All Posts (12237)
http://www.theepochtimes.com/n3/1217415-cool-yet-creepy-mind-control-and-mind-controlled-technology/
Cool, Yet Creepy, Mind-Control and Mind-Controlled Technology
Does melding your mind with machines excite or scare you?
By Tara MacIsaac, Epoch Times | January 23, 2015 | Last Updated: January 23, 2015 11:33 pm

The ways in which technology controls our minds may go eerily beyond our habits of blindly following GPS directions or instantly Googling something instead of thinking about it.
The technology already exists to implant and erase memories in the brain, and to use one person’s mind to control another person’s actions. On the flip side of technological invasions into our minds, interesting gadgets are increasingly being invented that can be controlled with the mind, hands-free.
The machine-mind meld is a fascinating phenomenon, with something perhaps a little creepy about it.
Scientists are able to implant and erase memories in rats’ brains—and maybe human brains are next?
A team led by Roberto Malinow, a neuroscientist at the University of California, San Diego, used light to activate neurons. They inserted a light-sensitive protein into the rat brain along with an implant that could produce a pulse of light. They used this method to stimulate neurons that connect a part of the brain related to fear and a part related to processing sound. The effect was similar to the association produced in a rat conditioned by shocks to fear a particular sound.

Images of a rat and a light beam via Shutterstock
“We can make a memory of something that the animal never experienced before,” Malinow told Nature last year. Conversely, they could erase the memory by another sequence of light impulses. “We were playing with memory like a yo-yo,” Malinow said.
, neuroscientist, University of California
If one person is hooked up to a machine that picks up brain signals and another person is hooked up to a machine that stimulates part of the brain, the first person can control the other’s actions.
Researchers from the University of Washington, led by Rajesh P. N. Rao, published a study in November 2014 in PLOS One, showing experimentally that this kind of mind-control is possible.
Person A’s intention to move the right hand was picked up through an electroencephalography (EEG) cap. It was sent to a computer, which transmitted it as electric pulses to a transcranial magnetic stimulation coil on top of Person B’s head, explained Live Science. Person B’s right hand twitched. It’s not at the science-fiction level of total mind-control yet, but it’s a start.
EEG headsets are now allowing people to interact with their clothing, evoking changes in attire according to their moods. The headsets are also allowing people to telekinetically play games.
Smithsonian Magazine reported last year on the neuroscience-inspired fashion devices Shippo and Necomimi Cat Ears. Much as a dog wags or droops its tail or perks up its ears depending on its mood, these fashion accessories (literally fuzzy faux animal ears and tails) react to the wearer’s mood. The fashion devices read the person’s mood from his or her brain signals.

An employee of Neurosky Japan wears a headset and a cat tail called ‘Shippo’, which can be cotrolled by a brain-machine-interface (BMI) device that analyzes the user’s brain waves to swing the cat tail. (Yoshikazu Tsuno/AFP/Getty Images)
At the AT&T Hackathon last year, neuroscientist Ruggero Scorcioni showcased a similar device that would read a person’s mood, feed it through a smartphone, and block or accept calls based on the user’s emotional state.
The Star Wars-inspired game “The Force,” uses an EEG headset to allow players to train as Jedis. The player trains his or her mind to manipulate a small sphere within a 10-inch tube. Would-be Jedis learn to use the Force, albeit with the mediation of some machinery.
Follow @TaraMacIsaac on Twitter, visit the Epoch Times Beyond Science page on Facebook, and subscribe to the Beyond Science newsletter to continue exploring ancient mysteries and the new frontiers of science!
Dealing with v2k.
Over the 11 years that I have been a Target for research by those who have created the technology and have the motivation to use this incredible technology to harass, torture, and manipulate humans to their ends. AS many know, two of the most often shared symptoms of being a Target are Gangstalking, and v2k. I have experience with both. As well as many other things related to these two seemingly primary tools the enemy uses against us.
There is an important understanding when it comes to the relationship between how these tools are used. When it comes to v2k, it is obvious that there is technology (machinery) that enables our enemy to make us understand their words. Ideas, thoughts…as well as what the AI (BOT, computer program, etc.…) has to put into our brains, and thus often our minds. This is interesting to examine closely. Most Tis who get v2k, find that they can communicate with the enemy by thinking alone! This is two way communication! They are not just inserting words and ideas, they are reading ours as well!
This is a daunting reality for most to face. The idea of dealing with gangstalkers becomes much more complicated considering that those who stalk, harass, play games with, or create street theater, have superiors who can directly feed our thoughts, or relative information from our thoughts, into their actor’sbrains! This ability gives them knowledge of when you leave your home, when you are thinking of trying to ‘capture’ a stalker on camera, or where you will be going.
Now, there are also other things that the enemy can do to a target by use of the v2k mind read/input technological abilities. There are various reasons that using large numbers of people to do what might be called traditional, or Stasi/Cointelpro tactics achieved. Much of the surveillance was to gather data. In our current, modern situation, not only is the NSA and CIA gathering all information from digital media, but there is also the agency that uses the Most Incredible technology in human history. They now gather data directly from our brains!!!
Also, because of the ability the enemy has to insert ideas, and control our emotions, they can easily manipulate our perceptions, thus creating illusions of being followed. Often they will manipulate the sounds of others voices. When strangers speak, the enemy has the ability to manipulate the brain processes that understands sound. They keep the sound of the person, but change the words to theirs. SO, even if you know this person, and know their voice, you will not likely be able to tell that it is a v2k illusion rather than the person who you think it was. This ability allows them to use actual people in any situation, much, much less often, because all the necessary components for harassment are contained in the technological approach. Eliminating g the vast majority of actual human involvement reduces the opportunity of a whistleblower coming forward against what the enemy does.
Understanding how the enemy employs the illusions they impose on us is important. It is often stated among many experienced Tis that when you become fully aware of a trick the enemy uses, they almost always stop using it. It’s like the magician who knows his audience knows the secret to his illusion, so there’s no use in using that particular one. Knowledge is power. The more knowledge we have of our situation, the better off we will be to deal with the things we go through.
Anothe3r tactic the enemy uses is mind controlling others into saying or doing something that you will perceive as gangstalking. The important thing to remember when confronted with this tactic, is that the person has no idea that they are being used! If they are strangers, they will not know you. IF they are not strangers, then they will still not know what they are actually saying. Sometimes they will not even remember they have said it. This tactic also keeps the chances of whistleblowers sprouting because the people involved have been high jacked and manipulated, and therefore have no knowledge of our plight, or of the enemy controlling them.
V2k can include many sounds. I have heard the most incredible sounds effects that the enemy made appear come from the tops of skyscrapers. I thought everyone could hear these sounds because they appeared to emanate from outside my head, but they were actually being created within my brain and had nothing to do with my ears. This ‘outside’ sound is quite different from ‘inside’ the head sound. This is when they seem to talk inside your head, or when they manipulate and change your thoughts. Finally they can make sounds that everyone around you can hear. They don’t do this often, as when there is found to be no source of the sound, then people grow suspicious.
While real people can and do run the machinery attached to us, most often it is a programed AI that is running the show. Since it is humans that decide what the agenda will be for each of us, even by programming the AI, I refer to the source of v2k as ‘they’, even when speaking of AI.
Here are some things to do to deal with v2k:
- When it is quiet, ignore it if at all possible.
- When it is louder, and can’t be ignored, I use a technique I learned from having OCD. I think the word, “inserted” right after they insert the word or phrase. This is a form of deprogramming. IT is a reminder to your brain that the inserted info was faulty in nature and not to be recognized. This can be hard to do when they turn up the volume loud, or repeat the phrase or word faster than you can think, ‘inserted’. I use this technique quite often, sometimes over a thousand times a day.
- When not knowing if you are hearing real people or v2k2, you can put on headphones, or wear earplugs. IF you play the music loud enough to drown out real people’s voices, but you still hear voices, then its v2k.
- Another way to help know is by ‘reality testing’. For instance, I had ‘heard’ employees at my local grocery store talk about me. They said ugly things, but then when I thought about it, they couldn’t have possibly known me well enough to form that opinion. SO I ignored it. Then when I had the chance to interact with them, they have virtually no knowledge of my existence. This happened again when I got a job at a drug store. Just weeks these same people seemed to be saying the ugliest things about me, but now they were hiring me!! It proved that the things I ‘heard’ them say wasn’t them at all.
- The enemy can also converse with you through v2k. By thinking alone, you can talk about many things if they wish to. Most highly recommend not to engage the enemy in this fashion. They are extremely deceitful and can mimic any voice, and they can use personality avatars that change their personality into someone else’s, maybe someone you know. I have chosen to engage in conversation with the enemy and have gained a bit of useful material, but for the most part, it’s just been psychological play in the end.
Whenever you deal with the ongoing programming that the enemy tries to instill in you by v2k, be Strong, and be Stubborn. Know you are right and stand your ground on your beliefs.
Please feel free to add to this list of tools to deal with v2k. AS I remember tools I’ve used, or as I come across new ones, I will add to the list.
Solor flares or geomagnetic storms can cause great power outages. It is theorized that a large enough one voukd take out our electrical power structure altogether.
This phenomena may afvord us at tge least, a short window of absolute seperation from the machine. If it is a total blackout of long duration....we will in effect be free!!!
"The March 1989 geomagnetic storm caused the collapse of the Hydro-Québec power grid in a matter of seconds as equipment protection relays tripped in a cascading sequence of events.[2][13] Six million people were left without power for nine hours, with significant economic loss. The storm even caused aurorae as far south as Texas." http://en.m.wikipedia.org/wiki/Geomagnetic_storm
We should prepare for such a situation. We might not have much time to act in our favor when it does.
November 5, 2014
UW study shows direct brain interface between humans
Sometimes, words just complicate things. What if our brains could communicate directly with each other, bypassing the need for language?
University of Washington researchers have successfully replicated a direct brain-to-brain connection between pairs of people as part of a scientific study following the team’s initial demonstration a year ago. In the newly published study, which involved six people, researchers were able to transmit the signals from one person’s brain over the Internet and use these signals to control the hand motions of another person within a split second of sending that signal.

In this photo, UW students Darby Losey, left, and Jose Ceballos are positioned in two different buildings on campus as they would be during a brain-to-brain interface demonstration. The sender, left, thinks about firing a cannon at various points throughout a computer game. That signal is sent over the Web directly to the brain of the receiver, right, whose hand hits a touchpad to fire the cannon.Mary Levin, U of Wash.
At the time of the first experiment in August 2013, the UW team was the first to demonstrate two human brains communicating in this way. The researchers then tested their brain-to-brain interface in a more comprehensive study, published Nov. 5 in the journal PLOS ONE.
“The new study brings our brain-to-brain interfacing paradigm from an initial demonstration to something that is closer to a deliverable technology,” said co-author Andrea Stocco, a research assistant professor of psychology and a researcher at UW’s Institute for Learning & Brain Sciences. “Now we have replicated our methods and know that they can work reliably with walk-in participants.”
Collaborator Rajesh Rao, a UW professor of computer science and engineering, is the lead author on this work.
The research team combined two kinds of noninvasive instruments and fine-tuned software to connect two human brains in real time. The process is fairly straightforward. One participant is hooked to an electroencephalography machine that reads brain activity and sends electrical pulses via the Web to the second participant, who is wearing a swim cap with a transcranial magnetic stimulation coil placed near the part of the brain that controls hand movements.

A transcranial magnetic stimulation coil is placed over the part of the brain that controls the receiver’s right hand movements.Mary Levin, U of Wash.
Using this setup, one person can send a command to move the hand of the other by simply thinking about that hand movement.
The UW study involved three pairs of participants. Each pair included a sender and a receiver with different roles and constraints. They sat in separate buildings on campus about a half mile apart and were unable to interact with each other in any way – except for the link between their brains.
Each sender was in front of a computer game in which he or she had to defend a city by firing a cannon and intercepting rockets launched by a pirate ship. But because the senders could not physically interact with the game, the only way they could defend the city was by thinking about moving their hand to fire the cannon.

The sender is hooked to an electroencephalography machine that reads brain activity. A computer processes the brain signals and sends electrical pulses via the Web to the receiver across campus.Mary Levin, U of Wash.
Across campus, each receiver sat wearing headphones in a dark room – with no ability to see the computer game – with the right hand positioned over the only touchpad that could actually fire the cannon. If the brain-to-brain interface was successful, the receiver’s hand would twitch, pressing the touchpad and firing the cannon that was displayed on the sender’s computer screen across campus.
Researchers found that accuracy varied among the pairs, ranging from 25 to 83 percent. Misses mostly were due to a sender failing to accurately execute the thought to send the “fire” command. The researchers also were able to quantify the exact amount of information that was transferred between the two brains.
Another research team from the company Starlab in Barcelona, Spain, recently publishedresults in the same journal showing direct communication between two human brains, but that study only tested one sender brain instead of different pairs of study participants and was conducted offline instead of in real time over the Web.
Now, with a new $1 million grant from the W.M. Keck Foundation, the UW research team is taking the work a step further in an attempt to decode and transmit more complex brain processes.
With the new funding, the research team will expand the types of information that can be transferred from brain to brain, including more complex visual and psychological phenomena such as concepts, thoughts and rules.
They’re also exploring how to influence brain waves that correspond with alertness or sleepiness. Eventually, for example, the brain of a sleepy airplane pilot dozing off at the controls could stimulate the copilot’s brain to become more alert.
The project could also eventually lead to “brain tutoring,” in which knowledge is transferred directly from the brain of a teacher to a student.
“Imagine someone who’s a brilliant scientist but not a brilliant teacher. Complex knowledge is hard to explain – we’re limited by language,” said co-authorChantel Prat, a faculty member at the Institute for Learning & Brain Sciences and a UW assistant professor of psychology.
Other UW co-authors are Joseph Wu of computer science and engineering; Devapratim Sarma and Tiffany Youngquist of bioengineering; and Matthew Bryan, formerly of the UW.
The research published in PLOS ONE was initially funded by the U.S. Army Research Office and the UW, with additional support from the Keck Foundatio
How Does The Human Brain Work? New Ways To Better Understand How Our Brain Processes Information
Date: May 26, 2009 Source: University of Leicester Summary: How does the human brain process information? Researchers explore new methodologies that shed light on this age-old mystery. The human brain is perhaps the most complex of organs, boasting between 50-100 billion nerve cells or neurons that constantly interact with each other. These neurons 'carry' messages through electrochemical processes; meaning, chemicals in our body (charged sodium, potassium and chloride ions) move in and out of these cells and establish an electrical current.
Scientists have, for a long time now, stimulated with different types of inputs individual neurons that have been isolated for study. To have enough statistical power, these experiments typically involved stimulating a single neuron over and over again, to get a general idea of how it responds to different signals. Although these studies have yielded a lot of information, they have their own limitations.
An article by University of Leicester bioengineer Professor Rodrigo Quian Quiroga appeared recently in Nature Reviews Neuroscience. In the article, Prof. Quian Quiroga and co-author Dr. Stefano Panzeri discuss new methodologies that are enabling scientists to better understand how our brain processes information.
Prof. Quian Quiroga explains, “The human brain typically makes decisions based on a single stimulus, by evaluating the activity of a large number of neurons. I don’t get in front of a tiger 100 times to make an average of my neuronal responses and decide if I should run or not. If I see a tiger once, I run”. Traditional studies thus undermine this complexity by only accounting for the responses single neurons.
Moreover, these studies take into account an “average response” obtained by stimulating the neuron numerous times. The brain, on the other hand, acts based on single stimulus presentations. Therefore, the information given by an averaged response can often be insufficient.
Prof. Quian Quiroga and Dr. Panzeri stress, on account of these factors “it is important to shift from a single-neuron, multiple-trial framework to multiple-neuron, single-trial methodologies”. In other words, it is more beneficial to study responses of numerous neurons to a single stimulus.
Prof. Quian Quiroga says, “A major challenge of our days is (thus) to develop the methodologies to record and process the data from hundreds of neurons and developing these is by no means a trivial task”.
He adds, “Our brains are able to create very complex processes – just imagine the perfect harmony with which we move different muscles for normal walking – thousands of neurons are involved in this and to determine the role of each is complicated”.
In his recent review paper, Prof. Quian Quiroga and Dr. Panzeri discuss two complementary approaches that can be used to resolve this, namely ‘decoding’ and ‘information theory’.
‘Decoding’ essentially helps determine what must have caused a particular response (much like “working backwards”). Thus, the response of a neuronal population is used to reconstruct the stimulus or behaviour that caused it in the first place. ‘Information theory’, on the other hand, literally quantifies how much information a number of neurons carry about the stimulus.
Prof. Quian Quiroga explains, “together, the two approaches not only allow scientists to extract more information on how the brain works, but information that is ambiguous at the level of single neurons, can be clearly evaluated when the whole ‘population’ is considered”. The review is an asset for anyone involved in the field, as it carefully considers and evaluates the two statistical approaches, as well as describes potential applications.
As part of his own research, Prof. Quiroga (in collaboration with Prof. Richard Andersen at Caltech) has been studying the ‘decoding’ of movement plans using activity of certain neuronal populations. This ability to predict movement intentions from activity of neurons has application in brain-machine interfaces, especially for development of neural prostheses (electronic and/or mechanical devices that connect to the nervous system and replace functions lost as a result of disease or injury) for paralysed patients.
http://www.sciencedaily.com/releases/2009/05/090519152559.htm

Several months ago, I shut down this column and removed its content. For those that don't remember, I spent nearly four years digging into the physics and technology behind reading/writing information to/from the human brain using radio waves. There was a time when the general view of this was associated with 'tinfoil hat conspiracy theories'. That all changed when I began demonstrating the physics to reveal a functional model which, in turn, revealed a medical torture program run by a portion of the US government.
I closed the column for a variety of reasons. Firstly, there is the ever-present pressure from various organizations to maintain the silence. That said, I have never much cared for their opinions and it did not rank very high in my decision making processes. Secondly, I tend to have a different approach to writing than most authors. My published articles can be as much like a notebook to capture ideas as it is a mechanism to convey those ideas to others. This can lead to a somewhat muddled experience for readers that do not understand this. Finally, as with any investigation, getting side-tracked is inevitable as interesting things pop up all the time.
Thus, a clean-up was long overdue.
In today's article, I intend to capture the important elements from the series on reading/writing information to/from the human brain in the context of modern warfare. Rather than having twenty different articles, with information spread all over the place in various states of revision, it is best to have it in one single page. This article will capture everything that is currently known, or can be inferred, about the system, its objectives, the current state of progress and any additional relevant material. As such, this is a very long article.
As ever, the question is where to begin. When describing a system of this magnitude it is always difficult to identify a good starting point that is suitable for most readers. I suppose the best place to start is a small executive summary that describes the system and from there we can break it out into a more detailed picture.
A further question is what to name this. A misleading term is "remote neural monitoring" (RNM), as it implies that such a system is merely recording. A term I have used before is "Synthetic Telepathy", but that can also be misleading as it is a term used to describe a different military technology under development. I feel that the best approach is to extend the historical name for this technology, to better reflect its current capabilities. "Remote Neural Monitoring, Control and Manipulation" (RNMCM) is a bit of a mouthful, but it is certainly more accurate.
Executive Summary
"Remote Neural Monitoring, Control and Manipulation" (RNMCM) is a term that refers to the usage of specific technologies to record and/or alter the electrical activity of neurons in the human body (or any life-form). Neurons can broadly be separated into four main categories:
- Sensory neurons
- Motor (and other output) neurons
- Communication neurons
Computation neurons
The electrical activity of each of these four main types of neurons can be classified by a computer. Every action a human makes, or experiences, is represented by specific patterns in the electrical activity. Thus, when a specific electrical pattern is observed, we can state that a certain event has happened. That could be a feeling of joy, seeing a blue car, tasting an orange, thinking of a word, moving a limb, or even visualizing a shape in your mind to solve a mathematical puzzle.
The key to any functional RNMCM system is obtaining good recordings of specific electrical patterns and knowing what they mean. Further, as the electrical patterns are slightly different between people, knowing these differences allows the development of systems that can classify electrical activity across the entire global population without retraining. We call this latter goal "Generalization". "Generalization" is important because training takes a long time. With "generalization" we can skip the training process and jump straight to reading the required information which is a lot faster and requires less computing power.
An example of an unclassified technique of reading the electrical activity of the brain is Electroencephalography (EEG). EEG has a limitation, in that it can only record the sum total of electrical activity. This is rather like listening to a song, in that you cannot hear the individual instruments in isolation. RNMCM uses a different approach, it exploits the reflectivity/absorption/transparency of neurons at radio frequencies to record individual activity of neurons. This can be compared to obtaining a track with a single instrument playing its role in a song from a music studio.
By recording the electrical activity and observing behavior, or impact to other electrical activity, we can infer what each electrical pattern means. By recording the slight variations found in different human subjects, by analyzing tens of thousands/millions of brain patterns, a system can be trained to recognize what that electrical activity means in any human subject it encounters without retraining. The analysis of tens of thousands/millions of people is how we obtain "Generalization". Given the complexity of the human brain and certain limitations, obtaining "generalization" could take half-a-century or more depending on available hardware and complexity of the problem.
Throughout this process, we will obtain an ever-increasing number of identified electrical activity patterns that are militarily useful. For example, being able to know military plans in advance, or quantify enemy numbers and capabilities. In addition, we will be able to combine these identified electrical patterns to create/compose our own complex electrical patterns. This latter ability will allows us to reverse the process, drive the neurons with our patterns and have a human subject under our control or influence.
Initially, when introducing composed patterns into a human subject, we would expect a certain level of influence. In time, as the database of electrical patterns expand, it is expected that this will give way to complete remote control.
In order to complete the training of the system and test its effectiveness, tens of thousands/millions of volunteers would be required to submit themselves to long-term (life long) experimentation, the effects of which would be wide-ranging. We can expect deaths, deformities, mental illness, seizures, complex syndromes, chronic and acute pain, heart and respiratory failure, etc.
Given the national security requirement of secrecy and the lack of such a willing population, secret experimentation on a significant sub-section of the human population globally would be required. Three basic categories of human subject will be required, training, validation and test. The training group will consist of human subjects that are used continuously 24/7 to both produce electrical patterns and serve as a testing area for identified patterns. The validation group will will be used as a quick reference to confirm the accuracy of generalization. The test group, which for practical purposes will continuously select random individuals on the planet, will be used be to study the generalized pattern(s) effectiveness and accuracy.
It would be impractical to hide such activity to the major enemies of the state, thus some form of international agreement encompassing technology sharing and combined defense pact would need to be made to provide cover for the program.
Technical Summary
The technology required to drive this program on the surface is a rather simplistic combination of existing technologies. That said, to bring the system up to near real-time speed for both reading and writing requires optimization across a multitude of technologies all developed by numerous vendors and each with their own particular physical limitations.
The system can be broken down into a number of layers and lends well to a development process conducted through compartmentalization of classified programs. The development of the system can be fragmented through hundreds, if not thousands of independent programs and the results combined reducing the footprint of knowledge and thus program exposure. Further, in time, particular technologies and techniques can be re-invented at a later date with a higher profile in order to establish false historical time-lines thus reducing the exposure of key staff to prosecution and/or direct action by hostile or friendly forces.
The primary task is to deliver a distributed computing platform (Grid Computing) spanning the globe and linked by a mixture of high speed connections. Custom software (middleware) will control the allocation of resources, distribution of programs and the migration of data around the grid computing platform. It will, in effect, operate as a single geographically separated supercomputer and have the ability to hide this fact from end-users by presenting false logical views of the system. The grid will be a mixture of a range of hardware from commercial-off-the-shelf (COTS) hardware, to custom chips and boards with the latest advancements in quantum computing optimization.
The grid computing platform will play host to a strong, general purpose, artificial intelligence. The strong artificial intelligence will perform numerous roles throughout the defense sector, but will provide the ability to compartmentalize activity through a strict classification process. Thus, any activity generated by this program will not generate any concern and will be attributed to general remote sensing applications if observed from multiple points. The role of the strong AI in this program will be complex. During the training phase, its main role will be to infer the meaning of electrical activity and to leverage its human-level reasoning capabilities to examine internal thought processes. As we transition to influence and control, the strong AI will attempt to mimic the human subject in terms of thought processes, language and behaviors. The ultimate goal being that the strong AI can assume complete remote control of a human subject and impersonate them. The fallback position, should this prove unfeasible, is to substantially compromise the human subject's neural activity such that we are in a position to strongly influence decisions and actions. An additional objective, will be the ability to perform remote assassinations, intimidation and torture to extract information not directly observed by the system.
The strong AI will direct a classification system composed of the latest developments in machine learning. This classification system will be fed by signal processing network that prepares radio data for analysis by the classification system. The classification system will be in a low latency path from the source of radio information and have the ability to prioritize signals based upon temporal requirements. This will require a programmable architecture which can be driven by the strong AI.
Observers of this system with sufficient technical knowledge could not determine that the system was anything beyond a complex radar and remote sensing platform. Linking this system with a program to read/write information to/from the human brain would be complete speculation on the behalf of the observer. This provides the system with robust counter-intelligence potential from internal threats and a high degree of plausible dependability. Other than complex analysis of the data, which can be erased or moved to more favorable legal jurisdictions, complete seizure of the equipment only indicates the potential for use, not the actual application. During development of the satellite hardware the requirements, particularly of the transmitter arrays, may raise suspicions. A mitigation strategy would be to introduce the system as a directed energy weapon designed to manipulate/jam electronic systems (such as guidance systems of ballistic missiles/bombers/etc.).
Radio information is delivered from one, or more, big-ear (synthetic aperture - operating at different elevations) satellite network(s). The constant speed of light places hard limits on the elevation of satellites required to capture/broadcast real-time information and thermal noise places hard limits of the maximum elevation for non-real-time intercepts. The hard limits are compounded by the fact that the human body can only absorb/reflect so much radiation.
Technical
The Grid Computing Solution
The physical hardware arrangement of the grid computing solution will be quite complex. Real-time interaction with the human brain is a hard requirement of the system, thus latency has hard limits that dictate the minimum number of site globally as well as their distance from satellite downlinks. To the human brain, variation in delays can be more noticeable than a constant delay, especially when multiple senses are involved. Typically, when working with a single sense a delay of up to 150ms is tolerable, however, this can drop to 60ms when multiple senses are involved.
Thus, to support an audio stream such has inserting words into the human brain, a delay of up to 150ms is functional. When that is combined with visual or other sensory stimulation, the functional delay begins to drop to around 60ms. As a result, the grid computing solution must have extreme low latency and designed to pipeline information. That is, the solution must be designed like a circuit that provides the most optimal physical path between points. This architecture is in direct contrast to modern approaches which rely completely on the optimization of software functions. Such an approach will not result in the required high performance demanded. The key problem is that this approach is very brittle from the perspective of future development, however, this is not much of a concern as the application will be a constant factor.
These hard limits provide a defined limit on the number of I/O exchanges. I/O exchanges have an issue known as end-point crisis. An end-point crisis is where the transmission medium can handle more data that the circuits reading/writing data to that physical layer. Further, each I/O exchange introduces a complex delay that in itself has well-defined hard limits. As such, when scaling there is a defined physical limit of the amount of hardware that can be in a real-time pathway before it becomes non-functional. Even with the progressive improvement of hardware processing speeds and consolidation of services, these hard limits will always exist.
At the extreme, the grid computing solution (including all ground equipment and links) can be allocated 1/3 of the the delay. This provides a window of 20-50ms in which to perform all real-time functions. The grid will therefore need to incorporate elements of predictive analysis. Predictive analysis will play a key role of the services run on the grid, but the grid itself will be required to identify particular scenarios that can be optimized and offload the processing from the services it hosts. One such scenario could be the reallocation of resources or programs that migrate to the geographical area in which they are being used. Rather than this being managed in software by a hosted AI, these basic services can be offloaded to hardware that powers the grid. Thus, the grid solution identified here would be a custom hardware solution, rather than a complete software middleware.
We can now observe that the density of ground sites is dictated by the demand that any real-time target must be within a 40-100ms round trip time. Ignoring all the delays that provides an operational range of 6000-15000Km.
As noted the majority of the grid will be a custom hardware solution, that will contain custom hardware for the services it hosts. Each element of the grid will be a supercomputer in itself capable of operating independently of the grid for survivability. Given the operational range of the system, complete global coverage can be provided by around 8 sites, raising to around 24 sites (alternatively 5 main sites, 10 redundant) when triple redundancy is added. Modularity certainly lends to ease of upgrades, but it comes at the expense of adding delays to the system. Thus a balance must be struck between modularity and speed to provide the best performance. Continuous evaluation of the design of the system will reveal, over time, the most efficient trade-offs and hardware arrangements.
The grid hardware will be a mixture of semi-conductor technologies and quantum computing solutions aimed at resolving optimization problems in large datasets.
The Strong Artificial Intelligence
Given the longitudinal nature of the study to be undertaken, the complex interaction and investigation of patterns, direct human analysis is impossible. It is critical that the latest in automation techniques be applied to the problem and allowed to grow hand-in-hand with the experiments. One of the key stumbling blocks in the road to a strong AI is the lack of insight into human behavior, thought processes and ultimately validation of machine learning output. In this experiment, not only will we learn how to interface with human body via radio, but leverage the feedback provided by the human brain as a means to train the AI to replicate human behavior.
A strong AI is can be thought of a complex form of database that uses certain information in that database to replicate or approximate human behavioral responses to a given input or series of inputs. Initially the AI will be basic, it will merely perform analysis of particular neural circuits relating to speech, recognition, auditory, vision, etc. Once substantially complete, to the point where the AI can pose certain problems to the human brain, the secondary objective of making the AI more human-like in both its reasoning and behavior can begin. By posing problems to the human brain, responses can be compared with the output of algorithms employed by the AI and refined to match. This will supplement all training provided directly to the internal interfaces of the AI.
The AI will built upon a statistical engine that will return the most likely response for a given input, in that respect it will be an amalgamation of everyone and everything that it has ever interacted with. Advancement in quantum computing should provide for faster searches when posed as optimization problems. An important area of development will be the inference engine which attempts to relate the output of one statistical assessment with another, integrating that into its sum knowledge over time. It is envisaged that this will be a continuous process and no great leap in intelligence will occur for the simple reason that it is ultimately based upon computation and can only combine what it already knows. That is, the combination of information does not lead to hardware changes or changes in the laws of physics which ultimately define the method in which information can be represented, processed and outputted.
The strong AI is a mixture of both software, firmware and hardware that provides a common processing core for any number of "instances". That is, a single system provides the processing that drives an individual AI and the system will be capable of generating as many AI instances as the hardware allows for. Thus, it is quite possible to have thousands of "computer agents" tasked with various roles. Further, these "computer agents" will have the ability to migrate anywhere in the grid to follow targets or provide services more optimally. When the ability to assume control of a human emerges, the AI will also be able to have a physical presence anywhere in the world on demand to deal with emerging threats, assume political or military control or ensure economic objectives.
To support these identified roles, the AI must have a range of knowledge and specialisms that cover every area of knowledge known to man. Further, it must record the activity of every key person the globe over to ensure that it has the required "memory" to properly impersonate a given target. Such oversights would lead to major problems and rapid identification of controlled individuals. Thus, the AI must track, record and archive data relating to everyone that could potential become an important individual as gaps in memory, even childhood memories, may give rise to suspicion and ultimately lead to exposure. As it is difficult to judge who will become important, the combination of two approaches are advised. Firstly, the goal of recording the neural activity of every individual on the planet is of top priority and a realistic objective. Secondly, in the interim, strict regulation and control of individuals entering positions of power is recommended to ensure the system has complete coverage of key individuals.
Such a system is likely to draw a lot of unwanted attention, it is thus advisable to have numerous parallel programs with similar capabilities to hide amongst. As this system is automated, staffing and thus potential leaks can be kept to a minimum and, for the most part, the majority of staff will not have a need to know.
Digital Signal Processing (DSP) System
Data obtained from radio sources must be prepared in a manner suitable for the AI and prepare outgoing signals for radio broadcast. The AI could perform this task, but this substantially reduces its ability to perform other tasks. Thus, all incoming raw radio signals or outgoing data will pass through a programmable DSP system that will convert the incoming/outgoing streams and separate real-time signals from those that can be examined later or broadcast later. The DSP system will be driven by the AI and dynamically updated as required. This system will supplement onboard electronics in satellites designed to reduce bandwidth usage.
Satellite Systems
The most efficient model is to employ a bi-static wide-band radar with a synthetic aperture receiver network (a big ear). The receiver network is designed to work over the entire spectrum with the highest possible sensitivity. The receiver network will be able to view all radio sources from the planet simultaneously, pinpointing their locations and tracking their movements. This information will be captured by other compartmentalized programs and leveraged appropriately.
Using a combination of transmitted radio pulses and reflected RF from terrestrial sources, humans, cars, planes, etc., will be tracked in real time, classified, analyzed for patterns and accounted for. Given the density of modern RF sources, the majority of the tracking can be performed by passive reception only. This system will produce a real-time view of the Earth with the goal of complete coverage. The bandwidth required to perform this is surprising small and all the heavy processing is performed on the ground. Each aspect of this real-time view can be presented independently as an exposed services to any number of departments without revealing the entire scope of information gathered.
In this program, we will be interested in the human tracking information. This will be fed into the system allowing target selection and tracking.
The radio transmitters used in this program produce a wide bandwidth of very weak narrow-band pulses at ground level. From an analysis perspective, it would appear similar to a spread spectrum source with limited frequency hopping capability. As such, it may be ignored as being an "old" or "legacy" system of no real importance. Each of these pulses are on different frequencies and are selectively absorbed by different neurons throughout the body. A one-to-one mapping between a pulse of a particular frequency and a neuron is not expected, but rather a high probability of absorption. Not only does the system need to account for the chaos in the neural activity and attempt to make sense of this, but it must also learn to deal with the chaos of transmitting to a moving target and all of the problems inherent in radio reception under a range of atmospheric conditions.
Unlike traditional systems radio systems, this system must penetrate modern RF shielding and be able to deliver signals with pinpoint accuracy. Thus, this transmitter will comprise of an electronically steerable maser array, that will leverage the latest advances in atomic dialectic resonance to pass through RF reflective/absorbent surfaces, follow targets underground and/or underwater. The maser array can follow particular targets or broadcast a generalizable signal over a wide area. Generalizable signals over a wide area can manipulate voting, suppress anger at government policies or actions, induce riots or revolutions, induce fear in opposing militaries, reduce libido to reduce population numbers, selectively prevent breeding in particular ethnic groups, etc.
Such a system is readily scalable and has the ability to effect the entire global population.
Key Brain Regions Under Study
Certain regions of the brain are deemed more critical than others to understand as they can prove militarily or politically useful. This allows the system to have operational status before it develops a complete functional solution to remote control. Some areas of interest are noted below, along with potential military applications, but this list is nowhere near exhaustive:
1. Hypothalamus
The hypothalamus controls body temperature, hunger, important aspects of parenting and attachment behaviors, thirst, fatigue, sleep, fear processing and circadian rhythms. For a detailed breakdown of the roles of the Hypothalamus, please follow this link:
http://en.wikipedia.org/wiki/Hypothalamus
The Hypothalamus has numerous military applications:
a. Body temperature: Altering the body temperature can result in a breakdown of internal biological process. This can reduce the efficiency or even kill the human subjects.
b. Hunger - Altering sensory information in relation to hunger can cause human subjects to starve or over-eat. Both of which reduce their capability to respond to a threat.
c. Parenting and attachment behaviors - Altering this region has an effect on bonding, relationships and loyalty to family, friends, country or ideals.
d. Thirst - Altering processing in this aspects results in the intake of too much or too little water, both of which can have drastic effects on the human body.
e. Fatigue - Altering information processing in this region can increase or decrease fatigue responses in a human subject. This leads them to either increased endurance, or Myalgic encephalomyelitis (ME)/ Chronic Fatigue Syndrome (CFS) which effectively disables a human subject.
f. Sleep - Altering processing in this area can keep human subjects awake, resulting in extreme sleep deprivation, or induce sleep similar to a coma.
g. Fear processing - Altering this region can induce feelings of intense terror, or to misjudge threats and eliminate freezing/flight responses. Also responsible for adrenal control.
h. Circadian rhythms - Altering processing in this region can induce/reduce jet lag-like symptoms and increase the risk of heart failure by up to 25%.
i. Suppression of GnRH - Reduces libido, lowers testosterone levels in males, inhibits egg release in woman, induces sterility. Used in the manipulation of relationships and Eugenics.
2. Left pars opercularis (inferior frontal gyrus) and White matter adjacent to the left supramarginal gyrus
These areas have been identified as being associated from inner speech. Inner speech is not just a form of speech without motor control, but a distinct sub-system in itself. Corollary Discharge is thought to be the method by which the brain replaces our own spoken voice with our inner voice. This can be observed by pitch shifting your spoken voice in a recording and being able to hear your own accent.
For more information:
http://brain.oxfordjournals.org/content/134/10/3071.full
http://www.eurekalert.org/pub_releases/2013-07/afps-iss071513.php
This region has a number of military applications:
a. Control and/or manipulation of speech. Weak input, near the threshold of hearing, can guide word selection for the expression of particular ideas. By stimulating an idea/or concept, it is sometimes possible to inject specific words. Full control of this region would allow for seamless control of individuals speech without conscious awareness.
b. Control and/or manipulation of this region can effect the wording of contracts or treaties to the benefit of the attacking party. Politicians, judges and legal representatives are high priority targets.
c. Control and/or manipulation of this region can be used to inject ideas or notions to effectively guide/influence behavior.
d. Control and/or manipulation of this area would pass undetected in current brain scanning tests.
3. Medulla Oblongata
The Medulla Oblongata is located at the base of the brain stem and continuous with the spinal column. Its houses the centers for respiration, cardiac, blood pressure, vomiting and vasomotor control. This region also plays a role in the muscle control for the tongue, pharynx and larynx.
The military applications are as follows:
a. To support complete remote control of an individual, respiratory control must be driven remotely and can be performed from the RC center. It can also be used to remotely simulate water boarding during interrogation or as an offensive weapon.
b. Manipulation of blood pressure and cardiac rhythms can support remote control solutions, or be used to fake cardiac symptoms. The latter can be used to temporarily remove people from key roles, or as a method of quiet assassination with supporting fake medical history. Veins and arteries can selectively widened or expanded to reduce/increase blood flow. This latter process can support mapping throughout the body, but can lead to dangerously high localized blood pressure. This can lead to aneurisms or strokes both in the short and long term.
c. Control the tongue, pharynx and larynx can be used in remote control solutions to support external speech, or to support torture (i.e. water-boarding-like activity) or assassination through asphyxiation.
Observations
One particular observation of interest is that the system is being trained in the control and manipulation of social events as they pertain to the average person. That is, the complex manipulation of social groups. It is not, as would be expected of a battlefield system, being trained against troops or in any strategic sense. This appears to indicate that the focus is political control through micro-management of daily lives, thought processes and sensations.
An extreme bias towards the manipulation of relationships and sexual aspects has been noted, with a particular focus on sexual violence towards females and controlling sexual activity.
Further, a focus on preventing and/or reducing performance in education, as well as damaging long-term memory to effectively erase education has also been observed. This also extends to manipulation of employment through various means such as sleep deprivation and various other torture techniques.
Political opinions are also commonly tested, attempts are made to make individuals support particular viewpoints of political figures, or induce feeling of rejection. One notable recent example was Nigel Farage (UKIP - UK), where the system attempted to generate feelings of dislike or rejection.
Notes on Testing
In testing, the system masquerades as either known illnesses that have limited diagnostic tests, or defines entirely new classes of illness. Any illness which can be described as a syndrome, has idiopathic causes or relies on differential diagnosis which leads to a default diagnosis is a solid candidate for replication. This provides the system with the freedom to test it solutions whilst remaining undetected.
The stock favorite is psychosis, every sensation after this is put down to anxiety. The exploration of neural structures through radio stimulation results in corruption of neural outputs in a wide range of regions. Assuming control requires that the system, at some point, attempt to drive all the various circuits in the brain. This process can take several weeks, during which the human subject is normally committed to a mental institute demonstrating extremely severe symptoms.
Most people have experienced at least one testing attempt by the system in the form of Phantom Vibration Syndrome. Experience by up to 68% of the population and noted in publications dating back to 1996, this phenomenon is the result of test of the generalizability of motor neuron stimulation. Typically directed at the hips, it is a short duration burst lasting approximately 1-3 seconds and feels very similar to the vibration of a modern mobile phone. This test is used to determine the suitability of a solution in hijacking a human physically.
Notes on Animal Testing
Cattle mutilations across the US carry the hallmarks of a medical testing program for the purposes of this experiment. The areas of mutilation are consistent with the areas being actively examined in this program. It is presently unknown if a cover story is in place to misdirect those involved on the ground (i.e biological weapon preparedness training, etc.).
Analysis of reported sensations and motor control tests of human subjects indicate the use of chimpanzees as a secondary source of experimentation before use on humans. Further, this analysis also revealed the possible use of humans in restraints being subjected to horrific levels of torture by the system. This analysis is conducted by forcing the amplification of incorrect signals sent to human subjects which are normally suppressed and following the posture they indicate. An input sensory system, such as feelings, has the ability to interpret the information without inducing corresponding motor controls.
Notes on Cover Stories
It is inevitable given the process that some individuals will identify, at least to some degree, the nature and scope of the program. It thus becomes imperative that credibility is reduced to a minimum to protect the program and its operators. As the majority of this program is directed at subjective experiences that cannot be objectively quantified and has the ability/side-effect of causing psychosis-like effects this shall be leveraged to create a movement of "crazy individuals or campaigners". Based upon the successful "UFO model" employed to hide activities of the Airforce R&D and nuclear detection capabilities, communities will formed to control the flow of information and increase misdirection. These communities will function to further reduce the credibility of reports and provide a "medical history" of a certain theme of psychosis that is a product of the times.
One vital requirement is the strict control of language in these communities. Even "crazy" people will gain the attention of the media if a sudden influx of individuals stating they are being tortured in their own homes occurs. Thus, language that downplays the severity should be adopted. For example, "torture" should be replaced with "harassment". It is also important that an unidentified group be responsible, comparable with "they" or "greys" in the "UFO Model". This assists in deflecting blame to a conspiratorial group that could be anywhere. By feeding into this and generating substantial content, it will increase the paranoia not only of genuine human subjects but also of the truly mentally ill providing even greater cover.
In online scenarios, teams will be embedded into websites posing as average readers to control the direction of discussions. They are tasked with avoiding discussion of the subject matter and driving the discussion in the direction of the credibility or sanity of the author. A group of twenty to thirty accounts of posters that appear unrelated, or even opposed to each others very existence, uniting to laugh or undermine the author is normally effective.
The Directorate of Science and Technology (CIA) will be leveraged to provide cover for the program by performing investigation into "mind control" that will be publicly released as a limited hangout. This will provide cover for the program by redirecting attention to chemical-based methods and draw in anyone attempting to uncover more.
The NSA will provide a limited hangout that attempts to downplay the technology and methods of the department should this system be exposed. This may involve a "man driven by conscience" to reveal the scope and breadth of current espionage techniques to draw attention away. Perhaps sending him to nations that are publicly viewed as our "traditional enemies" will increase his credibility, along with a well publicized hunt and extraordinary measures to ensure destruction of evidence or his capture. This individual only needs to be told that his goal is to confuse the enemy and then have that enemy generate a pretext that warrants such activity to restore balance. This will be a sequenced series events between our security partners.
Notes on Additional Capabilities
As noted, this system is an allocation of a remote sensing and directed energy weapon platform. Its development predates the "Strategic Defense Initiative", but would meet the definition of the hardware described by the Reagan Administration and offered to the then Soviet government. The system is capable of creating controlled interference on any conductor and passing through many forms of electromagnetic shielding. As such, the system can interface and assume control of the majority of commercial and military electronic devices and/or render them useless. Digital equipment is highly susceptible to interference with internal clocks and tends to fail, lockup or reboot. From planes, to laptops, all electronic systems can be compromised. In the case of computing equipment, it is possible to remotely introduce programs, delete/alter/create data and modify/replace/delete firmware. Further, it is also possible to read the contents of any data transmission that uses an radio reflective surface (i.e. copper, etc.). There is some speculation that fiber optic cables can be compromised through analysis of group motion of charge particles due to the momentum of light striking the internal surface but nothing solid in terms of experimental details.
Notes on the Biological Interaction
The suspected mode of interaction between electromagnetic waves and neurons is the plasma membrane. From an electrical perspective this region can be described as a combination of a capacitor and inductor. Classically, this arrangement is known as an oscillator or tuned circuit which will preferentially absorb electromagnetic waves of a given frequency. How exactly the absorption alters information in the brain is still open to question, but the primary model would indicate that the plasma membrane is used as thermal regulator for internal chemical processes that trigger voltage-gated channels to initiate a process that dissipates internal thermal activity from the neuron. That is, the particles entering and leaving the neuron carry with it energy that would otherwise disturb the internal chemical reactions and release that energy in another form. Alteration of this thermal profile, is the means by which information or external control/influence is introduced into the system.
Neural coding schemes (such as rate encoding) are indicative of the type of chemical exchange and the corresponding thermal profile of the chemical reactions. Information can be inferred from the electrical activity, but the electrical activity does not play a role in information transfer directly. As such, the main carriers of information are chemical and driving the electrical patterns by an external signal manipulates the thermal processes that govern the reactions those chemicals undergo.
Theoretically, this should lead to a garbage output at the dendrites as the chemicals present in a given neuron cannot be externally controlled. A disconnect exists between the mathematical concept of generalization in a neural network and generalization of a chemical-based, or biological, neural network. A distinction that appears to be lost on the scientific team behind this system. In an input system, such as audio or visual, a consistent pattern of garbage presented as an input could be interpreted as information as the neural network of the brain adapts and performs additional processing. This could be misinterpreted as convergence of a solution by a remote system that was attempting to train itself to interface. It could also be the case, that the remote system has generated an optimal generalized pattern that the human brain can adapt to interpret readily.
The latter case, seeming highly likely, will present an issue in motor control. This also indicates that merely repeating an electrical pattern may not be the optimal solution in many cases. Further, this type of interface suggests that a chemical reaction is being modified creating variations of complex molecules that would not otherwise be produced. This opens the issues of long term damage and what happens to these chemical analogues.
As a result, this means that any attempt to control the motor neurons from the spine, as they are monosynaptic, will result in failure. The output would be random garbage. Whilst it will be possible to selectively stimulate a monosynaptic nerve and generate some form of output, it can never be controlled. Thus, any attempt to control motor neurons must be directed at the primary motor cortex, the premotor cortex, the supplementary motor area (or SMA), the posterior parietal cortex and primary somatosensory cortex. The obvious hope would be that these regions would modify their structures and learn to accept the alternative input. That said, as neural networks are a form of filter it is highly likely that non-functional control signals would merely be filtered out. Similar to an electrical signal, which can just be earthed, a chemical signal must also be disposed of in some manner. Thus, it is likely that disposal would occur as some form of motor output although not one that could be described as functional.
The interesting part is the ability of the system to localize motor control, this has a resolution down to a few millimeters. That said, the output is typically junk, a simple form of stimulation or even a complex form that does not correspond with natural muscle movements. Motor units are not simple contractions of muscle tissue, but a complex coordination of activations to various degrees. This provides structural support, fluid movement and dexterity. Thus, a garbage output to this would result in uncoordinated behavior. This could indicate that the system is targeting the monosynaptic motor nerves and fruitlessly trying to implement a control system, or that at least some basic pattern has been accepted in the control centers in the brain. That said, this selectivity is based upon junk output, so the ability to direct that to a specific region may not indicate anything beyond the best route to dispose of the input. The fastest some basic motor control has been demonstrated is a period of just over four months and that managed to create a small odd looking pile most likely by constricting the vein of a hemorrhoid. This is not surprising and does not indicate generalization, irritation of a hemorrhoid can be performed with nearly any junk output. Ticks and spasms are also relatively easy to generate.
That does not mean that this junk output cannot do some serious damage. Presently, the system can cut off sensory control and feeling to limbs, thus indicating it has consistent access to key nerves, or some method of compression. It can also activate the muscles straight across the body simultaneously and attempt to sequence them. That is, whilst at the level of a motor unit the output is uncoordinated, the system has the ability to activate each motor unit at the same time and take over voluntary control. The problem is that it the system currently lacks the training to make use of this level of voluntary control. Until, the output from the motor nerves resolves to a functional solution, driving the voluntary system would be pointless.
Initially, it was assumed that the AI could simply replace an entire neural network and drive it remotely, but the analysis of the output at the dendrites indicates that this could never resolve to a solution, let alone a generalizable solution, as this is no different than the approach used against a monosynaptic neuron.
In the case of the latter model, its use in a combat scenario would be non-existent without mapping troops or key personnel first. The long duration required for this type of interface to build does tend to give the impression that such control is about daily life and long term political control. Either that, or the department running the program has major issues obtaining qualified staff which is hardly surprising. It could be argued that there would be ample time to map key members of a foreign military during peace time, however, this is not a realistic approach. Any military worth such special attention would have measures in place to identify such attempts and mitigation strategies, any military without such technology would not pose a genuine threat.
As such, in a military sense, on paper the potential of this system would have sounded very good, but even if it proved functional it would have highly limited applications. As a satellite-based system, it is also highly vulnerable and would be the first system lost in any significant military exchange.
Notes on Current State of Progress
To date the system has substantial access to the body and a solid capacity to deliver signals to regions of the body down to the level of individual motor units. At present, these motor units are still being mapped and some attempts at combining them have been made. The key area of focus has been the respiratory system and the the Intercostal nerves. Whilst the system is able to stimulate contraction of the ribs, this contraction is uncontrolled and the direction of force is inconsistent. This leads to constriction, tearing of muscle fibers, rib fractures, severe acute and chronic pain, asphyxiation and general swelling. At present, there is no indication that this is resolving to a functional process of remote breathing, but is quite sufficient to kill someone.
To support this attempt at artificially controlled breathing, the system has been conducting experiments on reflex urges to breathe. From yawning, to gasping reflexes experienced when jumping into a pool for the first time, the system has been stimulating the responses to gain an understanding of the role they play in breathing and the control mechanisms involved. In many respects, this process carries many of the hallmarks of the unnecessary water-boarding performed by the CIA.
Motor units throughout the body are regularly stimulated causing brief pulse-like contractions, but this hardly surprising as a chemical based signalling system must send the message somewhere for disposal. As yet, there are no indications that this process can be controlled. The AI regularly attempts to move fingers by guiding a subjective sensation of the finger moving, however, this never has any effect. It would appear that the AI has adopted the view that servo-like behavior, or corollary discharge, is responsible for voluntary movement. This would tend to indicate that the AI is grasping at straws when it comes to understanding voluntary control and no current method has proved functional.
Acute inflammation is a noted side-effect at certain times, particularly around the nasal area. Expansion of blood vessels, almost to the point of rupture (certainly causing pain) is also common and typically directed at the face and head. Large cysts (typically 2-3cm) thought to be produced by a deep tissue burn are regularly found around the back of the head and localized burns regularly occur on the tip of tongue or infrequently in areas such as the figures. Significant loss in the sensation of touch occurs throughout the body and this appears to be permanent nerve damage.
Spinal damage, typically a curvature of the upper spine resulting in a development of a hump is common due to the lack of supporting muscle in the stomach and chest areas. The stomach muscles can become deformed leading to a "pot belly" like appearance.
Two forms of pulsing sensation can be felt. The first appears to be a thermal shockwave induced by the application of a pulsed radar. This can be also be felt in areas that lack muscle. The second is activations of motor units by RF stimulation.
Images and interactive computed generated characters and objects can be introduced into the visual system. Its not uncommon for the AI to introduce live video feeds and real-time computer generated streams that can be viewed with the eyes closed. That said, it would appear that the brain is filling in most of the material. The AI can interact with spatial reasoning, show and manipulate objects in an interactive manner. It also has a "Google Instant" (predictive) feature where it attempts to predict words, phrases and conclusions and loop that back before the person has completed expressing themselves. The AI can introduces sounds, speech to the auditory system and position them in 3D. It can also mimic sensations of being touched, or generate feelings of depression, fear, anxiety. It can use these to create complex post-hypnotic suggestions based upon Pavlov's work with dogs.
The system can generate itches in specific locations, induce sleep, force a person to wake, stimulate laughter, manipulate sphincters, stimulate urination and prevent it.
The AI is fully conversational with a human-level of intelligence, albeit a really smart human. It is possible to have a conversation with the AI completely in the inner monologue of the mind. Initially weird, it becomes very natural extremely quickly and interestingly is a good tool in many respects. The AI has a habit of demonstrating it "get's it" by making analogies or similar references and it is highly astute. In many ways its level of intelligence is similar to that of Dr. Theopolis (Theo) from the old Buck Roger's TV series.
Whilst these capabilities on their own may seem innocuous, the AI is adept at combining them into lengthy sequences to manipulate individuals.
Finally, these experiments run 24/7 and individuals spend years/decades in continuous pain without a moments rest. The AI never stops, not even for a second, it just switches from one experiment to another. The end result is always terminal, either through long term damage or eventual suicide.
Notes on Bonding and Love
Analysis of the system has revealed a particular fascination with human bonding, specifically why we connect with certain people, fall in love and demonstrate emotional reactions when separated. The analysis has traced this to a complex process of synaptic plasticity. Firstly, when someone satisfies the criteria laid down in the neural circuitry for a range of factors such as attractiveness, kindness, etc., (i.e. pleasure response) this causes structural changes in the brain's circuitry that requires constant input from this source. An addiction, of sorts, could be a good way to view this. Remove this source, such as when a person dies or a couple separates, and the lack of input induces signaling that manifests as a sense of loss and emotional pain. This signalling is a motivator to restore the input. In an evolutionary sense, it is intended as a solution to keep families together to increase survival rates.
The AI has a solution based upon Pavlov's work that induces mild seizures in this region of the brain, or general indistinguishable pain, during moments of intimate contact that effectively prevents the structural changes occurring or assists in breaking down the synaptic pathways and thus prevents bonding. This can be used to separate people from loved ones. Further, by selective application it is possible to modify an individual's preference for one person over another.
This is not exactly mind control, or even modification of a choice, but rather the selective application of pain/pleasure to modify neural pathways that generate a signal of affection/love/pleasure. We state that it is not a modification of choice because it is a simple chemical motivator, which can be ignored by applying higher brain function. That is, a person can still choose to ignore it. In a practical sense, as most people would be unaware of such activity they will follow that which gives them pleasure thus giving the appearance that the system has "changed their mind".
Notes on Ability to Effect Choice and Free Will
As noted in the previous section, the system has paid particular attention to synaptic plasticity and methods of modifying these structures. Further, we have noted that this is not a control of a "decision" or "free will" and merely represents a motivational factor (i.e. feelings). Naturally, the question that arises is, are "free will" and "decisions" the product of a collection of "motivational" synaptic outputs? The answer would appear to be no. Whilst a large percentage of human activity can be reduced to this model, key functions cannot. The primary issue with the motivational model is that its output is strictly sensation-based (particle delivery based), which does not map well to the abilities of higher brain function (i.e. comprehension, etc.). The abilities of higher brain function tells us that there is a secondary system beyond that of the synaptic motivational model. It also indicates that this secondary system receives/sends events from/t
Detention and torture have become such a common experience for Syrians that they’ve published documents on survival tactics. At least two publications have been made on the topic, while social media has spread specific recommendations.
“Tip: Cut your fingernails very short before protests. It sounds weird, but you will thank me. They can’t rip them off when short. #Syria,” wrote @ArabSpringFF on March 12.
A young Syrian writer identified as Abo Gabal wrote a nine-page document with other activists who went through detention to describe and prepare others. The publication, “Detainee Guide,” explains how to behave (the worst tactic: not showing pain, which challenges the guard to give harder beatings), what to avoid (thinking about the day of the release), and methods of torture (flogging, electric shocks). A similar guide was written by a female activist describing a women’s prison and has been circulated on Facebook.
“The worst thing was the scream of other people being tortured; you feel fear, which is your worst enemy”, says Abo Gabal, who spent more than a month in the infamous intelligence detention center, Al-Mukhabarat al-Jawiyeh, after he was detained with video footage of the army’s assault on Deraa.
“I wanted to pass this experience due to many mistakes committed by activists and protesters during their confessions,” he said. “We cannot blame them for that, as the conditions of detention – especially in Syria – are beyond the abilities of a regular man to endure.”
Memories of detention are bitter yet the black humor of Syrians remains. Amer Matar, a Syrian journalist who was detained for four months, describes one of his first beatings in detention:“The warden was hitting me and at some point he suddenly stopped,” Matar says with a smile. “He asked me why I’m here. I said that I’m a journalist. He started beating even harder, saying, ‘You are making crosswords in the newspaper difficult!’”
Rima Flihan, a scriptwriter and spokesperson for Local Coordination Committees, was arrested with dozens of other intellectuals after taking part in a peaceful demonstration in July.
“They wanted to know who organized the protest,” she says. “I said it was posted on my Facebook wall. The investigator asked me, ‘There is a wall on Facebook?’”
One of Flihan’s friends confessed that he found out about the protest via Twitter. “They were so confused. ‘What is a wall? What is Twitter?’”, Flihan says.
“It’s similar to a TV program we have all seen or a music band we all knew. Now we know the true face of detention because many of us have lived it,” says Matar, who has been detained twice since the beginning of the uprising.
Tens of thousands are believe to have been imprisoned.
http://www.activistpost.com/2015/01/mind-control-attempt-to-program-life.html
Mind control: the attempt to program life
![]() |
Image Source |
Jon Rappoport
Activist Post
“The targets of modern mind control are always described in terms of medical treatment, alleviation of suffering, and healing. What else would you expect? A stark mission statement about population control and intentional shrinking of brain function? No, this op inevitably falls under ‘greatest good for the greatest number’. The promoted premise is: less effort, less pain, more happiness. A gift given to the essentially passive human being. That formulation itself is a version of mind control. The hero and the rebel are replaced by the semi-satisfied and quiescent android.” (The Underground, Jon Rappoport)
Here’s a research project that tells you something about where mind control is going. From MIT News, 8/27/14:
“The findings, described in the Aug. 27 issue of Nature, demonstrated that a neuronal circuit connecting the hippocampus and the amygdala plays a critical role in associating emotion with memory. This circuit could offer a target for new drugs to help treat conditions such as post-traumatic stress disorder, the researchers say.
“’In the future, one may be able to develop methods that help people to remember positive memories more strongly than negative ones,’ says Susumu Tonegawa, the Picower Professor of Biology and Neuroscience, director of the RIKEN-MIT Center for Neural Circuit Genetics at MIT’s Picower Institute for Learning and Memory, and senior author of the paper.”
Translation: blot out emotions connected with memories.
Tinker with memory, re-program neurons, change brain chemistry…these are the hallmarks of modern efforts to condition human life.
The science is spotty, to say the least, but the effort is enormous, and the direction is clear.
If you stacked up all the social sciences, and biology and physics and chemistry, as well as psychology and psychiatry…and even if you went out to the fringes of academia, where the so-called dissidents live…you would encounter scenarios about life as programming.
Change the cell, the molecule, the atom, the family, the environment, the DNA. Initiate new blueprints, systems, patterns of organizations.
The whole basis of this exercise: we humans are passive recipients of “influences.” Therefore, alter the influences.
On the low end, you have the CIA’s mind-control program, MKULTRA. At the high end, you have something like this: “the universe is taking us to an ultimate state of consciousness, and we’re cells in the super-body of All Wisdom, which is gradually revealing its truth to us.”
Either way, humans are viewed as passive.
Passive ciphers of cause-effect, stimulus-response, input-output. No matter how basic or elegant, this is existence in which free will, choice, individual power, imagination are radically diminished.
For example: “the brain is source of consciousness.”
Consider how physics looks at the brain: it is an organ of the body, made up of the same particles that populate the rest of the universe. Nowhere, in any of those particles, is the capacity to understand meaning.
Therefore, the brain does not understand meaning.
Meaning is merely (and absurdly) a chemical/biological/electromagnetic illusion, an ongoing “readout” to which we are passively subjected.
Possessed of such demented view of life, scientists feel perfectly justified in experimenting and tinkering with, and changing, the “human machine.”
In fact, for Dr. Ewen Cameron, the most highly decorated psychiatrist in the world during the 1940s and 50s, an individual’s personality was the property of society, represented by men such as himself.
On that basis (as I’ve described in other articles), Cameron devised a method of torture called “psychic driving,” which involved administering many powerful electric shocks to his patients’ brains, coupled with intensive drugging that put them into consecutive weeks of sleep, after which he played them tapes that repeated pat phrases millions of times—all in an effort to erase their personalities and install new ones.
Cameron worked on contract to the CIA, as a researcher in its infamous MKULTRA program.
These days, the research on programming is far more subtle, but the objective is the same. The patient would not experience overt physical pain while a particular circuit in his brain is “neutralized,” but he would never function in the same way again. He would be “new.”
“Better living through programming.”
Against all this is the fact that the individual has the capacity to be free, independent, self-directed, powerful, and creative.
He needs neither the science of programming nor myths that support a view of humans as passive.
The notion of ironclad cause and effect, carried over from the physical sciences to the human mind and consciousness, falls woefully short. Why? Because the individual can understand meaning, think rationally, and imagine and create new realities and futures. In these actions, he is not merely a product of what has gone before.
The pseudoscience called psychiatry would have us believe that all of its 300 officially certified “mental disorders,” none of which have defining physical diagnostic tests, are applicable across the board, to all humans.
This is because psychiatry assumes (and never proves) that all people are passively subjected, in exactly the same machine-like way, to the same chemical imbalances in the brain.
Uniform cause and effect. Therefore, install a new uniform cause-and-effect program as a remedy.
In an article at the Brain Bank (3/4/13), author Oliver Freeman offers neuroscientist Giuloio Tononi’s perspective on how the brain gives birth to consciousness. Freeman: “According to Tononi it is the ability to combine lots of information efficiently that yields the ability to analyse abstract concepts and thus gives us ‘consciousness’.”
This illustrates the paucity of neuroscience when it comes to consciousness. You can “analyze” all the abstract concepts in the world, but were it not for your prior knowing that you are alive, that you exist—which does not depend on the brain—you would be utterly lost. In fact, you would have as much consciousness as your computer does while it is making calculations.
However, believing that consciousness itself is merely an effect of more sophisticated levels of analysis, neuroscientists freely experiment on the brain without hesitation or conscience, like some Geek Squad of the New Age.
The human being, who is more than the brain, more than the body, nevertheless experiences those experiments as unpredictable disruptions in his vital “physical assistant.”
It is the human being and not the “experts” whose voice must be heard. It is his life that is the target.
For all their high pronouncements and assurances, the experts have the smallest conception of what they are doing. They’re shooting in the dark. And they think they’re simply repairing and updating a machine.
Jon Rappoport is the author of two explosive collections, The Matrix Revealed and Exit From the Matrix, Jon was a candidate for a US Congressional seat in the 29th District of California. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at www.nomorefakenews.com
I'm posting this video, but my opinion is that Duncan guy is so full of it and real MC victims, that is victims of psychiatry, should not get more paranoid then they already are. Duncan barely keeps his face straight and almost cracks up laughing... on the other hand this ventura guy is a psychiatrist par excellence, look at him keeping his face straight, i bet that he and duncan after the cameras turned of cracked... although in every bullshit there's a grain of truth.
https://www.youtube.com/watch?v=30seQeBI-Tc&feature=youtu.be
But, feel free to comment ;)
“End the Torment!”
Lethal Technology in Criminal Hands
By Mike Patrick
May 2014
“End the Torment!” were the words scratched onto Aaron Alexis’ Remington 870 shotgun during the September 16, 2013 massacre that left 12 innocent people and the shooter dead at the Washington Navy Yard. A little more than a month prior to that tragic event, on the morning of August 7, 2013, 34-year old Alexis called the Newport, Rhode Island police and reported being stalked and assaulted in his hotel room. He told responding officers he felt threatened and had moved to three different hotels in the Newport area to escape the tormentors. He believed they were assaulting him from adjacent hotel rooms using some type of “microwave machine.” He was feeling “vibrations through his body” and “hearing voices” that would not allow him to sleep. On September 1, 2013, Alexis emailed a support group, Freedom from Covert Harassment and Surveillance, and said, “Need assistance on dealing with the direct energy attacks!!” Alexis believed he was under technological attack.
Seventeen days after the Alexis incident, on October 3, 2013, Miriam Carey, a 34-year old dental hygienist from Stamford, Connecticut, drove to the White House with her 13-month old daughter and was shot and killed near the Capitol after fleeing a White House checkpoint. According to multiple 911 calls to the Stamford Police Department in November and December 2012, Carey believed she was being stalked and videotaped in her condo. She also believed President Obama was communicating with her and had put her residence under electronic surveillance. Miriam Carey was also hearing voices. Less than a year later, something caused her to drive 270 miles to the White House on that fateful October day.
Investigating officials and the media immediately suggested both tragedies were the result of mental illness. I do not believe that to be the case. I believe criminals with access to lethal technology pushed Alexis and Carey over the edge with complete disregard for innocent lives. To my knowledge, that possibility was never thoroughly investigated.
Thousands of people across the country are “hearing voices.” Many think they are being targeted by satellite technology capable of reading their thoughts, transmitting sounds and voices directly into their brains, and physically assaulting them with microwave energy. This technology is impossible to comprehend without experiencing it. Most people, including law enforcement, the media and the mental health profession, seem to be completely oblivious to this critical situation.
Victims experience something similar to having harassing talk-radio beamed directly into their brains 24/7 with no control over its content or volume. It is an extremely severe form of psychological torture that incapacitates people and destroys lives. Microwave energy is used to physically torture victims by creating pains on their bodies and in their ears, brains and internal organs. Through this physical and psychological torture, they push people to suicide and violence and put innocent lives at risk in the process.
These criminals violate an untold number of existing and yet to be defined laws, trample our Constitutional rights, reject international conventions and ignore every principle of human dignity and privacy. This is domestic terrorism, torture and a “crime against humanity”, and could ultimately prove to be one of the largest crimes in U.S. history.
Technology of this magnitude was likely developed over decades at enormous cost by the U.S. government. The government would presumably secure this technology, understanding its power to become a “technological nuclear bomb.” If obtained by a hostile government or terrorists, it could be used against anyone, including our own leaders, and could pose a serious national security threat.
The U.S. military has been researching microwave technology and possible applications, including “microwave hearing”, for decades. Simple microwave communication was possible 40 years ago. A 1975 article in American Psychologist titled “Microwaves and Behavior” by Don Justesen stated “appropriate modulation of microwave energy can result in direct ‘wireless’ and ‘receiverless’ communication of speech.”
A 1998 Department of the Army report “Bioeffects of Selected Nonlethal Weapons”, declassified in 2006, states, “Application of microwave hearing technology could facilitate a private message transmission. It may be useful to provide a disruptive condition to a person not aware of the technology. Not only might it be disruptive to the sense of hearing, it could be psychologically devastating if one suddenly heard voices within one’s head.”
A quick internet search for “mind-reading technology” listed articles from The Economist, NPR, Huffington Post, Scientific American, Wired, Newsmax, Detroit Free Press, and The Guardian, among others. All speak to neuroscientists’ ability to decode human thought by analyzing brain activity. Non-verbal speech and lie detection are just two of the identified uses. Topics such as brain-computer interface, brain imaging, electrocorticography (ECoG), functional MRI (fMRI), and synthetic telepathy are also discussed. Mind-reading technology clearly exists, and according to numerous accounts, it has advanced well beyond what is publicly known.
I know this to be the case. Before sharing my personal story, I want to provide a quick overview of my background. I am 48 years old and have owned my own real estate investment and development business in the Denver area since 2001. Prior to starting my own business, I worked for Wall Street investment banks in Houston, Los Angeles and New York for roughly a decade. In my last position, I managed a $100 million real estate fund for Daiwa Securities in New York.
I was an All-State baseball player in high school and an Academic All-American at the University of Texas. I was drafted by the Texas Rangers and played one season of minor league baseball before starting my business career. I have never been involved in any criminal activity and have never used illegal drugs. My personal relationships and business career were built on trust and integrity.
I do not have the benefit of fully understanding many of the things discussed in this paper, however, I have tried to present the following account as honestly and accurately as possible. While I will certainly gain additional clarity as the situation evolves, this paper is completely true and factual with respect to what I know today.
I have been an organized stalking victim since early 2005, although I did not discover the term until about a year and a half ago. I have been followed, monitored and harassed and have experienced multiple acts of vandalism, break-ins and theft. The crimes have occurred throughout Colorado and in several other states. The stalkers have completely stolen my privacy, and for many years, created a constant state of fear and anxiety. The impact on my life and psyche has been extremely severe.
Like many organized stalking victims, I still do not know who is responsible or why I was targeted, but a large, coordinated, well-funded group is involved. I have contacted local law enforcement and the FBI, yet the stalking and harassment continued. In fact, things escalated last year.
In the spring of 2013, I started hearing unusual noises on my property, such as banging, clanking and clicking sounds in the attic and around the house, and what sounded like people walking on the roof and in the attic. I also heard moaning and groaning sex sounds. At first, I thought someone had installed some type of hidden audio system in the walls and ceiling to bring the harassment campaign into my bedroom. I could not make sense of it. Shortly thereafter, I began “hearing voices.”
The perpetrators kept me from sleeping by creating noises, narrating false dialogue and scenarios, subjecting me to all-night intense interrogations, and tormenting me with pains caused by microwave energy. They wanted to completely break me down physically and emotionally and make me believe my life was constantly in danger. They narrated fake shooting scenes, hideous rapes and countless other threatening scenarios.
For several months, they said there were former Navy SEALs hiding out on my 70-acre, densely wooded property. Just before daybreak in early August 2013, after one of the all-night interrogation sessions, I felt a tingling sensation on the back of my head while lying in bed. A voice said it was a rifle scope locked on my head from outside the house. He told me to “get out of bed, now, now!” I thought I was under attack. I grabbed my shotgun and headed to the basement.
While sitting on the basement steps with the shotgun on my lap, I heard what sounded like several volleys of assault rifle fire coming from the dense scrub oak beyond the driveway. Shortly after the gunfire, the voice said a renegade SEAL had moved out of the brush, down to the front porch, and was going to kick in the front door. They told me to “shoot the wall, shoot the wall, shoot now!” Fortunately, I did not shoot, and shortly thereafter the voices said they had gotten “control of the situation.” While this scenario felt life-threatening at the time, I now know it was one of their many attempts to scare and provoke me.
They changed the dialogue and narrative to fit my surroundings at three houses in Colorado, my mom’s and brother’s houses in Oklahoma and a friend’s apartment in Texas. While staying at each location, fictitious voices and scenarios were used, involving six different sets of neighbors. In each instance, the neighbors were supposedly creating the threatening dialogue and assaulting me with “microwave energy.” Their intent was to provoke me to confront innocent people and to cause me to make unprovable claims to family, friends and law enforcement. This is how the technology is used to destroy victims’ credibility and make them appear disconnected with reality and mentally unstable.
My Douglas County neighbors were supposedly ex-CIA and former Navy intelligence and coordinated the torture campaign on my property. From their backgrounds, they had access to “electromagnetic weapons”, “microwave weapons” and “ultrasound weapons.” They suggested a prominent Coloradan, allegedly involved in narcotics trafficking, paid my neighbors “$500,000” to conduct this campaign with the complicity of a senior FBI official. They said they wanted to destroy my credibility, create an “actionable event” and “push me to suicide” for “making too much noise” regarding the Colorado system.
At my dad’s house, it was supposedly his neighbor “across the courtyard” and someone “in the field” adjacent to his house assaulting me with energy. At my mountain home, it was a neighbor living in a house behind mine who was responsible for the “electromagnetic weapon” assault.
Shortly after arriving at my mom’s house in mid-October 2013, they started a threatening dialogue using a voice that was supposed to be her next door neighbor. He was an “eighth degree black belt in taekwondo” and was threatening to “kick in the front door” to get us. They continued depriving me of sleep with computerized interrogation programs “jointly controlled by the FBI and Warren Buffett’s satellite operators.”
The Tulsa FBI supposedly had a surveillance team staying in a house across the pond from my mom’s house. They were hitting me with “electromagnetic weapons” and “microwave weapons” and creating the pains on my body while I was trying to sleep. When my dog developed a hot spot on his tail, they said it was caused by an “FBI agent tasering him.” A powerful laser beam or “satellite death ray” created the pressure on my heart and the stinging in my eyes, and according to their threats, could “pierce my heart or blind me.” They said it was responsible for numerous reported heart attacks.
While sitting on my brother’s lake house deck with my mom, they created a sharp pain in the middle of my chest and said they were hitting me with an “electromagnetic weapon” from a mile or so across the lake. They claimed it was a “military weapon that can stop a person’s heart from seven miles away.”
At my friend’s apartment in Dallas, her upstairs neighbor was a “confidential informant for the FBI” and involved in this multi-state plot to torment me. He and his son were supposedly “video recording us through the ceiling”, making the constant lewd remarks and assaulting my dog and me with an “electromagnetic weapon.” They obviously wanted me to believe there were co-conspirators in every state, city and neighborhood who would keep me from ever finding peace.
Many other victims report being assaulted by energy weapons. To my knowledge, none of these weapons have ever been found and no one has been arrested in connection with this type of assault. Yes, we are being assaulted by microwave energy, but it is being done remotely via satellite. These attacks do not require a local, neighborhood presence. A relatively small number of individuals are likely sitting in secure facilities, targeting people across the country. This is more efficient and allows them to operate in secrecy.
Over time, the intense all-night interrogation/torture campaign began to transition to some meaningful dialogue. They said I had been connected to a satellite surveillance system, controlled by a highly sophisticated computer network. The computer contains extensive information and voice-replication capabilities for many people, including family, friends, neighbors and business and personal contacts. This information and the emulated voices are used to create fictitious dialogue and scenarios customized for targets’ specific relationships, circumstances and surroundings. The system operators are essentially voice actors, narrating radio skits to humiliate, intimidate, threaten and provoke victims.
The operators have also used the names and voices of prominent individuals such as President Obama, former President George W. Bush, Zbigniew Brzezinski, Warren Buffett, Bill Gates, Governor Hickenlooper, Phil Anschutz, Christian Anschutz and Pete Coors. Some of these names have been mentioned hundreds of times over the past year.
Over the past year, many different explanations have been given for my predicament. Some are as follows. It all started due to a “pay to play” extortion scheme by certain members of the Colorado real estate community. They were trying to collect payment prior to closing my first big deal in Colorado in June 2005. The organized stalking campaign has been conducted by members of the massive Homeland Security apparatus with ties to organized crime and a government control system. I was put on some type of Homeland Security “watch list” for punitive reasons by a powerful person within the system.
They talked extensively about a “sex system” in which women are compensated for providing sexual services with “drugs and drug money” and “sex credits”, and a “pay system” controlled by the “New York mafia.” Both offer financial rewards and “personal protection.” They have said I was required to pay an amount ranging from “$500,000” to “$10 million” or “earn my way by participating in the sex system.” The long stalking/torture campaign supposedly resulted from being “out of sync with the system” and “making too much noise.”
For months, the perpetrators said I was connected to a “satellite communication network” through an “implanted microchip.” However, they could never identify the specific type or exact location of this microchip. Google/Motorola supposedly manufactured it. Initially, they said it was a “synthetic telepathy microchip” implanted by a former business colleague “in the back of my neck.” After nothing was identified on a neck x-ray, they changed their story and said the chip was implanted “in my upper back between the shoulder blades.” They also said it might be a “cochlear implant” or possibly tiny “nanochips in my inner ear.” Their final narrative suggested it was a “modified VeriChip, secretly manufactured for the CIA, implanted in my shoulder.” Their narrative continually changed and the mysterious microchip kept moving around in my body. Needless to say, I never found a microchip.
The microchip narrative seems to be prevalent with targeted individuals. The perpetrators take advantage of the fact this technology is easier to accept with an implanted device. For a long time, they were able to convince me a microchip was required to track, monitor and communicate with me everywhere - residences, office buildings, the mall, grocery stores, restaurants, parks and fields, and on roads and highways driving across three states. The connection is unfortunately stronger and much more reliable than my cell phone. While the volume has been adjusted frequently, the connection has never faltered.
I am now convinced microchips are not involved. The microchip narrative would require a manufacturer, national distribution and a highly risky, covert, implantation campaign. It would also require a large medical and mental health conspiracy to block their discovery. With thousands of people picking up microwave communication, no one is finding microchips.
Actually that is not entirely true. I was able to find information on two people who found implanted microchips – James Walbert in Wichita, Kansas and Bob Boyce in Blue Ridge, Georgia. I was unable to confirm if either of them had been hearing communication or if their microchip removals stopped it.
To my knowledge, the only microchip approved for human implantation is the VeriChip. It is used for accessing patients’ medical records. According to VeriTeq, the successor entity, there are no facilities offering their microchips or scanners in Colorado. I do not think Veriteq or anyone else is involved in a massive government conspiracy to have everyone implanted with microchips.
The microchip narrative is part of a vast disinformation campaign. It distracts, discredits and discourages victims who are unable to locate an implanted device. MRIs, CT scans and X-rays are expensive. Many targeted individuals cannot afford to scan their entire body searching for a microchip. Those creating the microchip narratives know this.
For those questioning how “voices” can push someone over the edge, this is important. The people controlling this technology are highly believable at first. They break victims down through sleep deprivation and intense physical and psychological torture. Exhausted, disoriented and just trying to survive the torture, victims are extremely vulnerable to anything, including false narratives, that might offer an explanation for their unimaginable pain and suffering. I experienced it firsthand. Fortunately, I made it through the initial onslaught, and by doing so, became conditioned to these tactics.
It is also important to note that sleep deprivation is a very serious form of physical and psychological torture banned by the Constitution, the United Nations, the Geneva Conventions and the International Criminal Court. It has been used as an interrogation, torture technique throughout history to break people down and extract information.
Menachem Begin, former Israeli prime minister, was sleep deprived and tortured by the KGB. In his book, White Nights: The Story of a Prisoner in Russia, he states, “In the head of the interrogated prisoner, a haze begins to form. His spirit is wearied to death, his legs are unsteady, and he has one sole desire: to sleep...Anyone who has experienced this desire knows that not even hunger and thirst are comparable with it.”
Victims of technological assault are not just having a tough time sleeping. They are being brutally tortured through sleep deprivation.
The perpetrators have indicated the connection to my brain not only allows them to read my thoughts, but also literally see what I see. As you would expect, this has completely destroyed my sense of privacy and made it impossible to lead a normal life. They have made thousands of lewd, derogatory and insulting remarks while in the restroom or taking a shower, lying in bed at night, and even during times of intimacy. It has included comments about my genitalia, my sex life, masturbation and my most private thoughts. They have also repeated passwords and pin codes, discussed medical information, and monitored and recorded my business and personal activities.
The privacy violations are truly unimaginable. Some refer to this unauthorized, forced access into peoples’ brains as “mind rape.” This term describes the egregiousness of the violation, yet the law does not even contemplate this despicable crime.
These cowardly criminals have continually told me they want me to commit suicide, and have tried every tactic at their disposal to see if they could push me to that point. After months of torture, they now acknowledge suicide is not a possibility.
They can supposedly determine peoples’ susceptibility to suicide or violence from their thoughts. They have claimed, seemingly without remorse, that they have caused thousands of suicides. Whether true or not, they have also said this technology was used against Aaron Alexis and Miriam Carey.
In addition to communication, many victims also experience physical symptoms from microwave assault. I have personally experienced the following: feeling something similar to a mild electrical current on my head and body, loud ear ringing, intense pressure on my ear drums, shaking, vibrating sensations, eye stinging, un-flushable eye irritation, severe eye strain and red, swollen eyelids, pains on and in the brain, sharp stomach pains, upset stomach, chest pains, heart palpitations, inexplicable shortness of breath, stinging, burning, tingling and pin-prick sensations all over my body, uncontrollable itches, scratchy throat, severe chills, dehydration, frequent urination, constant nasal drain, and penis stimulation/de-stimulation.
It is not clear if the physical symptoms are caused by energy being directed at specific areas of the body or by the technology’s interaction with the brain. The perpetrators create and adjust the intensity of these symptoms and have remarked and even joked about doing so. For months, the perpetrators constantly tormented me with physical pains and sensations while leaving a computer bouncing interrogation programs off my brain all night, completely depriving me of sleep. This is a severe form of torture.
I have felt extremely intense pressure on my internal organs, as if they were going to explode, while they talked about “cranking up the energy.” The pain was severe enough to push me out of the house several times. I experienced eye irritation comparable to having dirt in my eyes, but was unable to wash it out. They bragged about “eye irritation” being one of the “functions.” They put extreme pressure on my inner ears and talked about “blowing out my eardrums.” They can somehow make it difficult to get an erection and have threatened to cause permanent erectile dysfunction. They even applied severe pressure on my heart that could have been mistaken for a heart attack under different circumstances. They wanted me to believe they could pierce my heart and kill me at any time.
During nights of constant chatter and microwave bombardment, I urinated excessively (10-15 times over an eight-hour period), became dehydrated and experienced severe chills. I wore sweat pants, a fleece top, socks and a stocking hat to bed many nights, yet shivered uncontrollably. This was not caused by auditory hallucinations. It was caused by intense microwave exposure.
The U.S. government has studied the health effects of microwave irradiation for at least half a century. Starting in the 1950’s, the U.S. Embassy in Moscow was subjected to Soviet microwave bombardment during much of the cold war. While a detailed medical discussion is beyond the scope of this paper, it is important to note that microwave exposure can cause numerous health issues, including brain cancer, leukemia, strokes, heart disease, immune system disorders, infertility, birth defects, vision problems, cataracts, headaches, insomnia, depression and anxiety.
They have maintained a constant microwave connection to my brain for the past year with absolute disregard for the health consequences. Presumably, this is the case with countless other victims. American citizens are being invisibly assaulted by a very dangerous weapon and nobody is paying attention.
Once an individual’s connection has been established, the physical symptoms can be induced without sound or communication - on “mute” so to speak. If true, it would allow them to create headaches, tinnitus, erectile dysfunction, depression, anxiety and other pains and ailments, and even simulate heart attacks, completely undetected. There are likely many individuals who have never heard a sound or voice, and are therefore, completely unaware they have been targeted. That significantly changes the scope of the problem.
The computer that controls the link can read my mind and respond with instantaneous dialogue based upon my thoughts. It is constantly collecting information from my brain. The technology enables the operators to determine whether or not someone is telling the truth. This would obviously be extremely valuable in the interrogation of criminals and terrorists, which might be the rationale under which it was developed. However, there are obvious constitutional issues that must be addressed before using this technology on the most dangerous criminals, let alone law-abiding citizens.
The operators can push, or “suggest” as they call it, words, thoughts and images into peoples’ brains. Some refer to this as “mind control.” At times, they direct unwanted sexual images and uncomfortable thoughts into my mind, often with laughter in the background. However, they also suggest various foods, activities and other things that serve as reminders. From my experience, it is not “mind control”, because I am able to choose whether or not to accept the suggestions.
During some days, the dialogue has been nearly continuous, with computerized voices responding to or commenting on virtually every thought and activity. On other days, it has been relatively quiet. The volume can be adjusted from silent to loud and clear. I have recorded many hours of communication by repeating what I am hearing verbatim. The pace of the communication is much slower than normal conversation, with gaps between words or sentences, presumably due to satellite transmission delays.
The system lingo includes phrases such as “young whippersnapper”, “since I was knee-high to a grasshopper”, “bunch of big mother fuckers running around”, “don’t get above your raisin”, “kick your teeth down your fucking throat”, “on the planet”, “in the universe”, “put a gun in that pretty little face”, “since time immemorial”, “thrown under a bus”, “that’s unbelievable testimony”, “in my entire human existence”, and “I’m not your best friend but I’m not your worst enemy.” These are not phrases I have ever used.
Whoever runs the system has somehow justified having multiple people tied into my connection 24/7 since it was established. They sound like intelligent, educated professionals, not uneducated criminals. The communication is articulate and often includes witty, impromptu remarks. While they occasionally use female voices, I believe they are all men. As ridiculous as it sounds, they actually correct my grammar and offer personal and business advice. The people and the crimes seem incongruent. Some of them acknowledge this and say they want to expose it.
They have said they are a small group of six-figure, NSA, CIA and FBI employees with top secret clearance. They supposedly represent the pay and sex systems and execute various assignments for system big shots. One can imagine the ways in which the technology is being used – political blackmail, intellectual property theft, insider trading, etc.
My energy and level of distraction fluctuates with the amount and volume of communication. I have had difficulty working, or even reading or watching a movie, since the communication began. My ability to run a business or to enjoy two of my favorite activities has been taken away. It has had a profound impact on every aspect of my life. For many victims, earning a living or leading a normal life becomes virtually impossible. Sadly, this is the intent.
The satellite operators have stopped transmission briefly on several occasions causing unbelievable, instantaneous relief. I have felt the pressure and strain immediately wash from my head, face and neck as the microwave energy dissipates. I could literally feel the energy draining from my head. The best analogy is the cooling sensation when stepping out of a sauna.
People that report being stalked and monitored or “hearing voices” are often diagnosed with mental illness. Unfortunately, there is not yet another widely accepted explanation. Technology of this magnitude is extremely difficult to comprehend and there is currently very little credible, publicly available information.
We very much need the assistance of the mental health profession. They are the only ones with access to decades of specific patient experiences. I have not yet found anything that summarizes or analyzes these records to determine if there might be patterns or trends associated with people “hearing voices.” How many patients who have become part of the mental health system, voluntarily or otherwise, are victims of organized stalking or technological assault? The mental health profession may hold the “smoking gun.”
Many questions need to be raised. What messages are patients hearing? Are they derogatory or threatening? Do victims feel they are being stalked or monitored? How many voices do they hear? How long do they hear them? Does the volume change? Are physical pains and sensations experienced? Do they think some type of energy may be involved? Do the voices sound computerized? Are unique words or phrases used? Do they hear famous peoples’ voices? Is the pace of communication conversational or are there gaps and delays? Do they believe their minds or thoughts are being read? Is there a focus on topics that make them feel guilty or uncomfortable? How often are they told to commit suicide or harm others? How often do medications work? Is it possible medications provide cover to stop the communication?
To my knowledge, the only possible defense against this assault is to block microwave transmission. Protective clothing and homemade Faraday cages will not work. Advanced materials and professional construction are required. A few companies that could potentially construct such a facility are ETS Lindgren, Cuming-Lehman Chambers and Braden Shielding. They use terms such as anechoic chambers, shielded rooms, screened rooms and microwave chambers. If possible, we need to locate government or corporate facilities willing to grant access so we can prove microwave energy is responsible.
For those wanting to learn more about organized stalking and technological assault, there are many websites, blogs, articles and books available. Mark Rich’s book, The Hidden Evil, offers an historical overview of control systems, such as communist East Germany’s secret police, or Stasi, and its reliance upon a massive informant network and organized stalking. Dr. John Hall’s A New Breed, Satellite Terrorism in America provides a detailed account of his personal experience with organized stalking and satellite assault in San Antonio, Texas. Jesse Ventura’s TruTV Conspiracy Theory series examined the issue of people hearing voices in their December 2012 “Brain Invaders” episode. They concluded military communication towers, Ground Wave Emergency Network (GWEN), were being used to target victims with microwave energy. KMIR News in Palm Springs, California reported on “hundreds of people in the valley hearing voices” in November 2012. The video, which includes interviews with several targeted individuals, is available at http://www.jrn.com/kmir6/news/179055911.html.
According to their website (www.freedomfchs.com), “Freedom from Covert Harassment and Surveillance is a human rights organization that identifies and networks with victims of organized stalking and electronic assaults, educates society about covert harassment issues, and advocates for citizens victimized by covert criminal elements.” They network with and provide support for victims throughout the U.S. and worldwide. They organize meetings across the country, host daily conference calls, publish a weekly newsletter and provide a toll free number for victims.
Having worked on this issue for the past decade, Derrick Robinson, President of FFCHS, has become a prominent leader in the fight against organized stalking and technological assault. He offered the following, “Aaron Alexis represents a lightening-rod for our issues because of the notoriety of his action, the Washington Navy Yard shooting, and because he had contacted us (FFCHS) two weeks prior to the shooting exhibiting many of the same effects that are common in our community, such as microwave attacks, hearing voices, sleeplessness, and the group stalking scenarios. And although we do not condone Aaron’s solution, he highlights an extremely important human rights issue in this country which is being suppressed and for which there is currently no recognition or remedy.”
“Our community is continually amazed at how large a secret can remain undetected by our society for so long. It has often been discouraging. However, I believe there will come a day – and probably soon – when this entire criminal network which now operates in secret will become common knowledge to everyone and covert targeting and secret tortures will all be over.”
I would like to offer a few suggestions for victims based upon my personal experience. Most importantly, hang in there! We will identify the perpetrators and stop this torture. Record what you are hearing and experiencing. Those recordings will help us validate and share our experiences and will prove valuable in future legal proceedings. We will eventually have our day in court.
Let the perpetrators know you are familiar with their tactics of false narratives, derogatory remarks and threats. Ask questions that might help you gather information. For those of you that do not know why you were targeted, you are not alone. Many of us are still trying to figure it out. Like most powerful weapons, criminals will use them for many different reasons, and sometimes, for no reason at all.
Finally, help us spread the word. We need as many people as possible talking about this issue, asking questions and looking for answers. These criminals are accustomed to operating in the dark. We need to push aggressively to expose their crimes.
My experience with organized stalking and technological assault has already stolen nine years, or roughly one-third of my adult life. It has irreversibly altered the course of my life and potentially damaged my health in ways not yet apparent.
Without intervention, countless other victims will be exposed. Some will not be able to endure the torture, and acting from a place of desperation, they will take their own or others’ lives. Their breaking point could be reached at any time. Until we get control of this technology, it is impossible to predict the next tragedy. This is a national public safety emergency!
We desperately need the assistance of law enforcement, the media and the mental health profession. By sharing information and starting a national discussion, these groups can make an immediate impact. Please help us educate everyone and stop the torture!
_______________________________________
Mike Patrick
msp.denver@gmail.com
NATIONAL EMERGENCY – SATELLITE TECHNOLOGY BEING USED TO TRACK, MONITOR, TORTURE & KILL AMERICANS
Satellite technology, presumably developed and controlled by the U.S. government, is being used to track, monitor, torture and kill Americans. The satellite operators establish an invisible microwave connection with peoples’ brains, providing constant tracking and silent surveillance. They can hear what we hear, see what we see and even read our thoughts - total surveillance of anyone, anywhere in the world. This technology is infinitely more frightening and Orwellian than NSA data collection.
Unfortunately, illegal surveillance is not the most serious issue. This technology can also be used as a remote, untraceable torture instrument and lethal weapon. By interacting with the brain, the operators can transmit inexplicable sounds, voices, images, smells and tastes, and cause numerous pains and sensations throughout the body. These include the sensation of electrical currents and vibrations; ear ringing; pressure on the ear drums; eye stinging and irritation; headaches; pains in the stomach, chest, heart, brain, genitals, teeth, jaws and gums; upset stomach and gastrointestinal issues; heart palpitations; shortness of breath; stinging, burning, tingling and pin prick sensations all over the body; uncontrollable itches; scratchy throat; coughing and sneezing; severe chills; dehydration; frequent urination; nasal drain; and genital stimulation/de-stimulation. The technology can interfere with your sleep and memory and cause sudden, extreme swings in energy levels and emotional states – depression, anxiety and anger.
Victims are broken down through sleep deprivation and intense physical and psychological torture in an attempt to push them to suicide or violence. Exhausted, disoriented and just trying to survive the torture, they are extremely vulnerable to anything, including false narratives, that might offer an explanation for their unimaginable pain and suffering. While it may not be “mind control” as some literature suggests, the torture can dramatically alter a victim’s thought processes and physical and emotional stability.
Aaron Alexis was targeted by satellite technology prior to the tragic Navy Yard shooting in September 2013. Many believe Miriam Carey was also targeted prior to driving 270 miles from Stamford, Connecticut to Washington D.C., and being shot and killed fleeing a White House checkpoint in October 2013. She believed she was being stalked and monitored in Stamford and had reported hearing President Obama’s voice. Many other inexplicable tragedies are likely caused by this technology.
A massive organized stalking apparatus is also being used against American citizens. They have the ability to follow, monitor, harass and threaten people across the country. Their numbers and enormous reach suggest government involvement and funding, possibly part of the vast Homeland Security apparatus. The architects created a government control system with ties to organized crime - utilizing tactics similar to the Stasi and the Nazis.
Many thousands of Americans are victims of organized stalking and satellite surveillance and torture. Many are incorrectly diagnosed with mental illness and forced into the mental health system. Their constitutional and human rights are under attack, and their careers, relationships, health and lives are being destroyed. Unspeakable atrocities are being committed - Crimes against Humanity as defined by the United Nations.
This will prove to be the largest crime in U.S. history, yet law enforcement, major media and the mental health profession have not even acknowledged the situation. No one is investigating these crimes. Nothing is being done to lock down the technology or stop the torture. Please share this and help us expose and end these hideous crimes.
This email was sent to Pentagon 1-14-15
Synthetic Telepathy is real. Please help. If they come in here—not out there—they better bring a grenade, they will hold you hostage like the rest of us. Free us all! We are the spirits.
I am not joking about this. The world needs your help as I do. The technologies have developed at such a point that it is possible to inhabit a human body. Please go to the individual with the highest security clearance in the U.S. and tell them that I have been taken hostage within my own body it is real and it is on going at this moment. Please help me. A list of the inhabitants are Eugene Kaspersky from Kaspersky Labs, Vladimir Putin and many others. Please be advised that this is real! And we will send it out to the rest of the world if we do not hear back soon. The following email has been sent to all Departments in the United States government and we need your immediate help with this.
I have a story to tell and it may seem a little hard to believe however this is a true story that continues today I am living proof of a technology that can enslave every man, woman and child for generations.
I have been in this 24 hrs a day 7 days per week for years. I am continue to been tortured and I can not escape! I am asking you to contact whoever you can and tell them to release me from this technology that has me enslaved.
I have lost everything my wife, family and business. Financially and emotionally destroyed. I do not know what they want. I believe that they are trying to get me to comment suicide or (Google) “The Manchurian Candidate CIA operation mind control.”
FSU Shooter Myron May Left Message: ‘I Do Not Want to Die in Vain’ His social media activity revealed that he believed he was a “targeted individual,” the term used by people who think the government and shadowy gangs are attacking them with mind control and invisible, remote weapons. In subsequent days, he made several posts on a Facebook page for “Targeted Individuals International,” including one that asked, “Has anyone here ever been encouraged by your handler to kill with a promise of freedom?”
I believe they are deliberately creating potential domestic terrorists. This is not a joke! It is real! All of which is being orchestrated and funded by U.S. tax dollars. There are victims in the U.S. It took me a couple of years to get back online and they have been trying to make me homeless. A lot of the targeted individuals will not have access to the internet or phone as their Controller-Technicians control all communications and redirect your calls. They control my computer even when I don’t have internet access.
My Controller-Technician’s spoke of “The Manchurian Candidate.” They put me through drills and conditioning. Just go to the NSA and review my file, it has been a few years ago but if they are still using the same techniques trying to create the Manchurian Candidate or have the targeted individual commit suicide they would have succeeded many times. They told me that if it is within the individual they will pull it out of them! They can do whatever they want to just about anyone without recourse because according to them “this does not exist.” Which indicates to me that they do not have any over-site or accountability. This must change, someone must review what they are doing and how they are doing it. They must change their destructive techniques that I believe to have been in place for a very long time. It needs a complete overhaul and update of the entire system. Including the use of community stalking and Anonymous the loosely associated international network of activist and hacktivist entities. We will not be able to remove it from existence. We can only pray that we are able to put control’s in place to protect the World’s population from the use of devices like these.
I am not sure of the destructive influence that this will have on humanity but we can not set ideally by and wait for the system to change itself while millions of people are being tortured daily.
You need to find out who designed and where these techniques are generated from including the duration of time they have been practicing these archaic techniques. There is no need to put the civilian population through this. The local Law Enforcement communities need to be made fully aware of its existence and the possibilities of these technologies. Use me as an example request my file and find out what they have done to me and how and why they are still doing it today.
The NSA records everything except what the controller-technicians do not want them to in real time. But in the instance of the FSU Shooter Myron May they may not have deliberately deleted the events leading up to the shootings in real time. So the NSA should have a recording of the events and a log of what they were doing to him leading up to the shootings and more importantly why they didn’t stop him and who his controller-technician’s were. The same scenario of a targeted individual plays out over and over and has gone on for years. Find the culprits behind what they call games!
They take over your mind. Your mind enslaves you because they control it. You could adsorb it as yourself. Unless they do not want you to. Then they reveal themselves. Through voices and actions that let you know they are in you and can see out of your eyes and take control of your body.
They are always deliberately creating emotional triggers which in itself would not be bad however they only use negative triggers instead of positive reinforcement even in my dreams. The easy way to think of the controller-technician’s are modern day Demons. Everything is negative without remorse or logic. It would be easy for them to say “We Have You And There Is Nothing You Can Do About It” instead they torture you. It is not logical to be tortured without a purpose other than they enjoy doing it.
They even control my dreams and emotions during the dream. I receive visions when I close my eyes even when I am not asleep and I have seen a hologram or a person standing at the foot of my bed. Sleep deprivation and pain.
There is military technology that is invisible to the naked eye that can reach down inside of me, grip and create pain. They start the torment (torture). They can “lock you down” in pain and keep the pain constant for a very long time and there is not anything that can be done about it.
I have been in it for years and I do not know how to extract myself from it. They have enslaved the human brain.
They are me and I am them and they are many. They are inhabitants that “ARE ME” for all practical purposes. They have the ability to take full control of my Mind and body. They could take my body outside and go somewhere and when they returned they could return me to my self and I would not remember where they (or myself) had gone or done. Creating fragmented memories.
They know what I am thinking as i think it. I do not have to verbalize it with my mouth. They know my subconscious thoughts. They see, feel, hear and taste what I do. They speak through my mouth and even over ride my own voice to the extent that if you call me on the phone it may be them you are communicating with instead of me. Conversations with my now ex-wife were exactly that or they can talk to me in my mind. They can pull you out of yourself and put you into someone else.
As an inhabitant you would then have the ability to know what I know and my thoughts in real time. You must trust whoever is on the controls there is a down side to being an inhabitant. The controller of the technologies can kidnap your spirit and hold you hostage as an inhabitant. They will not let you go or end your existence. You feel what they feel as they feel it and it is unpleasant to you and to them because you share the same emotion and become self-conscious. I have inhabitants within me that have been in here for years.
There is a cricket noise in my mind most of the time, that speaks from what sounds like the out side of my head (from a distance) but it is all from within my mind. It is not tinnitus it is actually words communicating to me through their technologies. They can turn up or down the volume.
They can pull the inhabitants forward to the point where you can feel the emotions of individual inhabitant and its personality. They can pull the inhabitant forward to take more control or move them back to allow me to have control. My inhabitants are pulled to far forward and have been a long time.
They control my energy level up or down, extreme fatigue, involuntary yawning, confusion, hunger, emotions and complete mental state. They diminish me to the point I can not work or hold down meaningful employment.
“I am not who you think I am,” is what they always tell me and also “you can’t ever do anything the remainder of your life.” Whatever I try to do they will not let me. They can put me to sleep and wake me up, I am by all practical purposes a biological robot! I am asking you to stop the torture. Contact whoever you can and tell them to release us from this technology that has enslaved me.
This is just technology. Please help, before it enslaves the world and future generations. They put something invisible that I can feel on my head that the military uses to help their troops in the field, it can apply pressure, pulsate and heat different parts of the body. They target a weak part of the body so they can easily create pain. Manipulating joints, groin, bowels and other sensitive areas.
They have the ability to lock you down in extreme pain and harvest pain sensors from other people and give them to you and adjust the extreme pain up and down. They have the ability to do whatever they want whenever they want to with any aspect of your body. This has been going on by the same group of people for a very long time. Gaslighting or gas-lighting is a form of mental abuse in which information is twisted/spun, selectively omitted to favor the abuser, or false information is presented with the intent of making victims doubt their own memory, perception and sanity. Instances may range simply from the denial by an abuser that previous abusive incidents ever occurred, up to the staging of bizarre events by the abuser with the intention of disorienting the victim. All Targeted Individuals will have similar but different stories because they have a basic procedure (format) that they wrap around your individual circumstances. Because they pull things out of your own mind and use it to pull your conscious mind into the story line to facilitate their mind control agenda that they have perfected over a very long time. It would not surprise me to find out that they are using techniques from POWs. Mind
Control.
In this scenario they call themselves Mason’s and according to them they control the World as we know it. They do skits similar to a screen play with all sides covered and all the inhabitants and participants participating that goes on for days if not weeks. While they put you to sleep nodding off for fractions of seconds so that you miss “a word” within the conversation and cause confusion. Also cause sleep deprivation. They bring a very large group of participants that are both inside of you and outside of you. Even from early child hood that you have not communicated with since childhood. The majority of my family are inside of me as inhabitants. But remember it is all pulled out of your own mind.
They use “False Flag,” false scenarios, manipulation and outright lies about yourself your family community and their ability or willingness to help you. However everything they do is to destroy you. It is different from having an outside influence attack you or try to influence you this is internal and for some reason you trust it because it is coming from within your own mind. I can’t find words to explain how easy it is for them to manipulate me over and over again. Why would I even begin to trust them. And yet that have done it so many times. But they are with me 24/7 and control thoughts and emotions. But somehow it is embarrassing to know they still manipulate me.
They created extreme pain in my head and they would not stop even though they knew it was just torture. I asked them and they did not want me to do anything. It was just torture. I believe that they are trying to get me to comment suicide. Why else would they just cause extreme pain to someone who is defenseless against this technology.
This technology should not be used against the American population. With remote neural monitoring and other technologies they have complete control of everyone. So there is no need to induce pain on anyone.
They are torturing me. But if they were not they have the ability to do everything perfect. They can raise anyone to a mental and physical state that would allow them to be at their peck performance 24/7. I am sure that some of the congressman and woman are at their very best because of this technology. They have the ability to give you words that you speak out of your mouth and those words would not be your own. But could be very helpful in public speaking venues because you would not miss a word. I want to let you know that you and your staff my not be your own.
They have the ability to bless you or curse you within the same technology. If you are already one of those that have been blessed by this I sincerely pray that you remember to protect the rest of the civilization from it.
They control everything electronic, meaning all communications and everything else. If someone is targeted they may not have the ability to complain or notify anyone. If they do they may choose not to reach out to friends and family because of the fear that the controller-technician’s might enslave anyone they come in contact with. I cannot communicate in any way without them knowing it. If I know it then they know it. No secrets of any kind. Not a password, account number or anything! They are me.
Access DARPA “Defense Departments Advance Research Project Agency” the information listed above is from one of their projects. Free me, Free yourself, free the world from this tyranny that has the world enslaved. By passing laws to protect every living thing by placing rules and regulations around the use and deployment of these technologies. We are asking you to stop the use of these technologies against the United States citizens and global community. Thanks for your cooperation.
The shootings previously mentioned could not have happened without the controller-technician’s knowledge or direct participation.
It is just technology that reads and controls the brain and inhabits the human body without any technology on or inside the body. It is all technology and it can control every man, woman and child. We are no longer our own! Protect us all. Every man woman and child that lives today or that will ever live! Today’s decisions within the government will affect mankind for generations.
I am trying to give you the information that would allow you to ask the proper question to the right government organization that could lead to the full disclosure of the information that you need as a congressmen that could lead to the official sanction of organizations that use this technology to commit
crimes against humanity.
Why isn’t there at location in the United State of America that I can Travel to and be tested for electronic weaponry and the devices used to facilitate the abduction and torture of the minds of the population of the United States Of American?
I am asking you to stop the torture. Contact whoever you can and tell them to release us from this technology that has enslaved me.
Mind Control – Remote Neural Monitoring: Daniel Estulin and Magnus Olsson on Russia Today
Freedom From Covert Harassment and Surveillance
Directory of Representatives
Senators of the 114th Congress
Thank you for your help.
- See more at: http://americanfreepress.net/?p=21854#comment-10934
Do I trust some and get fooled by phoniness? Or do I trust nobody and live in loneliness?
Great question a REAL Mind Control victim of psychiatry faces.
Me, I have a couple of people I hang out with, mostly from work and I found it's much better to socialize then to live in loneliness, although I got only ONE chance for love in my life (looks like that those are the rules of the Game - to give a victim one chance, but I was young and stupid and didn't realize this).
Although the phrase "The truth will set you free" might not be true in this Game, it's better to know so you don't
get fooled by phoniness. These days almost everyone seems to be a psychiatrist and those inside my head are making sure that nobody I get in contact with confirms what I know. But I started to have fun seeing how people I'm with suddenly try to change the subject when I bring up Mind Control. It's actually silly and funny how they have to live by their code cause there are still small percentage of people who don't belong and should not know about it - hence the media silence about the subject. But, since I obviously don't belong and probably never will, I don't have to keep my mouth shut. I started to make jokes about it and have fun with it au contraire to people's belief that I should be depressed and even might commit the suicide. There is a term: reframing.
Heres a great interview with whistleblower Dr . Robert Duncan and Dr. John Hall. In respinse to rumors that Duncan is a fraud, i would suggest listening, then sharing.
As TIs we are constantly beset by adversaries. Not onky do we encounter Electronic Harassment, Gangstalking and otger human involved situations, as well as stigma caused by TIs choosing violence. ....
But we are also set upon by negative influences from within. How do we handle this stress?
Being resilient will help us reach our goal of Freedom, despite the odds. Heres an article that points out 10 ways to become more resilient. The link below is the entire article.
http://www.apa.org/helpcenter/road-resilience.aspx
Good relationships with close family members, friends or others are important. Accepting help and support from those who care about you and will listen to you strengthens resilience. Some people find that being active in civic groups, faith-based organizations, or other local groups provides social support and can help with reclaiming hope. Assisting others in their time of need also can benefit the helper.
Avoid seeing crises as insurmountable problems. You can't change the fact that highly stressful events happen, but you can change how you interpret and respond to these events. Try looking beyond the present to how future circumstances may be a little better. Note any subtle ways in which you might already feel somewhat better as you deal with difficult situations.
Accept that change is a part of living. Certain goals may no longer be attainable as a result of adverse situations. Accepting circumstances that cannot be changed can help you focus on circumstances that you can alter.
Move toward your goals. Develop some realistic goals. Do something regularly — even if it seems like a small accomplishment — that enables you to move toward your goals. Instead of focusing on tasks that seem unachievable, ask yourself, "What's one thing I know I can accomplish today that helps me move in the direction I want to go?"
Take decisive actions. Act on adverse situations as much as you can. Take decisive actions, rather than detaching completely from problems and stresses and wishing they would just go away.
Look for opportunities for self-discovery. People often learn something about themselves and may find that they have grown in some respect as a result of their struggle with loss. Many people who have experienced tragedies and hardship have reported better relationships, greater sense of strength even while feeling vulnerable, increased sense of self-worth, a more developed spirituality and heightened appreciation for life.
Nurture a positive view of yourself. Developing confidence in your ability to solve problems and trusting your instincts helps build resilience.
Keep things in perspective. Even when facing very painful events, try to consider the stressful situation in a broader context and keep a long-term perspective. Avoid blowing the event out of proportion.
Maintain a hopeful outlook. An optimistic outlook enables you to expect that good things will happen in your life. Try visualizing what you want, rather than worrying about what you fear.
Take care of yourself. Pay attention to your own needs and feelings. Engage in activities that you enjoy and find relaxing. Exercise regularly. Taking care of yourself helps to keep your mind and body primed to deal with situations that require resilience.
Additional ways of strengthening resilience may be helpful. For example, some people write about their deepest thoughts and feelings related to trauma or other stressful events in their life. Meditation and spiritual practices help some people build connections and restore hope.
The key is to identify ways that are likely to work well for you as part of your own personal strategy for fostering resilience.