nominal truth as part of a
larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal
comesfrom,boththepersonsendingitandthesensoryinputmethodbywhich
you receive it. The semantics is the meaning of the signal: it is the interpretation of
the signal and its modulation. For example, the semantics of a signal will often be its
interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering
process. It is just a sensation you feel from the external cattle prod. The presence
of the nonconsensual external signal itself is torture and is the only real information,
since the modulation is by pathological liars whose intention is to cause you harm.
Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyou feel
like it.) They hate it when you ignore them. Go on with your ordinary life, meeting
people, etc., and especially speaking out and working for justice in the real world.
You can only really ignore them when you know what is going on, though. Some of
the people who they march around their own homes like robots probably think they
are just ignoring it. There is a big difference between an experienced victim deciding
to ignore future signals and some well-meaning advice-giver who has never been
torturedtellingyoutojustignoreit.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some
basic voice-recognition type software applied to raped subvocalized thoughts, I could
write an AI-like program that sounded just like the repetitive, simple-patterned Nazi
pigs I am familiar with. In this sense, the realtime idiots do not even pass the Turing
test. Actual people (who are not torturers) have names, they do not repeat things
endlessly, they think things other than harassing you and commenting on your
thoughts, and they can push a few calculator buttons. For instance, why do you
never hear someone drivingtheircardownthestreetthinkinguseaturnsignal,you
asshole?
Dontexplainyour thinking to the Nazi pigs, it is better if they misunderstand what
they rape from you. By default you are only ever thinking to yourself. Work toward
the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as
you can manage. Try to extinguish your conditioned responses and replace them
with only an awareness of the triggering sensation. Some are random events acting
as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros
and cons to this, though, since the pigs will have access to what you write also. It
might provide them with feedback to help them torture you or others. If you
complain about something they will almost surely start doing it to you more. You
have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written
out. Stupidity is no barrier to the torturers, in fact it is part of the torture. For
example, if you make a self-deprecating joke it will not be long before the pigs are
goading you with the subject of that joke for real. Of course much of the torture is
never anything clever the torturers do, but your own knowledge that these people
who do not even know you nonetheless hate you enough to violate your mind and
then go to a great deal of effort to try to inflict seriousharmonyouoften
seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at
least help you train yourself to ignore the pigs. Notice the nature and source of the
signals, the mental gnats meant to annoy you. Parasitic mind fleas. If you think like
themonkey,youllbeasdumbasthemonkey.IfyouwatchthatTVtoomuchyoull
be as dumb as the morons on it. They will entertain you right into digging your own
grave.
How Can a Society I Detest Defile Me?
How do you deal withasecrecybredsocietyofdumbascowsinnocentpeople,
Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
aboutthepeoplewhoidioticallyask,Whyareyouongoingtorturevictimsso
obsessedwithyourtorture(andhumanrights,etc.)?Thesocialsystemwhere no
one can talk about the elephant in the living room, even though many people know
at least that something is there. Did people not get born with tongues to speak
with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture
regularly and systematically occurs,pretendingitdoesnt?Isitstillthatoldpig
slaver mentality, or the ability to look away from such abominations as an everyday
thing? For centuries it was forbidden to teach slaves basic skills like reading. Is it
better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out
and interact in the society where her rapist is still at large. The difference is that
there is a whole conspiracy of rapists and they rape the victims each and every day.
So perhaps it is closer to what were euphemistically calledcomfortgirls.Howdo
you think it feels to wake up with a pig in your head? Is that the only alternative to
being dumb as a cow andwearingagaginthissociety?Theconsensusrealityof
the average citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably
even be flattered by that description. They love being number one, after all.
Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big
hypocrisy. If you credibly call an American a big-sense hypocrite they will often start
spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and
prudes, they want to rig the game and call it free enterprise, and they want to be
known for freedom and liberty regardless of any domestic atrocities they commit.
You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those
pigs do that to anybody.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Part II: Resisting the Mind Control State
Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001
This essay is a compilation of thoughts on methods to resist governmentally and
societally supported mind control torture, repression, and exploitation. It is part II
of a series of three, and deals only with social and political issues. PartI,Motives
for Mind Control,describessome of the motives for mind control and why it
continues. Part III oftheseries,Mental Firewallsdealswiththetechniquesand
methods that survivors of this torture have developed to resist having their very
mentation tampered with, their bodies and lives violated, and their minds turned into
battlefields.
The purpose of this essay is not to try to convince anyone of what is truly going on,
but rather to analyze the situation and consider what can be done about it (after you
know well enough what is going on and are willing to act as if you know it). I have
talked to a good number of mind control victims over the past few years, and many
ask me what we can do about the situation. That has been a difficult question.
There are many possible actions to take, but ineffective actions only waste time. It is
a complicated and disgusting situation in the U.S. with regard to mind control
abuses, and it does no good to pretend otherwise or mince words. This essay is
perhaps part of an answer, such as it is, to those questions.
A Brief Description of Mind Control Torture
First, I should explainwhatImeanbymindcontrol.Somesocalledrebuttalsof
explanations of mind control harassment and technology focus on narrow semantic
interpretations of the term, for example by setting up the straw man that any mind
control technology must be able to completelycontrolsomeonesmind.Iamusing
the term in the more general sense that is now the common usage. By mind control
I am referring to covert attempts to influence the thoughts and behavior of human
beings against their will (or without their knowledge), particularly when surveillance of
an individual is used as an integral part of such influencing. I am especially dealing
with situations where individuals are singled out for campaigns of influencing and
harassment using advanced technology. I am not referring to such things as
everyday TV commercials trying to convince you that you need the latest shampoo
unless the commercials are being used in a way deeper than this surface level such
as with the inclusion of subliminals and triggers. (For more details and descriptions,
see for example the Mind Control: Technology, Techniques, and Politics web site at
http://www.datafilter.com/mc .)
The technology is rooted in surveillance devices, such as audio and video bugs,
through-the-wall and remote sensing devices, and biosensors both remote and
implanted. This provides the feedback for the influencing, as well as any
entertainmentvalue for voyeur/sadists and intellectual property theft for thieves.
Coupledwiththesurveillanceissomesortofeffectororfeedbackpathfor
influencing an individual. This may be as simple as spreading rumors and gossip
basedonthesurveillance.Itmayincludeactingoutstreettheatertotheindividual,
letting them know they are under surveillance and putting them in bizarre situations
to see what they do or to cause trauma and disorientation. This may even include
spreading the information forusebyassetsinthenewspaper,television,radio,and
advertising businesses and on the internet. In some individuals hypnosis may have
been used to condition certain reactions and behavior to be triggered by later cues.
The use of technology ranges from using harassing phone calls coupled with
surveillance-based feedback to provide aversive stimuli in a personshome,to
abusing the media and the internet as a means for harassment, to the use of pulsed
microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain
implantstorecordandaffectthebraindirectly,to
Thus there are several categories of mind control operations, for example covert
druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting,
short-term mind fucks, and ongoing feedback control setups for long-term torture
and exploitation of victims, to mention a few. What they have in common is the
attack against the mind of the victim, as well as the deniable and denied nature of
the attack. The exact means being used in any particular case are beside the point
here. These techniques do not just violate one or two of what everyone knows are
fundamental human rights: In one fell swoop they violate almost every fundamental
human right a person has.
Standing Up and Resisting
I am sure that most if not all of the strategies I will discuss in this essay have
occurred to people involved in the area of mind control for any length of time. I hope
this essay will prove useful by collecting these various ideas together and providing a
big-picture overview of some possibilities. I have tried to cover the whole range of
possible actions, including violent action. I know the torturers and their apologists
may take this as some sort of propaganda coup, and that these state-sponsored
terroristsmaygoaroundshoutingterrorist,butthelist would not be complete if I
did not include those possibilities. Thinking about all the possible reactions can yield
insights into seemingly unrelated matters.
Somepeoplesresponse to ideas for action is to criticize the person putting forth the
ideas.Remarkslike,whathaveyoudone,whydidntyoudothisorthat,and
whatisyourhiddenagendaaretobeexpected,indirectlyifnotdirectly.I am
confident enough about my efforts over the past years to expose and stop these
humanrightsviolationstonotletthatbothermewhetherornotsomeone else
might agree with my approaches. Developing a thick skin against smears and dirty
tricks is necessary in American politics in general these days, and especially when
trying to expose horrible atrocities carried out by well-funded and secretive groups.
Everyone has his or her own skills, abilities, and situation, and knows if he or she is
making his or her best effort in the circumstances.
I am coming out and saying a lot here, and I have given it a lot of consideration.
Some people might argue that incremental progress is the way to present things, to
preservesomenotionofcredibility.Tome,preservingcredibilitymeans to point
out what I know is the case after I know quite well it is the case. There have been
denials every step of the way, even of technology that definitely exists like microwave
voice projection and implanted tracking devices. Does that not impugn the
credibilityofthedeniers,orthe professional liars who are known to have tortured
American citizens for decades? Why should anyone think that such programs of
torture ever stopped? They have not.
The signers of the Declaration of Independence pledged their lives, their fortunes,
and their sacred honor. I present this essay in the same spirit. If people are afraid
to say that they are being tortured in the U.S. then the torturers will be free to keep
ontorturing.Asthesonggoes,itstartswhenyourealwaysafraid.
I have already been subjected to torture-level extrajudicial surveillance and
harassment bymyfellowAmericans,insidemyownhomeandmind,forthepast
four [now six] years. This has sharpened my awareness in some ways, and I have
seen quite directly how this stinking society and culture operate. So I know
something about how these pathetic, juvenile and barbaric rapists workthoughit
is difficult to imagine and it would make you feel sorry forthemifitwerentfortheir
many victims. So yes, I will write it. I will stake my credibility, career, family, and life
on it because I know damn well it is true and there is no real alternative but slavery.
(Whydidntthecolonistsproveinacorruptandcontrolledcourtthatthesoldiers
of King George III oppressed the citizens of the colonies?)
The Actual Situation
This is a very brief rundown of the current situation in the United States today.
Similar situations existinotheradvancedcountries,butmyfocusinthisessayis
on the U.S. (Though other countries have adopted or will adopt the American model
of repression.) The situation has been described at length in other essays and books
by various authors, so this is just a summary.
The United States is, for all practical purposes, a military/intelligence police state.
This reality is hidden behind a facade of representative government and media
psyops and lies. The evil empire had an evil twin. Citizens can be selected at random
for horrible experimentation and abuse. Those who seriously challenge the corrupt
system face covert harassment and abuse. Collaborators, apologists, and
profiteers. Our elected representatives have no real power at all over the
military/intelligence complex in the United States. They are generally bought and
paid for by groups interested only in making ever more money, in any way possible.
There still are many decent people in the United States. At least that is what little
faith I have left in America. The stated principles of this country still stand strong,
even as they are ignored. That might be some slight hope for the country, but I
hate this country now. I hate the United States. Read this paragraph again from
the beginning. I hate the phony culture of lies and exploitation. I hate its stinking
loudmouth hypocriterulersandtheirgoonsquadtorturers.Ihateitsongoing
atrocitiesanditsphonyveneerofcivilizationpastedoveritsblatantbarbarity. The
fourth reich is alive and well in North America, Americanized with lawyers, PR men,
marketing, and advertising. The death camps are kept well-hidden as they continue
operating for decades, as slaves are taunted with lies of freedom, free enterprise,
andastrongeconomy.
Great masses of people are not knowingly touched by this repressive system
because theydonotneedtobe:Theyarekeptblissfullyignorant(orpretendit
out of expedience). They think they are living in the phony nation the propaganda
advertises, and are compliant subjects for their hidden and self-determined
overlords. This might be called government from underneath a rock. The
persecutions and exploitations are just as vile, if not more vile, because they are
hidden. The entire culture suffers, but no one seems to notice the absence of real
dissent or fresh ideas or leaders coming from outside the corrupt two-party system.
It is like Disneyland, where everything is a facade. The difference is that in
Disneyland everyone knows it is a facade, and people are not being tortured back
behind the facades
American marketers might even portray this new feudal and repressive state as some
sort of advance. For greedy fascists without consciences and who can manage to
stay on the exploiting side rather than becoming one of the exploited it might be a
real paradise.IhopehistoriansforcenturieshencewillseethecurrentAmerican
leadership as the Vichy government it is, collaborating with and profiteering from
crimes against humanity. These leaders are either real fools or they know damn well
what is going on in their repressive nation. Look at them on TV. They want to
condition you to feel some phony nationalism and well-being at their slick lies;
condition yourself instead to feel revulsion and disgust at propaganda reels. That
box in your living room lies constantly, and to personify it further, it is one of the
biggest and most culpable collaborators in American atrocities. Always another lie,
always blaming a victim, always spinning this way and that, always an excuse or
rationalization. Keep your mental distance from this mind poison and see it for the
controlling tool it is (as well as for what it could be and could have been).
Let us assume a counterfactual for a moment and suppose that the U.S.
government is not involved,thatitisonlyprivategroupsorforeigngovernments
attacking and exploiting American citizens. In that case the U.S. government is still
guilty and complicitous. They have kept the technology secret, have helped in the
repression and discrediting of victims, and have done essentially nothing to stop the
abuse. They have failed in the most basic functions of government. These are
serious, serious crimes we are talking about here: literally torture and enslavement.
(Should, say, Russian or Chinese government agents be free to mind control torture
American citizens here in the U.S.? Should organized crime groups? Should
industrialespionageagentsorfriendlyintelligenceservices?Obviously not.)
It really is that bad: evolved torture techniques, a neutron bomb that destroys the
person from within while society can ignore it. Understand, this is known stuff and
much is admitted by the government; but still no actions are taken. While the
government has only admitted a grain of sand in the desert of its atrocities, what we
know is bad enough. And still nothing happens and the politicians go on
grandstanding, pretending nothing is wrong, and stuffing their pockets. If someone
came into your home and did this to you or your family directly you would be
completely justified in shooting them deadandanyjuryinthecountrywould
agree with you. But when government agents do the same things, its Nazi pigs are
protected and the victims are furthersmeared.IfthereisanyuseforOldSparkyit
is to fry these torturing, treasonous, Nazi pigs.
The Community Against Mind Control
The community against mind control is a varied one. There are researchers who
have uncovered mind control abuses (and then encountered the mind control
coverups), there are victims and their families and friends, and there are other
citizens who have heard and seen what is going on, recognized its truth, and acted
on it. There are a few organizations set up to resist mind control, and several
researchers and activists who have worked on the issue and with victims for many
years. I will not name them here to avoid leaving anyone out. Fortunately or
unfortunately, there is no real unified leadership fighting mind control in the United
States,nottodisparageanyonesworkinthearea.
First of all, being an outspoken critic of American mind control atrocities is not helpful
toonescareer,finances,orhealth.Thingsmaygetbetterastheatrocitiesgradually
come more and more to light, but harassment and surveillance are to be expected.
People working against mind control, especially when they are victims themselves,
must deal with the fact that they are being watched and their every move (and even
thought) is being analyzed. The criminal factions can move to thwart or counter any
move even before it happens. Remember, these are atrocities committed against
men, women, and children for years on end, committed by vicious and amoral people
with powerful connections and funding sources. They will threaten, blackmail,
harass, and murder to conceal their crimes. The lie of American freedom serves
them well as cover for their fascist tactics, but also makes them especially fear
exposure for what they are and what they have done against their own people.
Mind control victims themselves can be somewhat difficult to work with, and for good
reason. They have survived and are still coping with almost unimaginable torture
experiences and the associated psychological and physical trauma (these would be
called torture sequelae, but the torture generally has not stopped and is ongoing).
They have been betrayed in the worst way imaginable by their own people. They
have been exploited and been put through experiences meant to demean them.
They have been slandered, blackmailed, and threatened. They have had their minds
repeatedly violated and often their bodies as well. They have seen provocateurs
disrupting anything that looks like it might achieve something and know all too well
about infiltration. They have watched their society and seen how pervasive this
modern-day system of torture and exploitation is in the United States. They tend
not to be financially well-off, for obvious reasons. They have often had such
incredible and hard-to-believe experiences on an ongoing basis that they do not
even mention the most outrageous ones, knowing they will face ridicule enough for
describing their other experiences.
There are victims of various sorts of mind control experiments and operations, from
childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic
harassment, tocovertdrugging,toimplanteddevices,tostreettheatertoIn
short, any sort of mind control technology and technique the government has
wanted to test it has tested on its unconsenting citizens. Thus there are many
different experiences, or clusters, of mind control victims. The people themselves
have varied backgrounds and have as an unfortunate commonality that for whatever
reason they were singled out and tortured. There are some victims who have
suffered brain damage and severe psychological problems as a result of their
torture. There also are truly mentally ill people, true kooks, and provocateurs
impersonating both to help discredit the real victims. Many victims have a history of
some connection to the military or to an intelligence agency, which is sad but not
surprising, and thus face realistic suspicions that they are agents or plants.
Altogether these factors point to why mind control victims are reluctant to trust
anyone, much less someone claiming to be or touted as their leader. Thus there is
currently a sort of leaderless resistance to mind control, which I hope can be more
effective than it currently is.
Mind control victims are very much like prisoners of war who have been tortured.
The difference is that they generally do not know why they have been tortured, they
do not have their own army or support system, and they have been tortured by
citizens of their own country. That, and the torture is generally ongoing and has
not stopped. Rather than any sort of sympathy or respect forhavingservedtheir
countrybybeingselectedforexploitationandtorture for the sake of what is billed
asnationalsecurityorfreedom,these veterans of mind control abuse are
subjected to ridicule and abuse. The psychological torture, and often the physical
torture, is ongoing.
The torture victims are supposed to second guess the reason for their torture. Why
were they selected? What is so special about them? Their being selected for torture
might even be portrayed as some sort of flattering attention that needs a special
explanation, lest they be accused of having delusions of grandeur.
State and Societal Methods to Continue and Conceal
Ongoing Mind Control Operations
The primary method used to conceal and continue ongoing mind control operations
is secrecy. The weapons used are highly classified, and those who abuse them to
summarily tortureAmericancitizensbenefitfromaconspiracyasdefinedinthe
dictionary toconcealtheircrimes.SecrecyistheAmericanpassionitistheway
the United States institutes fascist repression against its citizens while pretending to
be a democracy respecting human rights. Secrecy has only grown more entrenched
in the U.S. since some of the mind control abuses against citizens were exposed in
the 1970s.
The psychiatric and psychological communities are also used as tools in the
repression and torture of American citizens. Sometimes wittingly, sometimes
unwittingly, mental health workers aid in and help cover up mind control operations
in the United States. First, these communities aid in the repression by advertising
mental illnesses and their symptoms while ignoring technological means for inflicting
the same symptoms. They ignore the reality of government harassment campaigns
and nonconsensual experimentation on the public. This lays the groundwork for
mind control victims to be labeled as mentally ill and dismissed, or for some half-
educated person to think they are helping bysuggestingthevictimgetpsychiatric
help.Deniabilityisoneof the first principles of covert action, and inflicting torture
which mimics the symptoms of mental illness is not especially novel. The deniability is
preserved by publicizing mental illnesses while denying mind control technology and
harassment techniques.
Secondly, the mental health community aids in repression by directly diagnosing and
even institutionalizing against their will people who claim to be mind control victims.
This is nothing short of the former Soviet system of using psychiatry to discredit
and silence dissidents and others, though with a typical American spin involving
layers of lies and secrecy. There truly are mentally ill people, and their illnesses are
unfortunately used as cover lies for torture. This is just another sad reflection on a
profession sworn to donoharm.Asidefromafewtrustedpractitioners,the
mental health community and system should be considered collaborators in American
repression, at least until their diagnostic manuals have entries for electronic and
other mind control, nonconsensual experimentation, and trauma and torture
sequelae due to harassment campaigns like those the U.S. government has carried
out for years against its own people. The psychiatric community is used to enforce
belief in the socially demanded delusion that the U.S. government does not engage in
extrajudicial torture and harassment of its own citizens (and the delusion that the
psychiatric community does not have years of mind control blood on its hands).
Next, there is the American press. These liars participate in coverups of all sorts of
intelligence community atrocities, while at the same time preaching about freedom of
the press and their mythical watchdog roles. A recent canonical example is provided
bythemainstreampapersattemptsatdiscreditingandsmearing the few journalists
who dared to report CIA knowledge of Contra drug traffickingeventhoughitwas
already known from Senate hearings years earlier. [In an interesting two-birds
scenario, at the same time this cocaine was being imported the zero-tolerance just-
say-no campaign was going full force, and our prisons were being filled to world-
record levels with inner city users and sellers of some of this same cocaine.] Even
when the CIA finally admitted as much in its own reports, the press would not report
it accurately, let alone apologize to the actual reporters they had smeared. This is
what the dictionary and the law define as a conspiracy. Most media outlets in the
U.S. are de facto propaganda outlets for the government, especially for the
intelligence agencies. The shameful refusal of the press to cover human radiation
experiments by the government for almost a decade after the information was
released by a Congressional committee is another canonical example, perhaps even
closer to the case of mind control torture.
Not only will the press not openly report ongoing mind control abuses and torture,
many in the press act as apologists for it and even as participants in the torture.
Many mind control victims have become very familiar with the way that symbols and
codewords are used to both let the victims know they are under surveillance and to
attempt to smear and discredit them. This coded and between-the-lines speech is
apparently standard issue in the intelligence and diplomatic communities, while
ordinarycitizenstendtoscoffatthenotionofbasicEnglish101typesymbolism
being used by journalists and spies. Deniability is the principle. Have your cake and
deny it too.
The techniques for deniable smears include making the smears either be so specific
or so generalthattheycanbedeniedandthesedeniablesmearscanbe
distributed across the entire media spectrum like other concerted propaganda
campaigns. An example of the specific sense would be what the victim ate last night
or whatthevictimsspousesaidduringsex(intendedtoharassandgoad).The
general smear could be general stories about things the victim has recently done or
been interested in. These are deniable, though the victim knows, and is supposed to
know, but cannot say or do much for fear of being called insane. This is combined
withsymbolicandbetweenthelinesstoriesdealing with the victim in a deniable
way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks
and ways to communicate (or in this case harass) between the lines. [When you
start to pick up the messages between the lines, be aware that there are often more
lies between the lines than on them.] Some of these smears are so stupid that you
wouldlaughinthetorturersfaceifthesmeardidnotrevealhumanrightsviolations
against the victim or you did not know the absolutely vicious intent the torturer had.
The press techniques used mirror some of those reported to have been used by the
CIA in manipulating South and Central American populations via psychological
operations carried out through the media. It is no surprise at all that these
techniques would have been brought back and diffused into the U.S. covert political
reality. Who is watching the spies and national security complex in the current
political climate? The American press consists of some of the most arrogant,
manipulative, thin-skinned, and provincial people imaginable, always rationalizing
away their own criminal complicity in crimes against humanity. The few exceptions
know who they are.
To discredit mind control victims, the media will play them up as schizophrenic
kooks. Acts of physical and psychological terror by the government are ignored,
while those speaking out against such terror are ridiculed. The United States is so
transparent in its propaganda it is amazing anyone is gullible enough to believe it,
except that it is so pervasive. Many Americans fall for the lies and misinformation
because they have been so inundated with propaganda and lies for all of their lives
that they cling to their adult Santa Clauses and refuse to confront differing facts.
In a larger sense, the press engages in what Jeff Cohen has called propaganda from
the center. I would modify that by saying that the press and the government
engage in both propaganda and terrorism from the phony center. The phony center
is the place where the system works. It is the place where no human rights
violations happen within the U.S., and where everything runs smoothly so
businesses and corporations can go on making money. It is not Republican or
Democratic. It is the status quo minus all the unfortunate and ugly realities and
events that might cause ripples. Crime and crime coverage fit right into the phony
center, though, because this gives the system some bad guys to chase and catch,
showing how the system works and even polices itself. State crimes are almost
never mentioned, and white-collar crimes are not mentioned often. It is mostly
crimes by people who are in what might be called the lower classes, except that in
the phony center there is no such thing as class in America. Crime coverage also
serves very effectively to scare the public, so they will willingly accede to authority
and, increasingly of late, surrender more of their liberties. (There are also the high-
profileentertainmentcrimeswhichcandisplacereal news for months.) Terrorism
from the center is any act of terrorism that tends to reinforce the impression of the
phony center. It can serve todiscreditextremistsaswellastoterrorizedissidents
who might threaten the power of the elites. This terrorism might include public acts
to be misreported on the news or cointelpro actions secretly carried out against
people and groups.
In the service ofthephonycenter,thepressalsoutilizesatriangulationstrategy
to soften and minimize the most egregious atrocities taking place in the country. If
there were a chance that people might learn of the secret government literally holding
people as electronic slaves in distributed concentration camps created from the
victimsownhomesandminds,theCIAwouldbeportrayedasfightingthe slave
trade overseas. See, I cannot argue with fighting slavery overseas. It is a good
thing, assuming it is real and not just more PR propaganda. But now it has
purposely distracted from the domestic abuses. The general rule is to triangulate by
emphasizing something similar to the domestic problem except that it is not quite so
bad or is committed by bad criminals the government is chasing or by foreign groups
or governments. It masks the most serious abuses (people can only concentrate on
so many things). Someone not familiar with the idea of masking by triangulation
might even think someone in the press was trying to help but, gosh, here at least is
a watered-down something.
Triangulation hereissimilartothelimitedhangoutstrategysooftenusedby
intelligence agencies when they fear worse exposures of their crimes. That is, they
admit a few abuses that are bad but hardly the worst abuses or the bulk of the
abuses,playupthoseadmissionsforatime,andthendeclarethatitstime to move
on.Amazinglyenough,afterafewyearstheyoftenbegindenying and hiding the
few admissions they actually made and we have what Robert Parry has called lost
history (though most of the actual history was never revealed anyway).
Finally, in denyingandcoveringupmindcontrolcrimestherearewittingassetsand
collaborators in all parts of society. To say it is Stasi-like is not going too far. Some
are profiting directly from this exploitation and enslavement, while others profit
indirectly or hope to not become another victim by collaborating. Too many
Americans are just plain cruel and barbaric.Thereareassets,apologists,and
collaborators in the advertising and entertainment businesses, in academia, in science
and engineering, anywhere you might look. Some are likely just following the cues of
the unspoken dialogue and symbolism, while others are directly connected. Some
may be mind control victims themselves, aware of it or not. This is a real, live
conspiracy of the sort that Americans love to ridicule others for pointing out. I do
not put anything past people who would participate in systematic torture, including
manufacturingnewseventsfordistracting,discrediting, and as a launching point
for their desired spin.
Consider that the Church report only scratched the surface of the abuses then, and
that things got worse through the 80s and 90s, and you may get some inkling of
the true situation.
Methods of Protest and Resistance
This is a listing of various possible methods to protest and resist the crime against
humanity that mind control torture really is. They are listed very roughly in order of
increasing severity and confrontation. They are not mutually exclusive, of course,
and several or many could and should be employed at once. I would urge people not
to act in rage, especially on some of the more extreme actions. Acting in rage may
result in your being manipulated by others. Any actions should be undertaken with
premeditated thought and understanding of the implications. On the more extreme
actions there is no rush (unless you feel like it, with your true free mind). Be
prepared from the start for the long term, and keep your eyes on the prize, so to
speak.
Contacting law enforcement, like the FBI. This is typically the first thing someone
does when a violent crime has been committed. (It may take a mind control victim
some time to realize what is going on, and that such vicious mind manipulations are
in fact being directed against him or her in a concerted manner. That is, it may take
sometimetorealizethatitcananddoeshappenhereeven though we do not see
such crimes openly reported in the paper or on the evening news.) In the case of
mind control and electromagnetic harassment crimes this option has proved to be of
no value whatsoever. I do not know of one case where this resulted in any
investigation or anything other than polite dismissal, at the very best. Some mind
control victims are afraid to contact the authorities. This may be because they fear
further abuse or fear that any investigation will turn against them when back
channels are utilized by their torturers. Psyops typically employ such threats,
including blackmail threats based on anything observed over years of
torture/surveillance, physical threats against loved ones, and purposely instilled
distrust of anyone who might be able to help.
There is also good reason to believe that the FBI is in fact directly involved as the
harasser in many cases. Historically, the FBI has made both a study and a practice
of targeting and harassing American citizens. The FBI without a doubt knows about
the sort of electronic weaponry that many victims say has been used to harass and
torture them. They have held classified conferences where they discuss such
weapons and plan for sharing this technology with otherlawenforcementagencies
yet they still deny that the technology exists. These would be called secret police
tactics in most other nations, but the perception management of the American
citizenry requires that such descriptions not become commonly used here.
Legal actions. When the authorities are no help, many people turn to the judicial
system for relief. First, one has to find a lawyer willing to take the case. This can be
difficult in itself, as many lawyers either refuse to believe the victims or else want
nothing to do with challenging the secret government. Even lawyers willing to take
the cases may lack the specific expertise needed in national security law. Assuming a
lawyer has been found, there remains the problem of gathering evidence for use in
courtevidenceofacrimethat has been tailored over the years precisely not to
leave such evidence. Surveillance and harassment will be used to attempt to thwart
any effective actions of the victim, he or she will not be able to act in private, and
certainly will not be allowed private counsel with lawyer-client privilege. Finally,
assuming a lawyer has been found and a case put together there remains the
problem that the courts are heavily stacked in favor of secret government agencies.
At some point, if any progress is being made at all, there will be a claim of national
security and the government will move for dismissal. If the victim is lucky enough to
get to this stage the trial will be dragged out for years and cost hundreds of
thousandsofdollarsallwhilethetorturegoesonandthevictimswhole life is
derailed and devoted to regaining his or her fundamental human rights. (This
process in practice reveals what a farce the American participation in international
treaties like those against torture and slavery is, since the U.S. claims that its current
laws, Constitution, and courts provide implementation of these protections for its
citizens.)
A common misconception is that there is no law against what the mind control
torturers are doing, thatitissomehowlegal.Whileitwouldbehelpfulanduseful
to have new laws on the books to more specifically protect the mind control victims
and make people aware of such crimes, there are plenty of laws currently on the
books that could be used to stop the torture and punish the torturers. In American
law it a matter of if there is a will there is a way. (This is illustrated in the selective
prosecutions and in the ignoring of the clear crimes of the powerful that happens all
thetimeinAmericanjustice.)While this trend that mocks the rule of law usually
works against justice, if we can generate the political will we may be able to get some
justice.
Letter writing, direct contact with legislators. In a functioning representative
government, citizens should be able to contact their representatives when the usual
system has failed them. Mind control victims can indeed contact their
representatives, but to little effect. Some representatives simply ignore or throw
away letters from mind control victims. Others may make a few inquiries that get
nowhere and then give up. The political facts are that most representatives have
almost no power when it comes to investigating abuses of the intelligence apparatus
(though they do not want to let on that they are powerless in that regard). Some
representatives have been co-opted into the intelligence community and actually run
interference for the agencies rather than representing their constituents who are
undergoing torture. This is terribly expedient for them, since they know they cannot
be held accountable for actions they take in secret. (Some representatives may just
be naive and fall for the slide shows of lies that spies like to give to representatives in
secret sessions, knowing that no one has the chance to counter their
misinformation.) Nonetheless, one can hope that there are some decent people left
in government who recognize what is happening. Phone calls and paper letters to
legislators tend to be more effective than email.
Our nation is wealthy and we are continually assured that the economy is good. The
cold war supposedly ended. If the American political system cannot deal with the
nationscontinuingatrocitiesundertheseconditions,whencanit?
Direct political activity. Voting is only a part of the direct political activities that can
be undertaken. The problem is the lack of candidates and politicians willing to deal
with these issues. Even a few politicians with real spines, not worried about their
own reelection but about doing what is right, could start to make a difference. For
now, working at the primary and grass-roots level may be more effective than
waiting until the standard Democrat and Republican are selected and presented as a
choice. Third parties can bring new issues to the table. If we can figure out who in
the government is secretly anti-human rights we can work to ensure that those
people are notreelected,sincetheyhavenoplaceinpublicgovernmentandifthey
are themselves responsible for torture they belong in prison. The barrier here is the
abuse of secrecy in government to keep the public from knowing. If we could get a
few roll-call votes on important human rights issues those could be used as a voting
guidebutalwayswatchoutforphonylegislationdesigned only to give the illusion
of human rights support. The important part of the voting is not just your single
vote but to campaign tirelessly yourself and with others against modern-day Nazis
hiding anywhere in government.
Appeals to human rights organizations. Mind control victims have appealed to
human rights organizations for years, trying to get them to focus their attention on
domestic, covert human rights abuses. For years they have been rebuffed or
ignored. Human rights organizations, many based in the U.S., freely point their
fingers at human rights abuses overseas while ignoring domestic human rights
abuses and victims. Recently, though, there has been some progress made in
getting a few organizations to begin to address these abuses. It is only a small step
so far, but at least it is something. As far as I know no organizations have dealt
directly with the issues of mind control victims (even those acknowledged by the
government). The World Organization Against Torture, USA, did recently discuss
human experimentation without consent in its report on American compliance with
the Convention Against Torture. Continued appeals to other groups to follow this
lead and to deal directly with mind control issues may be productive. Remember,
though, that the settingupofphonyfrontorganizations,groups,andcharitiesisa
long practiced way to co-opt, control, and neutralize opposition.
Appeals to the press. The American press has already been discussed at length in
this essay. Nonetheless, there are still a few decent people in the press acting as
real journalists who may have the ability to get the truth out. People should also
support those decent journalists if the propagandist media turns on them, and
remember who the propagandists are. Support press organizations who tell the
hard but important truths.
Appeals to churches, religious organizations and other groups who might be
sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the
congregation, sangha, or whatever the congregants are called, in the name of
whatever God or spirit or force or practice the religion worships or advocates. Most
religions at least give lip service to human rights. It might help. You cannot have
freedom of religion without the freedom of thought, and some religious people have
the sense to understand this.
Some victims can also be helped, at least helped to cope with the torture, by
practicing whatever faith they still follow or believe. It is important to always know
that this has nothing to do with the Nazi pigs playing at God and trying to steal away
human dignity and free will.
I have thought for some time that mind control survivors might benefit from contact
with Holocaust survivors, if only to hear how they have coped for so many years with
the knowledge that their fellow human beings and countrymen tried to exterminate
them. How this lasting scar affected their families and views (after their torture ordeal
was actually over). I would hope they at least see that these are Auschwitz-level
atrocities, being committed for decade after decade here in the U.S. But not
everyone you think ought to understand something will, and we are all embedded in
a lying propaganda society.
Generated with www.html-to-pdf.net Page 47 / 67
Leave a comment
Posted by (Geeldon) NOV 16
Leave a comment
Posted by (Geeldon) NOV 16
1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric
Press.
Glossary
MCs Mind Controllers
Government-funded agents who conduct mind control-research.
MCVs Mind Control Victims
Human beings who are used for human experimentation.
IS Implant Specialists
Mind-control agents who specialise in implant technology.
Posted in Gaslighting, Group Stalking, Human Experimentation, Implantable Microchips, Psychiatric
Reprisal, Remote Neural Monitoring, Synthetic Telepathy, Through Wall Surveillance, Torture
Tags: implant, implant microchip gaslighting, Microchips
Part III: Mental Firewalls
Part III: Mental Firewalls
Allen Barker, Feb 17, 2002
This is the third of a three-part series of essays on mind control. As the earlier
essaysexplained,mindcontrolisthetermcommonlyand historically used to
describe clandestine operations to alter human behavior and thought. The series
focuses mainly on high-technology techniques involving, for example, surveillance
devices and electromagnetic weaponsthoughvictimsofallsortsofmindcontrol
techniques have common experiences and sequelae. The first essay of the series,
Motives for Mind Control,dealtwith some of the reasons that mind control
harassment, torture, and exploitation happens and why it continues. The second
part,Resisting the Mind Control State,dealtwithwaystoprotestandresistmind
controlabusesinasupposedlyfreesociety.Inthisfinal part, I explore some of
the methods and techniques that victims have developed to help them resist these
ongoing human rights atrocities committed every day against their bodies and
minds. In a sense we are going to have a look at mind control torture from the
torture victimspointofview,frominsidethemindofthevictim.
This essay is written from the point of view of someone experiencing real torture
from externally induced mind control phenomena, including induced voices in the
head, surveillance, harassment from various sources, and nonlethal aversive jolts.
While I make no secret of the fact that I have personally been subjected to a similar
sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with
many mind control victims (and provocateurs) over the past few years. I will save
the actual details of my own experiences for my lawyers or for prosecutors when
that time comes, or perhaps for other writings I might choose to make public. Thus,
in keeping with the earlier parts of the series, you do not even have to believe me
about my having been torturedthoughitallhappened.Therearemany people in
the world, including many American citizens, who have experienced very similar
things. You can even think that all of those people made it all up, and still have to
be concerned despite your Holocaust denial. The technology undoubtedly exists
right now to carry out the sorts of torture operations described in this essay, and
will only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind
that the truth is bad enough. What we already know and can document is bad
enough, and is only the tip of the iceberg. In the spirit of mentioning all the
possibilities, though, let me briefly discuss mental illness here. There truly are some
people with mental illnesses which occur naturally. There are also people with mental
illnesses which were externally and purposely inflicted, for example by harassment
operations. And there are mind control victims who are completely normal except
that they have undergone years and years of some of the most hideous torture
imaginableinalying,despicable society that denies it, ignores it, and further
tortures the victims. We know this from documented sources; what the government
has admitted is bad enough. I hope this essay will prove helpful even to victims who
suffer from true mental illness. I call them victims also because the cowardly U.S.
government has hidden behind the skirts of the mentally ill to commit some of the
worst atrocities imaginable, and the truly mentally ill are victimized by this as well.
The mentally ill are also known to have been used as guinea pigs in mind control
experiments precisely because they would tend to be disbelieved and are relatively
powerless victims for torturers to experiment on. Some victims may have been
poisoned by drugs engineeredtocausethempsychologicalproblemsandIdonot
mean ordinary street drugs. Others have had psychosurgery, microwave
harassment, etc., which can cause organic problems in addition to psychological
problems. And of course, the mind is really not separate from the body and
psychological torture is just as bad as direct physical torture.
Most people arestillfreetothinkwhattheywanttotheextentthatthatstill
means anythingandsomewilltrytosecondguessthevictimsandprovide
armchair diagnosesofthevictimsproblems.Peoplewhotrytodismisstruetorture
victims as just mentally ill will receive and deserve the utmost contempt from the
victims and from those decent people who know what is really going on. And we will
remember. For the reasons described in Part II, the psychiatric and psychological
communitiescannotbetrusted,exceptfor a few actual healers here and there.
Much of this essay contains a sort of analysis that it is fashionable among the
pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have
their sixth-grade epiphany that not everything is black-and-white, and for the rest of
their lives go around justifying anything convenient with this amoral relativism. They
never realize (or it just does not suit their lies) that while nothing is black-and-white,
some things are close enough that they might as well be. I will be writing about Nazi
pigs,andImeanthisinthesenseofMengeletheNazipig,notanyothercultural
pig association. Those who dismiss this sort of thinking perhaps would think
differently if they had ever experienced real torture or were capable of the slightest
bit of empathy. There is no doubt that this sort of thinking has been misused and
misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have
written here, or use them to create some propaganda distraction from what I am
actually writingabout,butIamdescribingitthewayitis.Ifyoudontcalla Nazi a
Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I
am not trying to impose my methods on anyone. A religious person under torture
finds strength in his or her religion, so some Zen Buddhist philosophy may
necessarily be apparent in my writing. In the ignorant U.S. there are still people who
will blame a victim for being Buddhist, a major world religion. Of course Mengele the
pig tries to justify and rationalize his acts of torture in any and all ways possible.
There are the usual myriad ways of blaming and smearing the victims and
rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the
work of other victims who had the courage to speak out about their experiences.
Muchofthisessaydealswiththementalgameofmindcontrol,whichisof course
not a game at all to the torture victims. You can compare it to having to face mock
executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on
the highway? Why did my mail all arrive opened? Why did my phone regularly ring
twice a day with hang-up calls? Why did many of my internet posts stop
propagating anywhere? Why did a police car pull up beside mine every time I talked
about China, on the drive to my honeymoon? The unfortunate reality is that the
victims have to develop their own methods to deal with the constant, credible
physical threats of death or worse. I wish I could help there, but I do what I can.
This is a barbaric and savage nation.
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of
a firewall. A firewall, in the historical sense, is a wall built between connected
buildings and specifically constructed so that a fire in one unit of the structure will
not spread to the other units. In a more recent sense, a firewall is a device on a
computer network that keeps nodes of the network separated, for instance so that a
hacker attack on one node of the network cannot spread to connected nodes of the
network.
For our purposes, we can consider all the computers on a network to be like houses
on a street. (Network engineers, please bear with me.) Each house has several
doors into it, which correspond to what are called ports on a networked computer.
A computer actually has thousands of ports, but the principle is illustrated by
considering a house with several doors. All the houses have inhabitants in them,
who send out messengers to the other houses: But some houses send out the
equivalent of burglars also. When the inhabitants of one house want to
communicate with the inhabitants of another, they send a messenger to a particular
door of the house they want to communicate with. The messenger knocks on the
door.
Now, the inhabitants of the house can either open the door and let the messenger in
or ignore the knock. If they let the messenger in, they can restrict what he is
allowed to do while in the house. The messenger may, for example, pick up a piece
of paper and carry it back to his house. This would correspond to a file transfer over
a network. If the inhabitants of the house accidentally leave a door open, though, a
messenger may be able to come in the house without permission and do whatever
they like, again without permission. (There are many doors because a messenger
occupies a particular door the whole time heisinthehouse.)
A firewall, in this analogy, would correspond to a complete facade built around a
house (or group of houses, to be picky). The actual house is not even visible from
the street. The doors of the original house are only visible to messengers if the
inhabitants of the house build corresponding doors in the facade. To enter the
house in this scenario, a messenger would have to first knock at some visible door of
the facade, be allowed in, and then knock at and be allowed into the actual door of
the house. In this way the security of the house is greatly increased from unwanted
intrusions. (Andyoucanhaveacollectionoftrustedhousesinsidethefortwhich
are less protected from each other.)
The title of thisessay,MentalFirewalls,comesfromanarticlebyTimothyL.
Thomas which appeared in the Army War College journal Parameters in Spring 1998.
ItwastitledTheMindHasNoFirewalls.TheArmyhasan often honorable tradition
going back to the Revolutionary War, the minutemen, and so forth. But it also has
had and still has some treason in its ranks.Thisisjustthegroundtruth,the
factsontheground.An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin
machine crap orsomepathologicalliarsbullshit,mustbedealtwithaccordingly.This
holds for all branches of the military. This holds for law enforcement as well. It
holds for all intelligence agencies also. It holds even when they pretend the torture
devicesdontexist.Evenifthevictim does not realize what is happening to him or
her, it is still torture. Informed consent must be truly informed. Torturing an
American citizen is at leastastreasonousassellingthenationstopsecretstoa
foreign power.
Thomasarticlewas in fact entered into evidence as part of a lawsuit by Harlan Girard
of the International Committee for the Convention Against Offensive Microwave
Weapons.Thearticlescentralmetaphoristhathumanbeingsarelikethe
computers on a network, except that they do not have the ability to control the
information traffic entering and leaving them. Their ports, or doors, are wide open.
This sort of analogy was prevalent during the military informationwarfarebuzzword
phase, and illustrates the sort of thinking that was going on at the time. [On a note
of caution, not all of Thomas' article should be taken literally; whether purposefully or
not there is some likely disinfo there.]
Deception Operations AgainsttheHumanBiocomputer
What is it that corresponds to your reality? What do you perceive, and how do you
make your decisions? You receive information through your eyes, ears, and other
senses. You read the information from the writers you choose to read, and listen to
thespeakersyouhaveaccesstoveryoftenthesedaysfromTV, radio, or the
internet. You think to yourself, in your private inner voice. You visualize and
imagine. In information warfare against individuals all of these are thought of as
nothing but information channels that can be blocked, censored, co-opted, faked,
forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole
perceived reality. Like the hypnotized subject who does something which violates his
ethics while being persuaded to imagine he is doing something else entirely, the
information warfare subject is acting in a fantasy world created precisely to
manipulate him to do what his controllers want. This is known as a deception
operation.
Such complete control, as far as I know, is not yet possible, but the principles still
hold for whatever approximation can be achieved. And the principles have been put
intopractice.Ofcourseinformationwarfareisabuzzwordand most of it is just a
take on the ages-old practices of propaganda, lying, and manipulation. But a new
buzzword generates funding, and perhaps more importantly serves to morally
distancethenewcleanpracticesfromthe dirty, filthy business of amorally
manipulating human beings like pawns, with complete disregard for unalienable
human rights. What was new at the time of information warfare was 1) the internet
as a widespread societal force, and 2) the wider development of neuroinfluencing and
so-called nonlethal weaponsthatcandirectlyinfluencepeoplesbrains.
As medicine and technology develop ever more advanced prosthetic devices, people
will increasinglybecomecyborgsasisalreadyhappening.Becauseofthistrend
these issues will become increasingly clear with time. That is, it will become
increasinglycommontohavecomputerdevicesimplantedinonesbody. If someone
hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into
your physical body, brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation
In this section I will describe the basic torture setup used against our hypothetical,
composite mind control torture victim. The focus is on the effects that the victim
experiences, not necessarily the particular technology that is used to inflict it.
Remember in all of this that the torture any individual receives can vary. It will vary
accordingtothetorturersmotivesandtechnology,but will also be tailored to the
psychology of the victim. What might bother one person would not bother another.
Theprofessionaltorturerswill start according to how their torture manuals say to
go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus
on that more and more in their torture. As you read this, keep that in mind. These
torturers are not any different from the sort you might read about in Red Cross
literature, who shock the genitals of victims, etc., except that they have access to
abuse the most advanced technology and hide behind an evil U.S. government which
sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly
and covertly, on the street, on internet, etc. All forms of taunting and goading tend
tooccur.Forexample,thereisaMarcoPolotypeofcanyoucatchmetaunting.
Any and all sorts of high-tech and low-tech harassment are used. (Just because it is
sophomoric or pathetic does not mean they will not do it. In fact, this increases the
likelihood that the victims will be ridiculed if they complain. Remember the shoe
powdertomakeCastrosbeardfallout?)Thevictimsoonhastowonderabout
everything that breaks or goes wrong in their lives. The harassers use their
surveillance to see what troubles the victim is having and then trytotakecreditfor
causing them. The torturers are often arrogant and even incompetent at their vile
torturejobsdespiteusingthemostadvancedtechnology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions
are created to make the victim suspect those closest to him or her. Deceptions are
launched so victims will blame innocent neighbors for the harassment.
(Unfortunately, in the despicable circles of mind control torture, it sometimes is a
neighbor or even a close family member that truly is responsible. There might be an
outofcontrolsafehousenextdoor,forexample.)
The victim is zapped inside his or her home (or a deception operation is launched so
the victim thinks this is what is happening). Heart rhythm palpitations induced by
remote technology can cause terror to an individual inside his or her home.
Thevictimsmind is under assault with voice projection, voice cloning. The Village
Voice, inanarticlefromJuly2001titledPsychoWarfare,describedan Air Force
report uncovered by Nick Begich. Quoting from the article,
thetechnologymaybeabletocreatehighfidelityspeechinhumans,raisingthe
possibilityofcovertsuggestionandpsychologicaldirection.Itmaybe possible to
talktoselectedadversariesinafashionthatwouldbemostdisturbingtothem.
This is exactly what they do, and there are several different technologies
documented in the open literature which can achieve this. Some victims may be test
cases for such psychological harassment techniques, or the method may already be
perfectedand in covert operational use. [They don't mention this in psych
textbooks or in movies about "schizophrenics," do they?]
Twenty-four hours a day, the victim is subjected to commands, ridicule, and
distractions inside his or her private mind. How would it feel if you heard a voice in
yourheadasking,Canyouhearthis?asifsomeonewerecalibratingatorture
device? The brain wants to respond; it was never meant to be violated in these
ways. Interrogation. What might bother you? Any secrets, etc., the pigs might
tease out and harass you with? Anything that would insult you they could focus
on? Anything that might distract you they could keep you distracted with?
Finally, the victimssupposedlyprivate,subvocalizedthoughtsaresomehowread,or
inferred and analyzed. There are various levels at which this can occur, from remote
heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG
signals. Not all victims report this level of surveillance, and certa

Potrebbero piacerti anche