https://www.youtube.com/watch?v=iyMSvQqeWOo Thousands of solid, intelligent hard working Americans are complaining of the exactly the same issues that Arron Alexis (The Navy Yard Shooter) Was. Here is hundreds of testimonies of other citizens before the Presidential commission on Bi...See More
Against use of Psychotronic Weapons. Testimonies of victims before the Presidential Commission, USA
All Posts (12238)
Silent Weapons for Quiet Wars
From Bill Cooper
http://educate-yourself.org/cn/silentweaponsquietwarsmay79.shtml
May 1979
from page 36 of "Behold a Pale Horse" by William Cooper
"The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale."
Milton William Cooper, a former Navel Intelligence Officer with the Commander in Chief of the Pacific Fleet, and a 38 level above top secret clearence, read the same report in Navel Intelligence Majority Twelve file, it was listed as compiled by the Bilderberger Group.
TOP SECRET
Silent Weapons for Quiet Wars
An introductory programming manual
Operations Research
Technical Manual
TM-SW7905.1
WELCOME ABOARD
This publication marks the 25th anniversary of the Third World War, called the "Quiet War," being conducted using subjective biological warfare, fought with "silent weapons."
This book contains an introductory description of this war, its strategies, and its weaponry.
May 1979 #74-1120
SECURITY
It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.
This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodology for economic conquest -- it must be understood that a state of domestic warfare exists between said person or group of persons and the public.
The solution of today's problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values.
You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without a loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.
HISTORICAL INTRODUCTION
Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the military management [Eisenhower] in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).
It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.
Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high-speed computerized data-processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.
Relay computers were too slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly, filled the bill.
The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician George B. Dantzig.
Then in 1948, the transistor, invented by J. Bardeen, W. H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.
With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.
Immediately, the Rockefeller Foundation got in on the ground floor by making a four-year grant to Harvard College, funding the Harvard Economic Research Project for the study of the structure of the American economy. One year later, in 1949, the United States Air Force joined in.
In 1952 the original grant period terminated, and a high-level meeting of the elite was held to determine the next phase of social operations research. The Harvard project had been very fruitful, as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering. (Studies in the Structure of the American Economy -- copyright 1953 by Wasily Leontief, International Sciences Press Inc., White Plains, New York.)
Engineered in the last half of the decade of the 1940s, the new Quiet War machine stood, so to speak, in sparkling gold-plated hardware on the showroom floor by 1954.
With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power was a possibility only decades away.
The combination was irresistible.
The Quiet War was quietly declared by the International Elite at a meeting held in 1954.
Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon-system has never suffered any major setbacks.
This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.
POLITICAL INTRODUCTION
In 1954 it was well recognized by those in positions of authority that it was only a matter of time, only a few decades, before the general public would be able to grasp and upset the cradle of power, for the very elements of the new silent-weapon technology were as accessible for a public utopia as they were for providing a private utopia.
The issue of primary concern, that of dominance, revolved around the subject of the energy sciences.
ENERGY
Energy is recognized as the key to all activity on earth. Natural science is the study of the sources and control of natural energy, and social science, theoretically expressed as economics, is the study of the sources and control of social energy. Both are bookkeeping systems: mathematics. Therefore, mathematics is the primary energy science. And the bookkeeper can be king if the public can be kept ignorant of the methodology of the bookkeeping.
All science is merely a means to an end. The means is knowledge. The end is control. Beyond this remains only one issue: Who will be the beneficiary?
In 1954 this was the issue of primary concern. Although the so-called "moral issues" were raised, in view of the law of natural selection it was agreed that a nation or world of people who will not use their intelligence are no better than animals who do not have intelligence. Such people are beasts of burden and steaks on the table by choice and consent.
Consequently, in the interest of future world order, peace, and tranquility, it was decided to privately wage a quiet war against the American public with an ultimate objective of permanently shifting the natural and social energy (wealth) of the undisciplined and irresponsible many into the hands of the self-disciplined, responsible, and worthy few.
In order to implement this objective, it was necessary to create, secure, and apply new weapons which, as it turned out, were a class of weapons so subtle and sophisticated in their principle of operation and public appearance as to earn for themselves the name "silent weapons."
In conclusion, the objective of economic research, as conducted by the magnates of capital (banking) and the industries of commodities (goods) and services, is the establishment of an economy which is totally predictable and manipulatable.
In order to achieve a totally predictable economy, the low-class elements of the society must be brought under total control, i.e., must be housebroken, trained, and assigned a yoke and long-term social duties from a very early age, before they have an opportunity to question the propriety of the matter. In order to achieve such conformity, the lower-class family unit must be disintegrated by a process of increasing preoccupation of the parents and the establishment of government-operated day-care centers for the occupationally orphaned children.
The quality of education given to the lower class must be of the poorest sort, so that the moat of ignorance isolating the inferior class from the superior class is and remains incomprehensible to the inferior class. With such an initial handicap, even bright lower class individuals have little if any hope of extricating themselves from their assigned lot in life. This form of slavery is essential to maintaining some measure of social order, peace, and tranquility for the ruling upper class.
DESCRIPTIVE INTRODUCTION OF THE SILENT WEAPON
Everything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in its own manner of functioning. It shoots situations, instead of bullets; propelled by data processing, instead of a chemical reaction (explosion); originating from bits of data, instead of grains of gunpowder; from a computer, instead of a gun; operated by a computer programmer, instead of a marksman; under the orders of a banking magnate, instead of a military general. It makes no obvious explosive noises, causes no obvious physical or mental injuries, and does not obviously interfere with anyone's daily social life. Yet it makes an unmistakable "noise," causes unmistakable physical and mental damage, and unmistakably interferes with daily social life, i.e., unmistakable to a trained observer, one who knows what to look for.
The public cannot comprehend this weapon, and therefore cannot believe that they are being attacked and subdued by a weapon.
The public might instinctively feel that something is wrong, but because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence. Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it.
When a silent weapon is applied gradually, the public adjusts / adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.
Therefore, the silent weapon is a type of biological warfare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.
THEORETICAL INTRODUCTION
"Give me control over a nation's currency, and I care not who makes its laws."
Mayer Amschel Rothschild
(1743 - 1812)
Today's silent weapons technology is an outgrowth of a simple idea discovered, succinctly expressed, and effectively applied by the quoted Mr. Mayer Amschel Rothschild. Mr. Rothschild discovered the missing passive component of economic theory known as economic inductance. He, of course, did not think of his discovery in these 20th-century terms, and, to be sure, mathematical analysis had to wait for the Second Industrial Revolution, the rise of the theory of mechanics and electronics, and finally, the invention of the electronic computer before it could be effectively applied in the control of the world economy.
GENERAL ENERGY CONCEPTS
In the study of energy systems, there always appear three elementary concepts. These are potential energy, kinetic energy, and energy dissipation. And corresponding to these concepts, there are three idealized, essentially pure physical counterparts called passive components.
(1) In the science of physical mechanics, the phenomenon of potential energy is associated with a physical property called elasticity or stiffness, and can be represented by a stretched spring.
In electronic science, potential energy is stored in a capacitor instead of a spring. This property is called capacitance instead of elasticity or stiffness.
(2) In the science of physical mechanics, the phenomenon of kinetic energy is associated with a physical property called inertia or mass, and can be represented by a mass or a flywheel in motion.
In electronic science, kinetic energy is stored in an inductor (in a magnetic field) instead of a mass. This property is called inductance instead of inertia.
(3) In the science of physical mechanics, the phenomenon of energy dissipation is associated with a physical property called friction or resistance, and can be represented by a dashpot or other device which converts system energy into heat.
In electronic science, dissipation of energy is performed by an element called either a resistor or a conductor, the term "resistor" being the one generally used to express the concept of friction, and the term "conductor" being generally used to describe a more ideal device (e.g., wire) employed to convey electronic energy efficiently from one location to another. The property of a resistance or conductor is measured as either resistance or conductance reciprocals.
In economics these three energy concepts are associated with:
Economic Capacitance -- Capital (money, stock/inventory, investments in buildings and durables, etc.)
Economic Conductance -- Goods (production flow coefficients)
Economic Inductance -- Services (the influence of the population of industry on output)
All of the mathematical theory developed in the study of one energy system (e.g., mechanics, electronics, etc.) can be immediately applied in the study of any other energy system (e.g., economics).
MR. ROTHSCHILD'S ENERGY DISCOVERY
What Mr. Rothschild had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is "when you assume the appearance of power, people soon give it to you."
Mr. Rothschild had discovered that currency or deposit loan accounts had the required appearance of power that could be used to induce people (inductance, with people corresponding to a magnetic field) into surrendering their real wealth in exchange for a promise of greater wealth (instead of real compensation). They would put up real collateral in exchange for a loan of promissory notes. Mr. Rothschild found that he could issue more notes than he had backing for, so long as he had someone's stock of gold as a persuader to show to his customers.
Mr. Rothschild loaned his promissory notes to individuals and to governments. These would create overconfidence. Then he would make money scarce, tighten control of the system, and collect the collateral through the obligation of contracts. The cycle was then repeated. These pressures could be used to ignite a war. Then he would control the availability of currency to determine who would win the war. That government which agreed to give him control of its economic system got his support.
Collection of debts was guaranteed by economic aid to the enemy of the debtor. The profit derived from this economic methodology made Mr. Rothschild all the more able to extend his wealth. He found that the public greed would allow currency to be printed by government order beyond the limits (inflation) of backing in precious metal or the production of goods and services (gross national product, GNP).
APPARENT CAPITAL AS "PAPER" INDUCTOR
In this structure, credit, presented as a pure element called "currency," has the appearance of capital, but is, in fact, negative capital. Hence, it has the appearance of service, but is, in fact, indebtedness or debt. It is therefore an economic inductance instead of an economic capacitance, and if balanced in no other way, will be balanced in no other way, will be balanced by the negation of population (war, genocide). The total goods and services represent real capital called the gross national product, and currency may be printed up to this level and still represent economic capacitance; but currency printed beyond this level is subtractive, represents the introduction of economic inductance, and constitutes notes of indebtedness.
War is therefore the balancing of the system by killing the true creditors (the public which we have taught to exchange true value for inflated currency) and falling back on whatever is left of the resources of nature and regeneration of those resources.
Mr. Rothschild had discovered that currency gave him the power to rearrange the economic structure to his own advantage, to shift economic inductance to those economic positions which would encourage the greatest economic instability and oscillation.
The final key to economic control had to wait until there was sufficient data and high-speed computing equipment to keep close watch on the economic oscillations created by price shocking and excess paper energy credits -- paper inductance/inflation.
BREAKTHROUGH
Thea aviation field provided the greatest evolution in economic engineering by way of the mathematical theory of shock testing. In this process, a projectile is fired from an airframe on the ground and the impulse of the recoil is monitored by vibration transducers connected to the airframe and wired to chart recorders.
By studying the echoes or reflections of the recoil impulse in the airframe, it is possible to discover critical vibrations in the structure of the airframe which either vibrations of the engine or aeolian vibrations of the wings, or a combination of the two, might reinforce resulting in a resonant self-destruction of the airframe in flight as an aircraft. From the standpoint of engineering, this means that the strengths and weaknesses of the structure of the airframe in terms of vibrational energy can be discovered and manipulated.
APPLICATION IN ECONOMICS
To use this method of airframe shock testing in economic engineering, the prices of commodities are shocked, and the public consumer reaction is monitored. The resulting echoes of the economic shock are interpreted theoretically by computers and the psycho-economic structure of the economy is discovered. It is by this process that partial differential and difference matrices are discovered that define the family household and make possible its evaluation as an economic industry (dissipative consumer structure).
Then the response of the household to future shocks can be predicted and manipulated, and society becomes a well-regulated animal with its reins under the control of a sophisticated computer-regulated social energy bookkeeping system.
Eventually every individual element of the structure comes under computer control through a knowledge of personal preferences, such knowledge guaranteed by computer association of consumer preferences (universal product code -- UPC -- zebra-stripe pricing codes on packages) with identified consumers (identification via association with the use of a credit card and later a permanent "tattooed" body number invisible under normal ambient illumination...
THE ECONOMIC MODEL
...The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy: at first the American economy, and then the world economy. It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such has proven to be the case. Moreover, the economy has been transformed into a guided missle on target.
The immediate aim of the Harvard project was to discover the economic structure, what forces change that structure, how the behavior of the structure can be predicted, and how it can be manipulated. What was needed was a well-organized knowledge of the mathematical structures and interrelationships of investment, production, distribution, and consumption.
To make a short story of it all, it was discovered that an economy obeyed the same laws as electricity and that all of the mathematical theory and practical and computer know-how developed for the electronic field could be directly applied in the study of economics. This discovery was not openly declared, and its more subtle implications were and are kept a closely guarded secret, for example that in an economic model, human life is measured in dollars, and that the electric spark generated when opening a switch connected to an active inductor is mathematically analogous to the initiation of a war.
The greatest hurdle which theoretical economists faced was the accurate description of the household as an industry. This is a challenge because consumer purchases are a matter of choice which in turn is influenced by income, price, and other economic factors.
This hurdle was cleared in an indirect and statistically approximate way by an application of shock testing to determine the current characteristics, called current technical coefficients, of a household industry.
Finally, because problems in theoretical economics can be translated very easily into problems in theoretical electronics, and the solution translated back again, it follows that only a book of language translation and concept definition needed to be written for economics. The remainder could be gotten from standard works on mathematics and electronics. this makes the publication of books on advanced economics unnecessary, and greatly simplifies project security.
INDUSTRIAL DIAGRAMS
An ideal industry is defined as a device which receives value from other industries in several forms and converts into one specific product for sales and distribution to other industries. It has several inputs and one output. What the public normally thinks of as one industry is really an industrial complex where several industries under one roof produce one or more products...
THREE INDUSTRIAL CLASSES
Industries fall into three categories or classes by type of output:
Class #1 - Capital (resources)
Class #2 - Goods (commodities or use -- dissipative)
Class #3 - Services (action of population)
Class #1 has three sub-classes:
Nature - sources of energy and raw materials.
Government - printing of currency equal to gross national product (GNP), and extension (inflation) of currency in excess of GNP.
Banking - loaning of money for interest, and extension (inflation / counterfeiting) of economic value through deposit loan accounts.
Class #2 industries exist as producers of tangible or consumer (dissipated) products. This sort of activity is usually recognized and labeled by the public as an "industry."
Class #3 industries are those which have service rather than a tangible product as their output. These industries are called (1) households, and (2) governments. Their output is human activity of a mechanical sort, and their basis is population.
AGGREGATION
The whole economic system can be represented by a three-industry model if one allows the names of the outputs to be (1) capital, (2) goods, and (3) services. The problem with this representation is that it would not show the influence of , say, the textile industry on the ferrous metal industry. This is because both the textile industry and the ferrous metal industry would be contained within a single classification called the "goods industry" and by this process of combining or aggregating these two industries under one system block they would lose their economic individuality.
THE E-MODEL
A national economy consists of simultaneous flows of production, distribution, consumption, and investment. If all of these elements including labor and human functions are assigned a numerical value in like units of measure, say, 1939 dollars, then this flow can be further represented by a current flow in an electronic circuit, and its behavior can be predicted and manipulated with useful precision.
The three ideal passive energy components of electronics, the capacitor, the resistor, and the inductor correspond to the three ideal passive energy components of economics called the pure industries of capital, goods, and services, respectively.
Economic capacitance represents the storage of capital in one form or another.
Economic conductance represents the level of conductance of materials for the production of goods.
Economic inductance represents the inertia of economic value in motion. This is a population phenomenon known as services.
ECONOMIC INDUCTANCE
An electrical inductor (e.g., a coil of wire) has an electric current as its primary phenomenon and a magnetic field as its secondary phenomenon (inertia). Corresponding to this, and economic inductor has a flow of economic value as its primary phenomenon and a population field as its secondary phenomenon of inertia. When the flow of economic value (e.g., money) diminishes, the human population field collapses in order to keep the economic value (money) flowing (extreme case -- war).
This public inertia is a result of consumer buying habits, expected standard of living, etc., and is generally a phenomenon of self- preservation.
INDUCTIVE FACTORS TO CONSIDER
Population
Magnitude of the economic activities of the government.
The method of financing these government activities (See Peter-Paul Principle -- inflation of currency.)
TRANSLATION
(A few examples will be given.)
Charge -- coulombs -- dollars (1939).
Flow / Current -- ampheres (coulombs per second) -- dollars of flow per year.
Motivating Force -- volts -- dollars (output) demand.
Conductance -- amperes per volt -- dollars of flow per year per dollar demand.
Capacitance -- coulombs per volt -- dollars of production inventory / stock per dollar demand.
TIME FLOW RELATIONSHIPS AND SELF-DESTRUCTIVE OSCILLATIONS
An ideal industry may be symbolized electronically in various ways. The simplest way is to represent a demand by a voltage and a supply by a current. When this is done, the relationship between the two becomes what is called an admittance, which can result from three economic factors: (1) hindsight flow, (2) present flow, and (3) foresight flow.
Foresight flow is the result of that property of living entities to cause energy (food) to be stored for a period of low energy (e.g., a winter season). It consists of demands made upon an economic system for that period of low energy (winter season).
In a production industry it takes several forms, one of which is known as a production stock or inventory. In electronic symbology this specific industry demand (a pure capital industry) is represented by capacitance and the stock or resource is represented by a stored charge. Satisfaction of an industry demand suffers a lag because of the loading effect of inventory priorities.
Present flow ideally involves no delays. It is, so to speak, input today for output today, a "hand to mouth" flow. In electronic symbology, this specific industry demand (a pure use industry) is represented by a conductance which is then a simple economic valve (a dissipative element).
Hindsight flow is known as habit or inertia. In electronics this phenomenon is the characteristic of an inductor (economic analog = a pure service industry) in which a current flow (economic analog = flow of money) creates a magnetic field (economic analog = active human population) which, if the current (money flow) begins to diminish, collapse (war) to maintain the current (flow of money -- energy).
Other large alternatives to war as economic inductors or economic flywheels are an open-ended social welfare program, or an enormous (but fruitful) open-ended space program.
The problem of stabilizing the economic system is that there is too much demand on account of (1) too much greed and (2) too much population.
This creates excessive economic inductance which can only be balanced with economic capacitance (true resources or value -- e.g., in goods or services).
The social welfare program is nothing more than an open-ended credit balance system which creates a false capital industry to give nonproductive people a roof over their heads and food in their stomachs. This can be useful, however, because the recipients become state property in return for the "gift," a standing army for the elite. for he who pays the piper picks the tune.
Those who get hooked on the economic drug, must go to the elite for a fix. In this, the method of introducing large amounts of stabilizing capacitance is by borrowing on the future "credit" of the world. This is a fourth law of motion -- onset, and consists of performing an action and leaving the system before the reflected reaction returns to the point of action -- a delayed reaction.
The means of surviving the reaction is by changing the system before the reaction can return. By this means, politicians become popular in their own time and the public pays for it later. In fact, the measure of such a politician is the delay time.
The same thing is achieved by a government by printing money beyond the limit of the gross national product, an economic process called inflation. This puts a large quantity of money into the hands of the public and maintains a balance against their greed, creates a false self-confidence in them and, for awhile, stays the wolf from the door.
They must eventually resort to war to balance the account, because war ultimately is merely the act of destroying the creditor, and the politicians are the publicly hired hit men that justify the act to keep the responsibility and blood off the public conscience. (See section on consent factors and social-economic structuring.)
If the people really cared about their fellow man, they would control their appetites (greed, procreation, etc.) so that they would not have to operate on a credit or welfare social system which steals from the worker to satisfy the bum.
Since most of the general public will not exercise restraint, there are only two alternatives to reduce the economic inductance of the system.
(1) Let the populace bludgeon each other to death in a war, which will only result in a total destruction of the living earth.
(2) Take control of the world by the use of economic "silent weapons" in a form of "quiet warfare" and reduce the economic inductance of the world to a safe level by a process of benevolent slavery and genocide.
The latter option has been taken as the obviously better option. At this point it should be crystal clear to the reader why absolute secrecy about the silent weapons is necessary. The general public refuses to improve its own mentality and its faith in its fellow man. It has become a heard of proliferating barbarians, and, so to speak, a blight upon the face of the earth.
They do not care enough about economic science to learn why they have not been able to avoid war despite religious morality, and their religious or self-gratifying refusal to deal with earthly problems renders the solution of the earthly problem unreachable by them.
It is left to those few who are truly willing to think and survive as the fittest to survive, to solve the problem for themselves as the few who really care. Otherwise, exposure of the silent weapon would destroy our only hope of preserving the seed of future true humanity...
THE HOUSEHOLD INDUSTRY
The industries of finance (banking), manufacturing, and government, real counterparts of the pure industries of capital, goods, and services, are easily defined because they are generally logically structured. Because of this their processes can be described mathematically and their technical coefficients can be easily deduced. This, however, is not the case with the service industry known as the household industry.
HOUSEHOLD MODELS
...The problem which a theoretical economist faces is that the consumer preferences of any household is not easily predictable and the technical coefficients of any one household tend to be a nonlinear, very complex, and variable function of income, prices, etc.
Computer information derived from the use of the universal product code in conjunction with credit-card purchase as an individual household identifier could change this state of affairs, but the U.P.C. method is not yet available on a national or even a significant regional scale. To compensate for this data deficiency, an alternate indirect approach of analysis has been adopted known as economic shock testing. This method, widely used in the aircraft manufacturing industry, develops an aggregate statistical sort of data.
Applied to economics, this means that all of the households in one region or in the whole nation are studied as a group or class rather than individually, and the mass behavior rather than individual behavior is used to discover useful estimates of the technical coefficients governing the economic structure of the hypothetical single-household industry...
One method of evaluating the technical coefficients of the household industry depends upon shocking the prices of a commodity and noting the changes in the sales of all the commodities.
ECONOMIC SHOCK TESTING
In recent times, the application of Operations Research to the study of the public economy has been obvious for anyone who understands the principles of shock testing.
In the shock testing of an aircraft airframe, the recoil impulse of firing a gun mounted on that airframe causes shock waves in that structure which tell aviation engineers the conditions under which parts of the airplane or the whole airplane or its wings will start to vibrate or flutter like a guitar string, a flute reed, or a tuning fork, and disintegrate or fall apart in flight.
Economic engineers achieve the same result in studying the behavior of the economy and the consumer public by carefully selecting a staple commodity such as beef, coffee, gasoline, or sugar, and then causing a sudden change or shock in its price or availability, thus kicking everybody's budget and buying habits out of shape.
They then observe the shock waves which result by monitoring the changes in advertising, prices, and sales of that and other commodities.
The objective of such studies is to acquire the know-how to set the public economy into a predictable state of motion or change, even a controlled self-destructive state of motion which will convince the public that certain "expert" people should take control of the money system and reestablish security (rather than liberty and justice) for all. When they subject citizens are rendered unable to control their financial affairs, they, of course, become totally enslaved, a source of cheap labor.
Not only the prices of commodities, but also the availability of labor can be used as the means of shock testing. Labor strikes deliver excellent test shocks to an economy, especially in the critical service areas of trucking (transportation), communication, public utilities (energy, water, garbage collection), etc.
By shock testing, it is found that there is a direct relationship between the availability of money flowing in an economy and the psychological outlook and response of masses of people dependent upon that availability.
For example, there is a measurable quantitative relationship between the price of gasoline and the probability that a person would experience a headache, feel a need to watch a violent movie, smoke a cigarette, or go to the tavern for a mug of beer.
It is most interesting that, by observing and measuring the economic modes by which the public tries to run from their problems and escape from reality, and by applying the mathematical theory of Operations Research, it is possible to program computers to predict the most probable combination of created events (shocks) which will bring about a complete control and subjugation of the public thru a subversion of the public economy (by shaking the plum tree)...
INTRODUCTION TO ECONOMIC AMPLIFIERS
Economic amplifiers are the active components of economic engineering. The basic characteristic of any amplifier (mechanical, electrical, or economic) is that it receives an input control signal and delivers energy from an independent energy source to a specified output terminal in a predictable relationship to that input control signal.
The simplest form of economic amplifier is a device called advertising.
If a person is spoken to by a T.V. advertiser as if he were a twelve- year-old, then, due to suggestibility, he will, with a certain probability, respond or react to that suggestion with the uncritical response of a twelve-year-old and will reach into his economic reservoir and deliver its energy to buy that product on impulse when he passes it in the store.
An economic amplifier may have several inputs and outputs. Its response might be instantaneous or delayed. Its circuit symbol might e a rotary switch if its options are exclusive, qualitative, or "go" or "no go," or it might have its parametric input / output relationships specified by a matrix with internal energy sources represented.
Whatever its form might be, its purpose is to govern the flow of energy from a source to an output sink in direct relationship to an input control signal. For this reason, it is called an active circuit element or component.
Economic Amplifiers fall into classes called strategies, and, in comparison with electronic amplifiers, the specific internal functions of an economic amplifier are called logistical instead of electrical.
In the design of an economic amplifier we must have some idea of at least five functions, which are
the available input signals,
the desired output-control objectives,
the strategic objective,
the available economic power sources,
the logistical options.
The process of defining and evaluating these factors and incorporating the economic amplifier into an economic system has been popularly called Game Theory.
The design of an economic amplifier begins with a specification of the power level of the output, which can range from personal to national. The second condition is accuracy of response, i.e., how accurately the output action is a function of the input commands. High gain combined with strong feedback helps to deliver the required precision.
Most of the error will be in the input data signal. Personal input data tends to be specific, while national input data tends to be statistical.
SHORT LIST OF INPUTS
Questions to be answered:
(1) what (3) where (5) why
(2) when (4) how (6) who
General sources of information:
(1) telephone taps (3) analysis of garbage
(2) surveillance (4) behavior of children in school
Standard of living by:
(1) food (3) shelter
(2) clothing (4) transportation
Social contacts:
(1) telephone - itemized record of calls
(2) family - marriage certificates, birth certificates, etc.
(3) friends, associates, etc.
(4) memberships in organizations
(5) political affiliation
THE PERSONAL PAPER TRAIL
Personal buying habits, i.e., personal consumer preferences:
(1) checking accounts
(2) credit-card purchases
(3) "tagged" credit-card purchases - the credit-card purchase of products bearing the U.P.C. (Universal Product Code)
Assets:
(1) checking accounts (5) automobile, etc.
(2) savings accounts (6) safety deposit at bank
(3) real estate (7) stock market
(4) business
Liabilities:
(1) creditors (3) loans
(2) enemies (see - legal)
Government sources (ploys)*:
(1) Welfare (4) doles
(2) Social Security (5) grants
(3) U.S.D.A. surplus food (6) subsidies
*Principle of this ploy -- the citizen will almost always make the collection of information easy if he can operate on the "free sandwich principle" of "eat now, and pay later."
Government sources (via intimidation):
(1) Internal Revenue Service
(2) OSHA
(3) Census
(4) etc.
Other government sources -- surveillance of U.S. mail.
HABIT PATTERNS -- PROGRAMMING
Strengths and weaknesses:
(1) activities (sports, hobbies, etc.)
(2) see "legal" (fear, anger, etc. -- crime record)
(3) hospital records (drug sensitivities, reaction to pain, etc.)
(4) psychiatric records (fears, angers, disgusts, adaptability, reactions to stimuli, violence, suggestibility or hypnosis, pain, pleasure, love, and sex)
Methods of coping -- of adaptability -- behavior:
(1) consumption of alcohol
(2) consumption of drugs
(3) entertainment
(4) religious factors influencing behavior
(5) other methods of escaping from reality
Payment modus operandi (MO) -- pay on time, etc.:
(1) payment of telephone bills
(2) energy purchases
(3) water purchases
(4) repayment of loans
(5) house payments
(6) automobile payments
(7) payments on credit cards
Political sensitivity:
(1) beliefs (3) position (5) projects/activities
(2) contacts (4) strengths/weaknesses
Legal inputs -- behavioral control (Excuses for investigation, search, arrest, or employment of force to modify behavior)
(1) court records (4) reports made to police
(2) police records -- NCIC (5) insurance information
(3) driving record (6) anti-establishment acquaintances
NATIONAL INPUT INFORMATION
Business sources (via I.R.S., etc):
(1) prices of commodities
(2) sales
(3) investments in
(a) stocks/inventory
(b) production tools and machinery
(c) buildings and improvements
(d) the stock market
Banks and credit bureaus:
(1) credit information
(2) payment information
Miscellaneous sources:
(1) polls and surveys
(2) publications
(3) telephone records
(4) energy and utility purchases
SHORT LIST OF OUTPUTS
Outputs -- create controlled situations -- manipulation of the economy, hence society -- control by control of compensation and income.
Sequence:
(1) allocates opportunities.
(2) destroys opportunities.
(3) controls the economic environment.
(4) controls the availability of raw materials.
(5) controls capital.
(6) controls bank rates.
(7) controls the inflation of the currency.
(8) controls the possession of property.
(9) controls industrial capacity.
(10) controls manufacturing.
(11) controls the availability of goods (commodities).
(12) controls the prices of commodities.
(13) controls services, the labor force, etc.
(14) controls payments to government officials.
(15) controls the legal functions.
(16) controls the personal data files -- uncorrectable by the party slandered.
(17) controls advertising.
(18) controls media contact.
(19) controls material available for T.V. viewing
(20) disengages attention from real issues.
(21) engages emotions.
(22) creates disorder, chaos, and insanity.
(23) controls design of more probing tax forms.
(24) controls surveillance.
(25) controls the storage of information.
(26) develops psychological analyses and profiles of individuals.
(27) controls legal functions [repeat of 15]
(28) controls sociological factors.
(29) controls health options.
(30) preys on weakness.
(31) cripples strengths.
(32) leaches wealth and substance.
TABLE OF STRATEGIES
Do this: To get this:
Keep the public ignorant Less public organization
Maintain access to control points for feedback Required reaction to outputs (prices, sales)
Create preoccupation Lower defenses
Attack the family unit Control of the education of the young
Give less cash and more credit and doles More self-indulgence and more data
Attack the privacy of the church Destroy faith in this sort of government
Social conformity Computer programming simplicity
Minimize the tax protest Maximum economic data, minimum enforcement problems
Stabilize the consent Simplicity coefficients
Tighten control of variables Simpler computer input data -- greater predictability
Establish boundary conditions Problem simplicity / solutions of differential and difference equations
Proper timing Less data shift and blurring
Maximize control Minimum resistance to control
Collapse of currency Destroy the faith of the American people in each other.
DIVERSION, THE PRIMARY STRATEGY
Experience has proven that the simplest method of securing a silent weapon and gaining control of the public is to keep the public undisciplined and ignorant of basic systems principles on the one hand, while keeping them confused, disorganized, and distracted with matters of no real importance on the other hand.
This is achieved by:
(1) disengaging their minds; sabotaging their mental activities; providing a low-quality program of public education in mathematics, logic, systems design and economics; and discouraging technical creativity.
(2) engaging their emotions, increasing their self-indulgence and their indulgence in emotional and physical activities, by:
(a) unrelenting emotional affrontations and attacks (mental and emotional rape) by way of a constant barrage of sex, violence, and wars in the media -- especially the T.V. and the newspapers.
(b) giving them what they desire -- in excess -- "junk food for thought" -- and depriving them of what they really need.
(3) rewriting history and law and subjecting the public to the deviant creation, thus being able to shift their thinking from personal needs to highly fabricated outside priorities.
These preclude their interest in and discovery of the silent weapons of social automation technology.
The general rule is that there is profit in confusion; the more confusion, the more profit. Therefore, the best approach is to create problems and then offer the solutions.
DIVERSION SUMMARY
Media: Keep the adult public attention diverted away from the real social issues, and captivated by matters of no real importance.
Schools: Keep the young public ignorant of real mathematics, real economics, real law, and real history.
Entertainment: Keep the public entertainment below a sixth-grade level.
Work: Keep the public busy, busy, busy, with no time to think; back on the farm with the other animals.
CONSENT, THE PRIMARY VICTORY
A silent weapon system operates upon data obtained from a docile public by legal (but not always lawful) force. Much information is made available to silent weapon systems programmers through the Internal Revenue Service. (See Studies in the Structure of the American Economy for an I.R.S. source list.)
This information consists of the enforced delivery of well-organized data contained in federal and state tax forms collected, assembled, and submitted by slave labor provided by taxpayers and employers.
Furthermore, the number of such forms submitted to the I.R.S. is a useful indicator of public consent, an important factor in strategic decision making. Other data sources are given in the Short List of Inputs.
Consent Coefficients -- numerical feedback indicating victory status. Psychological basis: When the government is able to collect tax and seize private property without just compensation, it is an indication that the public is ripe for surrender and is consenting to enslavement and legal encroachment. A good and easily quantified indicator of harvest time is the number of public citizens who pay income tax despite an obvious lack of reciprocal or honest service from the government.
AMPLIFICATION ENERGY SOURCES
The next step in the process of designing an economic amplifier is discovering the energy sources. The energy sources which support any primitive economic system are, of course, a supply of raw materials, and the consent of the people to labor and consequently assume a certain rank, position, level, or class in the social structure; i.e., to provide labor at various levels in the pecking order.
Each class, in guaranteeing its own level of income, controls the class immediately below it, hence preserves the class structure. This provides stability and security, but also government from the top.
As time goes on and communication and education improve, the lower- class elements of the social labor structure become knowledgeable and envious of the good things that the upper-class members have. They also begin to attain a knowledge of energy systems and the ability to enforce their rise through the class structure.
This threatens the sovereignty of the elite.
If this rise of the lower classes can be postponed long enough, the elite can achieve energy dominance, and labor by consent no longer will hold a position of an essential economic energy source.
Until such energy dominance is absolutely established, the consent of people to labor and let others handle their affairs must be taken into consideration, since failure to do so could cause the people to interfere in the final transfer of energy sources to the control of the elite.
It is essential to recognize that at this time, public consent is still an essential key to the release of energy in the process of economic amplification.
Therefore, consent as an energy release mechanism will now be considered.
LOGISTICS
The successful application of a strategy requires a careful study of inputs, outputs, the strategy connecting the inputs and the outputs, and the available energy sources to fuel the strategy. This study is called logistics.
A logistical problem is studied at the elementary level first, and then levels of greater complexity are studied as a synthesis of elementary factors.
This means that a given system is analyzed, i.e., broken down into its subsystems, and these in turn are analyzed, until, by this process, one arrives at the logistical "atom," the individual.
This is where the process of synthesis properly begins, and at the time of the birth of the individual.
THE ARTIFICIAL WOMB
From the time a person leaves its mother's womb, its every effort is directed toward building, maintaining, and withdrawing into artificial wombs, various sorts of substitute protective devices or shells.
The objective of these artificial wombs is to provide a stable environment for both stable and unstable activity; to provide a shelter for the evolutionary processes of growth and maturity -- i.e., survival; to provide security for freedom and to provide defensive protection for offensive activity.
This is equally true of both the general public and the elite. However, there is a definite difference in the way each of these classes go about the solution of problems.
THE POLITICAL STRUCTURE OF A NATION -- DEPENDENCY
The primary reason why the individual citizens of a country create a political structure is a subconscious wish or desire to perpetuate their own dependency relationship of childhood. Simply put, they want a human god to eliminate all risk from their life, pat them on the head, kiss their bruises, put a chicken on every dinner table, clothe their bodies, tuck them into bed at night, and tell them that everything will be alright when they wake up in the morning.
This public demand is incredible, so the human god, the politician, meets incredibility with incredibility by promising the world and delivering nothing. So who is the bigger liar? the public? or the "godfather"?
This public behavior is surrender born of fear, laziness, and expediency. It is the basis of the welfare state as a strategic weapon, useful against a disgusting public.
ACTION / OFFENSE
Most people want to be able to subdue and/or kill other human beings which disturb their daily lives, but they do not want to have to cope with the moral and religious issues which such an overt act on their part might raise. Therefore, they assign the dirty work to others (including their own children) so as to keep the blood off their own hands. They rave about the humane treatment of animals and then sit down to a delicious hamburger from a whitewashed slaughterhouse down the street and out of sight. But even more hypocritical, they pay taxes to finance a professional association of hit men collectively called politicians, and then complain about corruption in government.
RESPONSIBILITY
Again, most people want to be free to do things (to explore, etc.) but they are afraid to fail.
The fear of failure is manifested in irresponsibility, and especially in delegating those personal responsibilities to others where success is uncertain or carries possible or created liabilities (law) which the person is not prepared to accept. They want authority (root word -- "author"), but they will not accept responsibility or liability. So they hire politicians to face reality for them.
SUMMARY
The people hire the politicians so that the people can:
obtain security without managing it.
obtain action without thinking about it.
inflict theft, injury, and death upon others without having to contemplate either life or death.
avoid responsibility for their own intentions.
obtain the benefits of reality and science without exerting themselves in the discipline of facing or learning either of these things.
They give the politicians the power to create and manage a war machine to:
provide for the survival of the nation/womb.
prevent encroachment of anything upon the nation/womb.
destroy the enemy who threatens the nation/womb.
destroy those citizens of their own country who do not conform for the sake of stability of the nation/womb.
Politicians hold many quasi-military jobs, the lowest being the police which are soldiers, the attorneys and the C.P.A.s next who are spies and saboteurs (licensed), and the judges who shout the orders and run the closed union military shop for whatever the market will bear. The generals are industrialists. The "presidential" level of commander- in-chief is shared by the international bankers. The people know that they have created this farce and financed it with their own taxes (consent), but they would rather knuckle under than be the hypocrite.
Thus, a nation becomes divided into two very distinct parts, a docile sub-nation and a political sub-nation. The political sub-nation remains attached to the docile sub-nation, tolerates it, and leaches its substance until it grows strong enough to detach itself and then devour its parent.
SYSTEM ANALYSIS
In order to make meaningful computerized economic decisions about war, the primary economic flywheel, it is necessary to assign concrete logistical values to each element of the war structure -- personnel and material alike.
This process begins with a clear and candid description of the subsystems of such a structure.
THE DRAFT
(As military service)
Few efforts of human behavior modification are more remarkable or more effective than that of the socio-military institution known as the draft. A primary purpose of the draft or other such institution is to instill, by intimidation, in the young males of a society the uncritical conviction that the government is omnipotent. He is soon taught that a prayer is slow to reverse what a bullet can do in an instant. Thus, a man trained in a religious environment for eighteen years of his life can, by this instrument of the government, be broken down, be purged of his fantasies and delusions in a matter of mere months. Once that conviction is instilled, all else becomes easy to instill.
Even more interesting is the process by which a young man's parents, who purportedly love him, can be induced to send him off to war to his death. Although the scope of this work will not allow this matter to be expanded in full detail, nevertheless, a coarse overview will be possible and can serve to reveal those factors which must be included in some numerical form in a computer analysis of social and war systems.
We begin with a tentative definition of the draft. The draft (selective service, etc.) is an institution of compulsory collective sacrifice and slavery, devised by the middle-aged and the elderly for the purpose of pressing the young into doing the public dirty work. It further serves to make the youth as guilty as the elders, thus making criticism of the elders by the youth less likely (Generational Stabilizer). It is marketed and sold to the public under the label of "patriotic = national" service.
Once a candid economic definition of the draft is achieved, that definition is used to outline the boundaries of a structure called a Human Value System, which in turn is translated into the terms of game theory. The value of such a slave laborer is given in a Table of Human Values, a table broken down into categories by intellect, experience, post-service job demand, etc.
Some of these categories are ordinary and can be tentatively evaluated in terms of the value of certain jobs for which a known fee exists. Some jobs are harder to value because they are unique to the demands of social subversion, for an extreme example: the value of a mother's instruction to her daughter, causing that daughter to put certain behavioral demands upon a future husband ten or fifteen years hence; thus, by suppressing his resistance to a perversion of a government, making it easier for a banking cartel to buy the State of New York in, say, twenty years.
Such a problem leans heavily upon the observations and data of wartime espionage and many types of psychological testing. But crude mathematical models (algorithms, etc.) can be devised, if not to predict, at least to predetermine these events with maximum certainty. What does not exist by natural cooperation is thus enhanced by calculated compulsion. Human beings are machines, levers which may be grasped and turned, and there is little real difference between automating a society and automating a show factory.
These derived values are variable. (It is necessary to use a current Table of Human Values for computer analysis.) These values are given in true measure rather than U.S. dollars, since the latter is unstable, being presently inflated beyond the production of national goods and services so as to give the economy a false kinetic energy ("paper" inductance).
The silver value is stable, it being possible to buy the same amount with a gram of silver today as could be bought in 1920. Human value measured in silver units changes slightly due to changes in production technology.
ENFORCEMENT
FACTOR I
As in every social system approach, stability is achieved only by understanding and accounting for human nature (action / reaction patterns). A failure to do so can be, and usually is, disastrous.
As in other human social schemes, one form or another of intimidation (or incentive) is essential to the success of the draft. Physical principles of action and reaction must be applied to both internal and external subsystems.
To secure the draft, individual brainwashing / programming and both the family unit and the peer group must be engaged and brought under control.
FACTOR II -- FATHER
The man of the household must be housebroken to ensure that junior will grow up with the right social training and attitudes. The advertising media, etc., are engaged to see to it that father-to-be is pussy-whipped before or by the time he is married. He is taught that he either conforms to the social notch cut out for him or his sex life will be hobbled and his tender companionship will be zero. He is made to see that women demand security more than logical, principled, or honorable behavior.
By the time his son must go to war, father (with jelly for a backbone) will slam a gun into junior's hand before father will risk the censure of his peers, or make a hypocrite of himself by crossing the investment he has in his own personal opinion or self-esteem. Junior will go to war or father will be embarrassed. So junior will go to war, the true purpose not withstanding.
FACTOR III -- MOTHER
The female element of human society is ruled by emotion first and logic second. In the battle between logic and imagination, imagination always wins, fantasy prevails, maternal instinct dominates so that the child comes first and the future comes second. A woman with a newborn baby is too starry-eyed to see a wealthy man's cannon fodder or a cheap source of slave labor. A woman must, however, be conditioned to accept the transition to "reality" when it comes, or sooner.
As the transition becomes more difficult to manage, the family unit must be carefully disintegrated, and state-controlled public education and state-operated child-care centers must become more common and legally enforced so as to begin the detachment of the child from the mother and father at an earlier age. Inoculation of behavioral drugs can speed the transition for the child (mandatory). CAUTION: A woman's impulsive anger can override her fear. An irate woman's power must never be underestimated, and her power over a pussy-whipped husband must likewise never be underestimated. It got women the vote in 1920.
FACTOR IV -- JUNIOR
The emotional pressure for self-preservation during time of war and the self-serving attitude of the common herd that have an option to avoid the battlefield -- if junior can be persuaded to go -- is all of the pressure finally necessary to propel Johnny off to war. Their quiet blackmailings of him are the threats: "No sacrifice, no friends; no glory, no girlfriends."
FACTOR V -- SISTER
And what about junior's sister? She is given all the good things of life by her father, and taught to expect the same from her future husband regardless of the price.
FACTOR VI -- CATTLE
Those who will not use their brains are no better off than those who have no brains, and so this mindless school of jelly-fish, father, mother, son, and daughter, become useful beasts of burden or trainers of the same.
[end]
Incidentally, "Behold a Pale Horse" is an excellent source of information concerning the New World Order, and I recommend it -- if it can still be purchased. It was US$ 20 when I bought it in 1991. (published by Light Technology, Arizona
Web posted at: http://www.akasha.de/~aton/swfqw.html
A LETTER FROM THE DEVIL ADDRESSED TO
ALL HUMAN BEING ON THIS EARTH
I wanted to take the time to finally introduce myself to you seeing as though you’ve been serving me for so long now. Since it’s the end and my time is almost up, I figured I’d let you know just a few of the many ways I’ve been systematically destroying your life and the lives of the ones you love all this time. Let’s face it, you still won’t believe even after you read this so I figured, why not? I have to do what I can these days for kicks. Your ignorance is so entertaining. So many people are coming to Hell with me because of it and it’s marvelous. You didn’t think I was going down without taking as many people as possible with me, did you?
Anyway, do you know what my greatest weapon is? It’s making you believe I don’t exist. Would you like to know how I do it? Well for starters, I parade reality right in front of your face and make you believe it’s all fantasy. So many of you don’t even believe demons are real or that they’re everywhere so I make you believe they’re a figment of your imagination. So many of you take your hard earned money and actually pay to come and see us in horror movies, you think its fake. It’s thrilling huh? You love the thrill of being frightened by us but you have no idea you are actually paying to see the entities that are working to destroy your souls right now, the ones who are waiting to escort you when your soul drops into Hell.
Oh, and for the record don’t even think for a second I use only horror movies. I have totally infiltrated your music and television also. Just look at the things that are popular nowadays! Many celebrities are sold out to me. Many of them blatantly tell you of their allegiance to me but like I said, you don’t listen, or care for that matter, because you’re blind. I promise them everything in exchange for them to completely promote my agenda. Which is to destroy. In all, fairness which is rare for me, some of them are deceived; they don’t fully realize what they’re doing. See, I use them to promote sex, scandals, fornication, and a falsely fabulous lifestyle, all in the name of “entertainment”!
I create the illusion that they have it all so you’ll follow them and thirst after what they have. See, only God can truly fulfill you, but you don’t need to know that. So I lie to you and tell you if you only have __ you will be happy, and when it’s still not enough I suggest all you need is __. The cycle continues… I keep you on this never ending hamster wheel until your time runs >>>>>> out! By the time people realize it was all a lie it’s too late, you should see their faces!
See, I work in the mind, in deception. Don’t worry, I hate the celebrities too, and once they fulfill my purpose for them, I kill them off, especially before they have the chance to call out to God for help. That’s why so many of them are found dead of overdoses and unknown causes in their hotel rooms, they have it all right? At least you think so, and that’s all that matters. You would be surprised how many lives you can destroy when you take someone’s idols away. I love to kill two birds with one stone. I love that I have given you new God’s to serve, including me. Anything to keep you from seeking the real thing. Humans idolize money, each other, cars, THEMSELVES! Don’t deny it. You wait hungrily to catch the latest gossips. You can hardly contain yourself. See, I designed it that way. I’ve been around since the beginning, I know exactly what caters to your fallen nature.
You love the scandals, you live and DIE by these deceptions, you love it! YET you completely ignore your Maker and what he told you He wants, what pleases Him. Actually, wait… I’m being a little unfair. You don’t completely ignore Him. Sometimes you MIGHT say a little blessing over your food. Sometimes you MIGHT say a little prayer of thanks when something’s going your way, or going wrong or to run down your laundry list of things you want like he’s just some kind of Genie. This is all fine with me because what Jesus really wants is a relationship with you and for you to come to him for forgiveness, and love and obey Him. Giving Him the scraps of your life isn’t what He wants or deserves, nor will it bring you a relationship with Him so, keep it up! I just want you to think it is working. J
Do you know what the best part of all of this is? You even pass it all down to your children. See, unfortunately God is fair and gave you suckers the free will to choose. Everything WE do to you is based on spiritual laws. Permission and doorways have to be opened to us for us to operate. Why do you think the world is getting worse and worse by the minute? You are opening major spiritual doors that invite us in. You think it’s innocent to let your children watch movies about violence and sex, play with Ouija boards, stay out and party. You think it’s normal that most children know more about Harry Potter, Spongebob and Beyonce then they know about Jesus Christ. Who said that was okay? Didn’t your God say woe to those who call evil good and good evil? Wait, that’s right, no one is listening to the God of the Bible anymore, I created a counterfeit for you that would be fine with all of this. The popular and false one of today is a sucker and a softie who’s not disgraced by any of this at all.
I specialize in destroying the family dynamic too. I separate the fathers out of the picture by keeping them working so they have no time to spend with their children, or worse I promote them to operate against Gods order, as the tail of the family! I tempt men to ignore their wives, or wives to ignore their husbands! I turn families against each other with lies, jealousy, and deception, and the whole time you think its you. I am currently promoting a new type of family where little kids have 2 mommies and 2 daddies. You really don’t know how much control we have. When you are not surrendered to Jesus your fair game for us-and you don’t even know it. People are constantly pumping poison into their homes and don’t care, and then they wonder why little Jimmy or little Mary fly off the handle and kill all of their class mates or themselves! You open the doors for my demons to operate in THEIR lives. THIS is what you do with the free will God gave you. It’s fantastic. By-the-way, I make sure to promote mental illness as an excuse, but it’s really us.
I have systematically set the world up for failure. I’m the one that created racial division. It was me! I knew I could destroy many people by making them feel superior to others based on their skin color. I gave superiority complexes to Humans so that people would consider themselves to be BETTER than one another. Do you know how many people I have destroyed through all of this? MANY, and it’s still working today, like a charm. People will KILL believing they are racially superior. They only way to escape me is Jesus, and I keep you distracted with everything else so you will never know him and make the people who try to warn you look crazy so you turn away and MOST people will refuse Him.
Now for my favorite part of all. Christians! Or the so called! I have worked tirelessly to destroy them, but they’re doing a great job of destroying themselves now! Where are these ‘Christians’ we speak of? Many ‘professing Christians’ walk, talk, and live JUST LIKE THE REST OF THE WORLD! YOU CAN’T EVEN TELL THE DIFFERENCE! These people actually think they’re saved when the Bible clearly teaches different! The bible teaches if you do not have Jesus’ spirit you are not even saved! The bible tells them how they can know if they have His Spirit at all. The bible instructs people to test themselves and see if they are even indeed saved!!! There is a new breed of Christianity out now that’s foreign to the bible. I created it because I love to twist scripture . I tell you once you are saved you are always saved, just do what you want to do! God loves you! I LOVE to twist the scripture of the sheep that will never be taken from Jesus’ hands! People didn’t read the parts that say if you love Him you will abide in Him, hate sin, and thus be able to know you are truly saved and are one of those sheep! I tell people, “He said if you just believe in Him you will have everlasting life”. Yes! Yes! That’s it! People stopped reading there and shut the book!
Jesus gave many instructions after that and warnings about FEW people entering heaven. He said that the road was narrow. He said you have to deny yourself, pick up your cross and follow Him. Well, I thought I’d make the narrow road a bit broader nowadays to make you more comfortable haha! I certainly don’t want anyone to surrender their lives to HIM, they’ll be unstoppable! I’m so glad most people won’t anyway; the bible say’s it’s the hard way. Many people don’t obey Him, consult with Him, or even submit to Him to know the purpose He has for their lives. Don’t feel bad, many ‘Christians’ wouldn’t know all of this because they don’t read the bible or even communicate with God like they actually believe He is real, and worthy of their respect. Just superficially. They’ll be really surprised at the end! I hope I can keep most of them fooled that long. The bible warned of the things to come, so that people could be warned and helped but many ‘Christians’ refuse to acknowledge what’s in the bible as if HE made a mistake in putting the information in there! They think what they don’t know won’t hurt them. YES! Please keep believing that! Jesus desired for His followers to be One, a family and you just know I can’t let that happen! I play on your insecurities and weaknesses to keep you in bondage and away from loving each other which is one of the greatest commandments! Many churches are fashion shows and teaching doctrines of demons. That’s a warning in the bible too. Sigh, this is just too easy…
My time is almost up and you better believe things are going to get much worse for you all! I work day and night with my army, to destroy. I never sleep. God is raising up many people in these last days to come against me and tell people the truth. TRUE FOLLOWERS OF THAT CHRIST. People are waking up and truly turning to Him! People are returning from Heaven and Hell and warning people. People are hearing from Him and receiving visits! People are SEEKING for HIM DAILY! I will stop at nothing to fool you, even with writing this letter. See it seems to be working pretty well for me to parade the truth in front of people. They don’t believe it anyway. I’m sure that will be the case with you also.
By Satan
Note: A must read by every Christian even though we do not know exactly the name of the person who wrote this message while you may freely think whether this is a good letter to remind us to always live in God’s Plan and Will or you have a free will to ignore it.
The recent Aaron Alexis incident is being used to justify the commitment and imprisonment of anyone who has been caught talking about the microwave surveillance that MK Ultra victims have been subjected to for life. It is being proclaimed that people who complain like this are very dangerous.
LOVE IS THE MOST POWERFUL FORCE IN THE UNIVERSE
GOD IS LOVE
It's difficult for me to communicate with you on a regular basis. I live in a small town and I don't have an internet connection at home. I use the local library to try and keep up with postings here at PEACEPINK. I know that these guys monitor the local library's internet activity and I don't want to give them access to my passwords. So I go to nearby libraries where it is more difficult for them to steal my passwords and this also makes it more difficult to kept in touch or reply to other members. I am so thankful to Soleilmavis and to Mr. Finch for all the hard work they are doing and others as well. Without PEACEPINK I would have no place to communicate and I would feel utterly hopeless.
I recommend the book "Cheating Justice" , by Elizabeth Holtzman. It should be at your local library.
Bing:
Transhumanism
Rewriting the DNA of solders
JASONS Advisory Group
Brookings Institute, " The Future of the Constitution"
"the angel and the whirlwind"
"The Most Approved Plan"
I thank all of you for giving me hope
Michael Benoit
Due to confusion by trolls, fakes, scammers, I eliminated from my friends two reals TI in 2012.
I humbly apologize to Michael Abi, Thea from Ireland and Annie S. Today I almost ban a real TI from Africa.
This is the result to be continuously attacked on our community even from scammers and annoying users. There is no recognition between us. How to fix my mistake of 2012?
The “Alien Tort Statute” – US Federal Law
A means of redress for survivors of human rights abuses
An ancient law, an avant-garde tool for human rights.
The Alien Tort Statute (ATS) is a U.S. federal law first adopted in 1789 that gives the federal courts jurisdiction to hear lawsuits filed by non-U.S. citizens for torts committed in violation of international law. When the ATS was drafted in the 18th century, international law dealt primarily with regulating diplomatic relations between States and outlawing crimes such as piracy, however international law in the 21st century has expanded to include the protection of human rights. In the 60 years from the signing of the Universal Declaration of Human Rights in 1948 to the present decade, universal human rights have moved from being an aspirational concept to a legal reality. This remarkable evolution gave the ATS renewed significance in the late 20th century. Today, the Alien Tort Statute gives survivors of egregious human rights abuses, wherever committed, the right to sue the perpetrators in the United States.
Since 1980, the ATS has been used successfully in cases involving torture, state-sponsored sexual violence, extrajudicial killing, crimes against humanity, war crimes and arbitrary detention. The Torture Victim Protection Act (TVPA), passed in 1991 and signed into law by President George H.W. Bush in 1992, gives similar rights to U.S. citizens and non-citizens alike to bring claims for torture and extrajudicial killing committed in foreign countries.
The Filartiga Precedent
The first case brought under the ATS for human rights abuses was Filartiga v. Peña-Irala. In 1976, the father of a young man who had been tortured and killed in Paraguay while in police custody witnessed one of his son’s torturers walking the streets of Manhattan. The father called the INS, who arrested the former Paraguayan officer for overstaying his visitor's visa. The father and sister then brought an ATS case against the officer, and in 1980, a U.S. federal court in New York upheld their claims, opening the door for future claims under the Alien Tort Statute.
Individual Accountability for Human Rights Violations
Since Filartiga, scores of ATS cases have been filed against individual perpetrators found in the United States. These cases are filed here in the U.S. because survivors of human rights abuses often have no way to seek justice in their home countries. For nations emerging from armed conflicts or authoritarian regimes, impunity for human rights violations can be an unfortunate fact of life. In some cases, compromised judicial systems or amnesty laws prevent the prosecution of these crimes. In others, those who committed atrocities still hold power.
Another factor can bar survivors from seeking redress: the perpetrators may have fled the country. It is estimated that 1,000 human rights abusers have found safe haven in the United States. For refugees and survivors trying to rebuild their lives here in the U.S., seeing their abusers living with impunity can be profoundly traumatic. The ATS provides a tool to expose these human rights abusers and deny them safe haven.
Corporate Accountability for Aiding & Abetting
Beginning in the mid-1990s, a new class of ATS suits emerged that aimed to hold multinational corporations accountable for complicity in human rights abuses. Although backlash from certain sectors of the business community unleashed heated criticism of this use of the ATS, attempts to repeal or attenuate the statute have failed. As of 2009, two corporate accountability cases—Doe v. Unocal and Wiwa v. Shell—have resulted in settlements where reparations to the survivors and their communities have played a important role. To date, however, no contested corporate ATS case has resulted in a jury verdict in favor of the plaintiffs.
U.S. Accountability for Torture
At the same time, a number of ATS cases have been filed against the U.S. government and its officials for the torture and abuse of detainees in the "war on terror". The majority of these cases have been dismissed on various grounds, although a handful remain on appeal as of 2009.
The Sosa Standard: The ATS in the Supreme Court
In the midst of the controversy surrounding the corporate and U.S. accountability suits, the Filartiga line of ATS cases was vindicated by the U.S. Supreme Court. In its 2004 ruling in Sosa v. Alvarez-Machain, the Court held that the ATS grants federal courts jurisdiction over claims based on specifically defined, universally accepted and obligatory norms of international law. In establishing this standard, the Court effectively gave the green light to the use of the ATS as a means of redress for severe human rights abuses.
» Read more about the Supreme Court’s ruling in Sosa.
THE GOALS OF OUR ATS WORK
The human rights cases that CJA brings in U.S. courts are civil lawsuits that result in an award of money damages for the plaintiff. They are not criminal prosecutions and they will not result in jail time for the defendant. However, our clients have made clear that these cases are important for reasons other than money.
Ending Impunity
Many survivors want to seek justice and to help put an end to the culture of impunity that exists in their home country.
Letting Survivors Speak
These cases give our clients the chance to tell their stories and the stories of those who did not survive. Speaking truth to power—especially in a court of law—can be tremendously empowering.
Exposing Human Rights Abusers
These cases can serve as a measure of punishment. Litigation exposes a perpetrator’s actions in a court of law and enters the evidence of past abuses into the public record. In this way, impact human rights litigation can play an important ‘naming and shaming’ function. Moreover, some ATS cases have directly led to perpetrators facing deportation. Even after deportation, the evidence produced in a trial can follow the perpetrator to his home country, where CJA works with local authorities to support criminal accountability proceedings.
Deterring Future Abuses & Denying Safe Haven
These cases can send a powerful message to government officials and military officers that no one is above the law. They will know that the U.S. will not give safe haven to human rights abusers.
Building Human Rights Law and Jurisprudence
Finally, it is important to note that human rights law – if it is to be effective – must be implemented on a national level, through domestic courts. Although the establishment of the International Criminal Court marks a vital step in the progress of international justice, national courts must play an central role in protecting human rights. ATS litigation has proven to be an effective way of developing a human rights framework in the U.S. legal system.
THE ELEMENTS OF AN ATS CASE
The Defendant: A Perpetrator Present in the United States
To bring a lawsuit against an individual, that person must be directly or indirectly responsible for the human rights violations and he or she must be personally served with the lawsuit while in the United States. In other words, the perpetrator must live in or visit the United States.
An Official or Person Acting Under Color of Law
In order to sue for most violations, the abuses must have been committed by a government official or a member of the security forces (the military, police, etc.), or by a person acting on behalf of, or together with, such authorities.
Corporations
Suits can be brought against corporations for involvement in human rights violations abroad, so long as the corporation had sufficient contacts with the U.S., acted together with a government entity or official and had sufficient control over the violations.
Heads of State and Diplomats
Within the United States, current heads of state (presidents, kings, prime ministers), foreign ministers or officials with diplomatic immunity cannot be held liable in a human rights lawsuit. However, once they leave office, heads of state and other officials are subject to civil lawsuits even for human rights abuses that they committed while in office.
U.S. Government Officials
ATS cases filed against U.S. government officials can face daunting legal challenges. Although ATS suits have been filed against U.S. officials for human rights violations, including torture and detainee abuse under the “war on terror”, Courts generally have rejected such suits on a number of legal grounds. Several suits have been dismissed under the political question doctrine and on grounds of sovereign immunity. In other cases, the U.S. government has invoked the state-secrets privilege. Under this legal doctrine, the government has traditionally been able to bar courts from hearing specific evidence that may threaten national security if made public. However, under the Bush administration, a broad interpretation of this privilege was invoked to summarily dismiss entire cases.
Through amicus briefs addressing these and other legal issues, CJA has been deeply engaged in this evolving area of the law. As these cases proceed, CJA will continue to work to ensure that the U.S. upholds the same standards of human rights accountability for its own officials as it does for officials of foreign governments.
The Violations: Torture, Extrajudicial Killing and Other Abuses
The ATS and TVPA permit suits to be brought only for the most serious forms of human rights violations. As explained above, the violations generally must have been committed by a government or military official or a person acting in an official capacity. Interestingly, this is one of the rare legal spheres where non-U.S. citizens have more rights than do U.S. citizens. Under the current law, U.S. citizens may only bring suit for two violations under the TVPA: torture and extrajudicial killing. Non-U.S. citizens have the option of bringing suit under the ATS for a wider range of violations:
- Torture
- Extrajudicial Killing
- Forced Disappearance
- Crimes Against Humanity
- Cruel, Inhuman or Degrading Treatment
- Prolonged Arbitrary Detention
- Genocide
- War Crimes
- Slavery
- State-Sponsored Sexual Violence & Rape
http://www.bethelministries.com/psychopaths.htm
http://www.bethelministries.com/psychopaths_are_not_human.htm
http://www.bethelministries.com/interview_with_a_psychopath.htm
http://lastdaysministry.com/interview_with_another_monobeing.htm
While I don't agree with some of the doctrines of the above websites, they do provide some interesting revelations concerning psychopaths.
Ok good people. Please be aware that Greg Gamache is trying to start back up his LAWSUIT SCAM once AGAIN it appears. Not claiming a lawyer yet but I suspect he will soon pretend he does have one. Take notice website still has a link to his old CONTRACT FROM ATTORNEY of pretense and that download is asking to send what you can as 'ATTORNEYS DON'T WORK FOR FREE' . He seems to pretend already that they have 100 people but well Greg likes to make up numbers in which to draw others in. Be aware good people. IN A WAY HE IS TORTURING MEMBERS OF THE COMMUNITY. HE KNOWS HIS LAWSUITS ARE GOING NOWHERE BUT THAT DOESN'T STOP HIM FROM TAKING ADVANTAGE OF THE TI COMMUNITY. THIS IS A FORM OF ABUSE AS HE KNOWINGLY IS OFFERING FAKE HOPE.
http://www.hackcanada.com/blackcrawl/index.html
some interesting stuff here
Black Crawling Systems Archives
"This is the stuff that will set you free. You better teach yourself about technology because nobody else is going to do it for you. Actually it's worse then that. Big gov and big biz don't want you to know what great systems they have cooking to control and manipulate us all. Step into one of these quality archives and read some of the info that has been created for you." — LØpht |
"L’ADFINPdCP se réjouit de ces mobilisations, mais, en contact quotidien avec les victimes, elle souhaite vraiment un signal fort des autorités pour la protection du citoyen...."
16 September 2013
中国受害者告全世界人民书
An Announcement To The Whole World By Chinese Victims Of Directed Energy And Psychotronic Weapons
(SEE BELOW FOR CHINESE VERSION)
DEAR SIR/MADAM
First of all, please permit us to introduce ourselves to you. We are some of the Chinese victims from dozens of regions and cities across China , who have been cruelly harassed tortured and persecuted in a covert way by the means of secret remote control on human body & brain. Among us, there are corporate employees, teachers, students, retirees and other intellectual workers and physical workers. Our suffering period ranges from several months till over 30 years.
Thanks to Internet that builds a bridge for us to know each other, and it is same sufferings bring us to work together.
A group of secret criminals who abuse their powers, arbitrarily use “the means of secret remote control on human body & brain”, illegally manipulate our bodies and brains covertly, and also cruelly torture and harass us psychologically and physically and persecute us days and nights so that a lot of victims live a very miserable and horrible life.
Secret criminals utilize the weapons of “secret remote control on human body & brain” and remotely influence us, and consequently our bodies suffer from “physiological diseases and physiological behaviors” caused artificially from their weapons such as aching, itching, coldness, hotness, trembling, unwell feeling and unhappiness, and so that our brains suffer harassments and tortures from “acoasma and hallucination”. Besides, criminals do all they could to shamelessly steal and indecently spread our privacy in our brains in a abnormal psychology and crazily do all they could to intimidate and humiliate victims. All these vices do a great harm us psychologically and physically. Therefore , some innocent victims was forced to hospitals especially for being forced to accept mental treatment, some innocent victims were forced to suicide because of intolerable secret tortures and insults, and others died of “strange fatal diseases” yielded by criminals secretly in a special trap.
Such secret crimes as the wide abuse of their powers, the illegal use of “the means of secret remote control on human body & brain” and illegal violation of fundamental human rights, have resulted horribly in atrocity or the unprecedented anti-human catastrophe of human rights technically. These crimes not only challenge severely Chinese constitution and laws, but also human conscience, the UN Charter and the Universal Declaration of Human Rights. It is NOT permitted by all the human beings at all!
Owing to the above-mentioned cases, Chinese victims jointly lodged “a collective complaint to Chinese President Hu Jintao” (please see attachment 1) on 3rd Dec. 2007, and emailed it to the Chinese Communist Party Central Committee, every ministries of the State Council, major news media and the legal community who we asked to deliver the complaints to Chinese President.
Subsequently, we jointly announced " An Open Letter to the Head of Chinese Secret Institution" on 5th May 2008.(Please see attachment 2)
Chinese Goverment has the undisputed responsibility to take an immediate investigation into the secret criminals who abuse their power, and to sternly punish them according to the clause of "the State respect and protect citizens' human rights" set out by Constitution of PRC China. However, unfortunately, so far we have not received any response on the issue.
The Universal Declaration of Human Rights (UN General Assembly passed and published Resolution 217A (III) on 10th December 1948) stipulates in the following relevant clauses that:
Article 3 Everyone has the right to life, liberty and security of person.
Article 5 No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.
Article 6 Everyone has the right to recognition everywhere as a person before the law.
Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
Article 19 Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
China is one of the creators of the United Nations, a permanent member of the UN Security Council, a member of UN Human Right Council and one of the signers of UN Covenant on Human Rights. Therefore, China should seriously observe and enforce the relevant rules of UN Universal Declaration of Human Rights.
At present, the quantity of victims are increasingly rising around the globe. Thousands of victims strongly demand for an investigation into the sinful Hi-tech crimes which covertly violate human rights worldwide. A large quantity of the stated facts reveal that these secret fascist criminals are the common enemies of all the human beings who use Hi-tech means to arbitrarily secretly violate human dignity and fundamental human rights. The crazy secret Hi-tech crimes heavily threat and violate the fundamental rights of human livings in the world.
Challenged by the unprecedented worldwide catastrophe of human rights and the severe crimes of damaging human beings, we urge an immediate actions in union and bravely fight against the gangs of secret fascist criminals! We must disclose the horrible crimes which are covertly damaging human beings, and put them into the Judge Courtroom in International Criminal Court!!
Journalist and elites worldwide have the responsibility to provide supports for victims, the lawyers worldwide have the responsibility to stand by and offer a legal aid to victims.UN Human Right Council has the responsibility to safeguard human rights and to protect thinking right, sleeping right, health right and living right of all the human beings. International Criminal Court at Hague has the responsibility to carry out an investigation into the crimes denounced by victims, and to charge these secret fascist,the criminals who severely violate fundamental human rights with the Hi-tech Crime and the Antihuman Crime through and according to the relevant legal proceedings.
We, Chinese victims, support resolutely the global campaign of " Ban the abuse and torture of secret MIND CONTROL/PSYCHOTRONIC WEAPONS/Remote Human manipulation" through our practical actions. We strongly appeal for the United Nations to immediately stop the abuse of the means of the secret remote control on human body & brain which are used to cruelly harass and torture and persecute covertly common citizens.
We strongly urge the UN Secretary-General Ban Ki-moon to do his solemn duty to protect fundamental human rights of the whole world, and hold a urgent international conference on the ban of abusing “the means of secret remote control on human body & brain" so as to protect the validity of the UN Charter and UN Declaration & Covenant on Human Rights. Also, we demand for European Commission for Human Right to immediately put Article 27 of A40005/1999 into practice.
We strongly urge global news media to stand out to support justice, and to take a deep careful investigation into the secret Hi-tech crimes, and to expose truly the sinful facts of secret fascist criminals to the global people.
We strongly urge global legal community to stand out to offer a legal aid to all the victims and support justice based on the UN Charter and UN Declaration & Covenant on Human Rights.
We strongly urge UN Human Right Council to take an urgent investigation into these secret fascist criminals who arbitrarily use “the means of secret remote control on human body & brain” which have been crazily violating fundamental human rights.
We strongly urge International Criminal Court to take an immediate investigation into our complaints, and to charge these secret fascist criminals who heavily violate fundamental human rights with the Hi-tech Crime and the Antihuman Crime, and to make a historic great contribution to guarantee the fundamental human rights of all the human beings!!
With best regards,
Yours Truly
CHINESE VERSION
尊敬的女士、先生:
我们来自中国各地数十个城市地区,是一些遭受“秘密遥控人体和大脑(精神)技术”武器残酷虐待折磨迫害和阴谋暗害的受害者。我们之中,有公司员工、教师、学生、退休职工,以及其他从事脑力和体力工作的普通平民。我们之中,受害的时间,短的仅几个月,长的则达三十多年。
网络使我们相识,受害的遭遇让我们走到了一起。
长期以来, 一帮滥用特权的秘密罪犯,肆无忌惮地使用“秘密遥控人体和大脑(精神)技术”,非法秘密控制我们的身体和大脑(精神),日夜不停地实施种种惨无人道的精神骚扰和肉体折磨迫害、阴谋暗害,致使许多受害者每天生活在无比痛苦的、生不如死的恐怖状况中。
他们使用“秘密遥控人体和大脑(精神)技术” ,遥控制造我们受害者身体内日夜交替出现:痛、痒、冷、热、颤抖、难受等人为的“生理疾病和生理行为”痛苦;遥控制造我们受害者的大脑(精神)日夜出现所谓的“幻听、幻觉”骚扰折磨痛苦。他们还竭尽无耻、卑鄙、下流的变态伎俩,窃取传播受害者大脑思维的隐私信息,并且,疯狂地对受害者进行秘密恐吓和种种人格侮辱。所有这一切,都给我们受害者的肉体和精神带来了无与伦比的巨大创痛,身心遭到极度的摧残和伤害。其中,有一些无辜受害者被诬陷并送进“精神病院”;另一些因无法忍受秘密折磨凌辱的痛苦而“自杀”;还有一些则被他们秘密制造身体内出现各种莫名其妙的“绝症怪病”而阴谋暗害,含冤死亡。
这样广泛的滥用“特权”,使用“秘密遥控人体(大脑)技术”,非法侵犯普通平民基本人权的秘密犯罪行为,在其技术性、恐怖性和反人类性上都已经成为中国和世界历史上空前的人权浩劫。这不仅是对中国宪法法律的严重挑战,而且,也是对人类良知、对《联合国宪章》和《人权宣言》的严重挑战,是全人类所绝对不能允许的!
为此,我们中国受害者于2007年12月3日,联名写了一封“致胡锦涛主席的集体控诉信” ( 见“附件一” ),并用电子邮件发送给了中共中央和中国国务院各部门,以及全国新闻媒体和法律界人士等,要求转呈给中国国家主席。
接着,在2008年5月5日,又联名发出了一封《致中国“秘密机构”头头的公开信》( 见“附件二” )。
毫无疑问,中国政府有责任按照中国宪法载明的:“国家尊重和保障公民人权”等法律条款,立即调查并严惩这帮滥用特权的秘密罪犯。然而,遗憾的是,我们受害者所进行的这些揭露控诉努力,并没有得到应有的重视和回应。
《世界人权宣言》(联合国大会 一九四八年十二月十日 第217A(III)号决议通过并颁布) 的有关条款规定:
第三条|
人人有权享有生命、自由和人身安全。
第五条
任何人不得加以酷刑,或施以残忍的、不人道的或侮辱性的待遇或刑罚。
第六条
人人在任何地方有权被承认在法律前的人格。
第十二条
任何人的私生活、家庭、住宅和通信不得任意干涉,他的荣誉和名誉不得加以攻击。人人有权享受法律保护,以免受这种干涉或攻击。
第十九条
人人有权享有主张和发表意见的自由;此项权利包括持有主张而不受干涉的自由,和通过任何媒介和不论国界寻求、接受和传递消息和思想的自由。
中国是联合国的创始国之一;中国是联合国安理会常任理事国;中国是联合国人权理事会成员;中国也是联合国有关《人权公约》的签署国之一。因此,中国理应严格恪守、认真执行“联合国人权宣言”等有关维护公民人权文件的规定。
现在,世界各国的受害者数量呈现越来越多之势。成千上万的受害者强烈要求对目前正在全世界范围内发生的这一罪大恶极的侵犯人权事件进行调查。从大量揭露出来的事实表明,这些恣意践踏人类尊严和基本人权的秘密法西斯罪犯是全人类的共同敌人。他们这一疯狂的秘密罪恶正在严重威胁和侵犯着全世界人民最基本的生活和生存权利。
面对这一空前的世界性人权浩劫,全世界人民必须紧急行动起来,团结一致,同仇敌忾,与这帮秘密法西斯罪犯进行坚决斗争!认清他们的秘密罪恶面目,揭露他们秘密侵犯、残害人类的滔天罪行,将他们押上国际刑事法庭的审判台!!
全球所有的新闻媒体和有识之士有责任向受害者表示声援支持;世界各国的法律界人士有责任挺身而出,为受害者提供法律援助;联合国人权理事会有责任捍卫人权,维护全人类的思想自由权、睡眠休息权、身体健康权和生命生存权;联合国海牙国际刑事法院有责任接受和调查受害者提起的诉讼,并将这帮严重危害人类基本权利的秘密法西斯罪犯绳之以法!!
我们中国受害者,以自己的实际斗争行动,坚决支持“禁止使用秘密遥控人体(大脑)技术武器”滥施于民的世界性运动;坚决要求联合国制止这一使用“秘密遥控人体(大脑)技术”武器针对普通平民,实施秘密肉体和精神残酷虐待折磨迫害的滔天罪恶。
我们强烈要求联合国秘书长 潘基文 先生从维护“联合国宪章”及有关“人权宣言和公约”的尊严出发,履行自己维护全世界人民基本人权的神圣职责,紧急召开“禁止使用秘密遥控人体(大脑)技术武器”的国际会议。我们要求欧盟人权委员会立即开展其A40005/1999第27款的工作!
我们强烈呼吁世界各国新闻媒体挺身而出,主持正义,对众多的受害事件进行深入认真调查,并真实地向全世界公众揭露曝光这帮秘密法西斯罪犯的罪恶事实真相!
我们强烈呼吁全世界的法律工作者勇敢地站出来,以“联合国宪章”和有关“人权宣言和公约”为依据,对受害者提供法律援助,替所有受害者伸张正义!
我们强烈要求联合国人权理事会,对这种滥用特权,肆无忌惮地使用“秘密遥控人体(大脑)技术”,丧心病狂地侵犯人类最基本人权的秘密法西斯罪恶行为,立即进行紧急国际调查!
我们强烈要求“国际刑事法院”,对受害者的控诉立即立案调查,并依据联合国有关“维护人权”的文件法规,将这帮凶恶的秘密法西斯罪犯押上国际刑事法庭提起公诉,为保障人类的基本人权做出历史性的贡献!
附件(一):致胡锦涛主席的集体控诉信》
尊敬的胡锦涛主席:
我们是一些被“秘密遥控人体和大脑(精神)技术” 折磨迫害的受害者。网络使我们相识,受害的遭遇让我们走到了一起。
我们集体向您——胡主席进行强烈控诉!!
在现今的中国,有着一帮无法无天的秘密罪犯。
长期以来,他们恣意践踏宪法尊严,非法侵犯中国公民人权,肆无忌惮地使用“秘密遥控人体和大脑(精神)技术”,对受害者的身体和大脑(精神)日夜不停地实施种种秘密控制骚扰,惨无人道的进行折磨迫害和阴谋暗害,致使许多受害者每天生活在极为痛苦恐怖的精神状况中生不如死,身心遭受极度的摧残和伤害。不少受害者因他们制造出的各种莫明其妙的怪病而无辜冤死。
这种秘密“遥控技术手段” 包括:制造我们身体内日夜交替出现:痛、痒、冷、热、颤抖、难受等人为的“生理疾病和生理行为”痛苦;制造我们的大脑(精神)日夜出现被遥控的所谓“幻听、幻觉”的骚扰折磨痛苦。他们还竭尽无耻、卑鄙、下流的变态伎俩,窃取传播受害者大脑思维的隐私信息,并且,疯狂地对受害者进行秘密恐吓和种种人格侮辱。所有这一切,都给受害者的肉体和精神带来了无与伦比的巨大创痛!
由此,造成我们中的许多受害者如今在工作单位受到了极不公正的对待:有的受到严重岐视;有的被剥夺了工作权利,失去了生计。一些受害者向公安司法部门报案时,也被错认为“精神有问题”而不予理睬。同时,也给我们的家庭带来了极其严重的损害,使不少受害者的家庭因此而出现裂痕,甚至造成家破人亡的惨痛后果。
据不完全的网络统计,在我国,现今公开站出来揭露曝光的受害者已有几百人之多。而更多的受害者正在逐步认清这帮秘密罪犯的“庐山真面目”,积极加入到揭露曝光他们罪恶的战斗行列来。
这种无法无天的秘密恐怖犯罪行为的泛滥,正在引发广泛的社会恐慌,给整个社会的稳定与和谐带来严重的破坏。这种伤天害理的秘密恐怖犯罪行为的泛滥,必将对国家、对民族造成巨大的危害!
而这样广泛的滥用“特权”,非法侵犯公民人权的秘密犯罪行为,在其技术性、恐怖性和反人类性上都已经成为中国和世界历史上空前的人权浩劫。毫无疑问,这是对人类良知、对法律的严重挑战,是国家的宪法和法律所绝对不能允许的!
中华人民共和国宪法第三十三条法定:凡具有中华人民共和国国藉的人都是中华人民共和国公民。
中华人民共和国公民在法律面前一律平等。
国家尊重和保障公民人权。
中华人民共和国宪法第三十八条法定:中华人民共和国公民的人格尊严不受侵犯。禁止用任何方法对公民进行侮辱、诽谤和诬告陷害。
中华人民共和国宪法第五条法定:中华人民共和国实行依法治国,建设社会主义法治国家。
国家维护社会主义法制的统一和尊严。
一切法律、行政法规和地方性法规都不得同宪法相抵触。
一切国家机关和武装力量、各政党和各社会团体、各企业事业组织都必须遵守宪法和法律。一切违反宪法和法律的行为,必须予以追究。
任何组织或者个人都不得有超越宪法和法律的特权。
中华人民共和国民法第九十八条法定:公民享有生命健康权。
然而,这帮秘密罪犯,根本无视《宪法》等这些法律条款规定,有恃无恐地凌驾于法律之上,滥用手中掌握的所谓“特权”,丧心病狂地对广大受害者的身体和大脑(精神)进行摧残式的秘密遥控折磨骚扰迫害,恣意蹂躏剥夺受害者的思想自由权、休息睡眠权、身体健康权等公民基本人权;无耻地侵犯侮辱受害者个人所有的隐私和人格尊严……。
我们受害者在他们的日夜秘密控制折磨中倍受煎熬,“唤天天不应,唤地地不灵”。在这种极度痛苦,举目无助情况下,才不得不集体向您投诉控告。敬请胡主席您能体察民苦民愤,为民做主。
据悉,在当今世界上,俄罗斯、美国以及欧盟等许多国家和地区,都不同程度地制订和正在制订一些具体的决议或法规,明确制止这种“秘密遥控人体和大脑(精神)技术武器”对普通平民实施秘密酷刑虐待折磨迫害。如俄罗斯议会的“决议” 就是一例。
(http://www.geocities.com/capecanaveral/campus/2289/webpage.htm)
(http://mindjustice.org/1-02-6.htm)
在此,我们强烈要求国家紧急立法,制订更具体的法律法规,坚决制止这种滥用“秘密遥控人体和大脑(精神)技术”手段,悍然对公民的身体和大脑(精神)实施疯狂骚扰折磨迫害的秘密恐怖犯罪行为!!
这种滥用”特权”的无法无天秘密恐怖罪行,是疯狂的秘密“违反宪法和法律的行为”!我们强烈要求国家从“尊重和保障公民人权”的法律出发, 坚决“必须予以追究”这帮秘密犯罪分子的刑事责任,挖除这些“秘密毒瘤”,将他们绳之以法!为建立一个法治的和谐社会铺平道路!!
此致
敬礼!
受害者:(签名)
中国受害者告全世界人民书
秘密脑控试验—人类生存基本价值被破坏MK-Ultra类秘密试验(脑控试验)常常在试验目标(受害者)不知情或者不同意的情况下进行的。脑控很容易让受害者精神不正常。加拿大巴士杀人案的李伟光就是脑控秘密试验受害者。
脑控常常涉及微小芯片植入到大脑和身体的其它部位,常常用电磁波作为激发的能量,是RFID和晶振技术的充分应用,不需要传统电池。部分只做控制试验的受害者们身体里没有芯片。脑控涉及定向能(Directed Energy),例如X-射线、微波信号和穿墙高能微波。定向能试验的方式非常隐蔽,可能会产生致命的效果。静态造影如MRI和CT可以造假。
Victim几乎都不知道自己是试验目标。一般症状例如,催眠,剥夺正常睡眠,诱导腹泻,诱导分神,产生头痛及其他部位的疼痛,诱导情绪变化等等。受害者往往将异常归结为普通的健康问题,他们常常不认为他们自己是Victim。
各国特工之间往往互相合作。有人在中国成为受害者,在加拿大继续受到试验,那往往就是中加特工在合作脑控。移民很可能成为脑控的几内亚猪。脑控试验不仅从身体上直接打击受害者,而且使用技术手段来破坏一个人的精神心理。脑控常常被用来暗害敌人,并且能杀人于无形,例如杀死主神经和制造癌症,特别是肺癌。
“Lida”技术:脉冲射频发射器,可以导致严重的疲劳和昏睡,或者失眠。可以穿墙瞄准目标发射. LIDA技术在1950年代由苏联发明,后来在各国得到了发展。声音直达大脑(Voice to skull)技术:可以传送说话声和其它声音,直达目标的头部,旁边的人听不到,可以穿过墙壁发射。该技术可以在没有脑控芯片的情况下实现。(该技术的美国军方代号是“V2K”。)
读取和破解脑波:通过高科技脑控激励芯片(或特定的帽子)来读取受害者的脑波,通过无线传输到附近的接收设备。再过滤出特定的波形来破解受害者的思维和记忆。这项技术已经非常先进。
意念传输:(Thoughts Transmission) 通过无线传输特定的脑控波曲线到受害者的大脑,实现意念的传输,一般需要有脑控微芯片植入在受害者的大脑。意念传输也叫潜意识(subliminal)传输,例如“受辱感”,能破坏人际关系。默念传输:(Subvocal Transmission) 通过电磁波传输来影响受害者的说话器官和抑制思维器官,来影响受害者说话。这种话不经过大脑的思考说出,特别细心的受害者能够发现。这种传输可以通过脑控激励芯片(又叫脑控钉)或不用脑控激励芯片进行。受害者的主要特点是说话不经过思考或者说错话。武器化的微波技术:可以导致一系列的身体的伤害反应,可以悄悄地,穿过墙壁进行。穿墙雷达扫描技术(例如机场安检。)高级无线计算机控制技术:通过探测主板的特定的电磁辐射和向特定的线路端子发射X波段电磁脉冲,实现输出和输入。相当于别人的计算机通过串口连到了你的计算机。在没有无线网卡的情况下就能够实现无线遥控计算机。潜意识“无声的声音”(Subliminal “Silent Sound”) 设备:可以传送催眠式建议到受害者,但受害者耳朵听不到,声波的频率介于超声波和人可听声波之间。
(二)受害者们总结的常见的身体症状和经验:(在读取和破解脑波阶段,受害者们通常没有严重的症状,但是他们至少有一颗芯片在身体里面,部分只做控制试验的受害者们身体里没有芯片。)• 头皮发麻。头晕, 头痛。
• 无理由的极度疲劳,腿肌及关节的酸痛。
• 梦境制造和操纵,剥夺睡眠。
• 电击感以及肌肉的振动和抽动。
• 不通过思考的说话 (subvocal transmission),语言能力受到影响,经常结结巴巴。
• 没有道理的出现心跳过速和过缓。• 记忆力减退,记忆消失 。
• 强迫肌肉收缩和舒张,由调制神经信号所引起,会导致身体和四肢移动。/模拟脑波产生情绪突变。
• 烧灼皮肤,身体的不同部位出现烧灼感或出现不明切口。
• 脸色变暗,头发变稀。 (与信号发射有关)• 与声音交谈,听见声音(Voice to skull, 美国军方代号V2K。)
•不能集中注意力。/眼睛发花。
• 物体振动,如门、窗户、床和椅子(由声波脉冲或芯片模拟所引起。)。• 电子产品的被控制现象,包括计算机、电视机、汽车和家用电器。(例如电视机自动打开或关闭,由电磁脉冲波所引起)
中国受害者签名:
With best regards,
Yours Truly
南京 忻中庆 13776686557 zwt762000@yahoo.com.cn http://blog.sina.com.cn/xdj88
云南 王荣海 15008719951 baiyun024@vip.qq.com
湖南 李春泽 13435768567 myinno@126.com
丹东 高晓维 13898510756 cwzpp@yahoo.cn
上海 郁荣建 13120847702 ayeeyo1226669043@yahoo.com.cn
襄樊 喻峰 13995768279 yunfan201@sina.com
桂林 易胜林 13978302663 yfsb987@sina.com
北京 张蕾 13691103510 zlvever@yahoo.cn
湖北 刘炜 13597878369 liuw71@163.com
上海 余灵波 13321981271 lingbo-yu@163.com
山东 祁昌玲 15154602071 635602318@qq.com
广州 蒋进 13535358871 65141399@qq.com
湖南 郭汝泉 15974413876 guoruquan163@yahoo.com.cn
江苏 孙玮 13917698052 108322515@QQ.com
四川 郑芸 13559949568 854195278@qq.com
浙江 曹世杰 0576-86814070 847654242@qq.com
福建 甘志恒 (0596)2302076 gzhxwq.xwqgzh@yahoo.com.cn
辽宁 石宇 0410-2828530 minamijie@163.com
河北 李冠萍 0310-2326981 ligp741212@163.com
郑州 赵枫 13903863768. zfhb369@yahoo.com.cn
湖南 范丽 13646218013 fan0769@yahoo.cn
广西 邱勇进 0778-2565332 qyjcvn@sina.com
珠海 张路 15812708601 jamesroad9@sina.com
烟台 孙波 15064528015 dcxq@tom.com
安庆 周连宏 13685568645 372330036@163.com
江西 赖启星 13712207193 lgs369369@163.com
驻马店 沅元 13525333332 aney0011@yahoo.cn
四川 陈小意 15982732725 babyhl@vip.qq.com
湖北 龙伟 13469765313 longwei_312657421@qq.com
州 裴维传 13033539006 105118758@qq.com
黑龙江 张晓亮 13634601784 928318548@qq.com
南宁 黄鄯兵 843622736@qq.com
Germany Wenxiu Zhou +49 162 7550 955 zhouwenxiu@yahoo.com
荆州 张四海 15927724461 739394881@qq.com.cn
宜昌 王洋 13307203797 972188722@qq.com
秦皇岛 马欣岚 13230383403 yunzhongyu546@163.com
江西 熊璐 0795-7032879/7585069 615806775@qq.com
徐州 白露 13685161290 bailu8585@sina.com
福建 林振 283704958@qq.com
李选忘 tonyqq66@yahoo.cn
昆明 马超 18536361@qq.com
安徽 彭宜杉 13275779355 pys624@126.com
南京 陈世伟 13211355448 329588460@qq.com
上海 刘华茗之 13818051167 274735961@qq.com
湖北 张承柱 13545372812 793556424@qq.com
湖南 朱卓雄 13187326593 514546363@qq.com
贵州 心语 865403168@qq.com
湖北 任丹婷 13872825547 420663268@qq.com
河北 狄曼琦 zheduandechibang2008@yahoo.cn
吉林 王雅清 13894726370 picture_window@hotmail.com
福建 陈媚 0595-87058567 234824602@163.com
辽宁 刘威 13842729284 liuweiruanjian1986@yahoo.com.cn
Nanjing Xin Zhongqing 13776686557 zwt762000@yahoo.com.cn (http://blog.sina.com.cn/xdj88)
Yunnan Wang Ronghai 15008719951 baiyun024@vip.qq.com
Hunan Li Chunze 13435768567 myinno@126.com
Dandong Gao Xiaowei 13898510756 cwzpp@yahoo.cn
Shanghai Yu Rongjian 13120847702 ayeeyo1226669043@yahoo.com.cn
Xiangfan Yu Feng 13995768279 yunfan201@sina.com
Guilin Yi Shenglin 13978302663 yfsb987@sina.com
Beijing Zhang Lei 13691103510 zlvever@yahoo.cn
Hubei Liu Wei 13597878369 liuw71@163.com
Shanghai Yu Lingbo 13321981271 lingbo-yu@163.com
Shandong Qi Changling 15154602071 635602318@qq.com
Guangzhou Jiang Jin 13535358871 65141399@qq.com
Hunan Guo Ruquan 15974413876 guoruquan163@yahoo.com.cn
Jiangsu Sun Wei 13917698052 108322515@QQ.com
Sichuan Zheng Yun 13559949568 854195278@qq.com
Zhejiang Cao Shijie 0576-86814070 847654242@qq.com
Fujian Gan Zhiheng (0596)2302076 gzhxwq.xwqgzh@yahoo.com.cn
Liaoning Shi Yu 0410-2828530 minamijie@163.com
Hebei Li Guanping 0310-2326981 ligp741212@163.com
Zhengzhou Zhao Feng 13903863768 zfhb369@yahoo.com.cn
Hunan Fan Li 13646218013 fan0769@yahoo.cn
Guangxi Qiu Yongjin 0778-2565332 qyjcvn@sina.com
Zhuhai Zhang Lu 15812708601 jamesroad9@sina.com
Yantai Sun Bo 15064528015 dcxq@tom.com
Anqing Zhou Lianhong 13685568645 372330036@163.com
Jiangxi Lai Qixing 13712207193 lgs369369@163.com
Zhumadian Yuan Yuan 13525333332 aney0011@yahoo.cn
Sicuan Chen Xiaoyi 15982732725 babyhl@vip.qq.com
Hubei Long Wei 13469765313 longwei_312657421@qq.com
Xuzhou Pei Weichuan 13033539006 105118758@qq.com
Heilongjiang sky 13634601784 928318548@qq.com
Nanning Huang Shanbing 843622736@qq.com
Germany Wenxiu Zhou +49 162 7550 955 zhouwenxiu@yahoo.com
Jingzhou Zhang Sihai 15927724461 739394881@qq.com.cn
Yichang Wang Yang 13307203797 972188722@qq.com
Qinhuangdao Ma Xinlan 13230383403 yunzhongyu546@163.com
Jiangxi Xiong Lu 0795-7032879/7585069 615806775@qq.com
Xuzhou Bai Lu 13685161290 bailu8585@sina.com
Fujian Lin Zhen 283704958@qq.com
Li Xuanwang tonyqq66@yahoo.cn
Kunming Ma Chao 18536361@qq.com
Anhui Peng Yishan 13275779355 pys624@126.com
Nanjing Chen Shiwei 13211355448 329588460@qq.com
Shanghai Liu Huamingzhi 13818051167 274735961@qq.com
Hubei Zhang Chengzhu 13545372812 793556424@qq.com
Hunan Zhu Zhuoxiong 13187326593 514546363@qq.com
Guizhou Xin Yu 865403168@qq.com
Hubei Ren Danting 13872825547 420663268@qq.com
Hebei Di Manqi zheduandechibang2008@yahoo.cn
Gilin Wang Iacing 13894726370 picture_window@hotmail.com
Liaoning Liu Wei 13842729284 liuweiruanjian1986@yahoo.com.cn
XU, Yan (Hong Kong) Mobile: (+852) 98501119; Office (+852)27666572; Home (+852) 27742824
TSANG, Yuk Lam (Hong Kong) Tel:(+852)****1307
LI, Xiao Na (Beijing) Mobile: (+86)13718204206
YU, Rong Jian (Shanghai) (+86)13120847702 ,
YE, Guo Zhao (Shanghai) Mobile: (+86)13816428606
ZHOU, Xiao Jiang (Shanghai) Mobile: (+86)13564968621
ZHANG, Hong (Shanghai) Mobile: (+86)13818941950
YU, Ling Bo (Shanghai) Mobile: (+86)13321981271
GAO, Xiao Wei (Dandong City, Liaoning Province) Mobile: (+86)13898510756
YU, Xiao Wei (Yunnan Province) Mobile: (+86)13628872885
WANG, Rong Hai (Yunnan Province) Mobile: (+86)15008719951 ,
GAO, Rui Qiang (Inter-Mongolia SAR) Mobile: (+86)15847178974,
XI, Zhong Qing (Nanjing City) Mobile: (+86)13776686557
KE, Jian Cheng (Nanjing City) Mobile: (+86)15850554926
REN, Jun Jun (Nanchang City) Mobile: (+86)13767158887
WANG, Ya Qing (Jilin Province) Mobile: (+86)13894726370
LI, Song Lin (Jilin Province) Mobile: (+86)13064465176
LUO, Qin Jun (Sichuan Province) Tel: (+86)817-2515184
ZHENG,Yun(Sichuan Province) Mobile: (+86)13559949568
JI, Wang (Dalian City, Liaoning Province) Mobile: (+86)15940925971
LI, Chao(Tianjin) Mobile: (+86)13072085730
ZHOU, Lian Hong (Anqing Anhui Province) Mobile: (+86)13685568645
HAN, Bing (Anhui Province) Tel: (+86)559-6534219
ENG,Yi Shan (Anhui Province) Tel: (+86) 13275779355
CHEN, Da Song(Anhui Province) Tel: (+86)563-2210350
WANG, Wei Kang (Anhui Province) Mobile: (+86)13067635771
WANG, Yang(Yichang City, Hubei Province) Mobile: (+86)13307203797
QI, Chang Ling (Shandong Province)Tel: (+86)546-8597279 ,
GU, Lu Lu (Guangdong Province) Mobile: (+86)13268018561
PENG, Xu (Guangdong Province) Mobile: (+86)13533298544
GUANG, Yu You (Guangdong Province)Tel: (+86)768-2252948
LUO, Jian Bo (Guangdong Province) Mobile: (+86)13226449087
JIANG, Jin (Guangzhou City, Guangdong Province) Mobile: (+86) 13535358871
QIU, Yong Jin (Guangxi Province) ****2565332
PEI, Wei Chuan (Xuzhou City, Jiangsu Province) Mobile: (+86)13033539006
PENG, Jin(Chengdu City, Sichuan Province) Mobile: (+86)13568819725; ?
CHENG, Guang Hui (Xinjiang Province) Tel: (+86) 997-4960621
LOU, Yan Hang (Hangzhou City, Zhejiang Province) Tel: (+86)469 5628422 ,
LUO, Xiao Bo (Hangzhou City, Zhejiang Province) Mobile: (+86)13906527643 ,
CAO, Shi Jie (Zhejiang Province) Tel: (+86)576-86814070
YI, Sheng Lin (Guiling City, Guangxi Province) Mobile: (+86)13978302663
SUN, Wei (Jiangsu Province) Mobile: (+86)13917698052 ,
XIONG, Lu (Jiangxi Province)Tel: (+86) 795-7032879/7585069,
LI, Guan Ping (Hebei Province)Tel: (+86)310-2326981
CAI, Ya Li (Hebei Province)Tel: (+86)3118650280
INFORMATION IN CHINESE
粉红和平 - CHINA – PEACEPINK
WEB: https://peacepink.ning.com/ http://groups.google.com/group/soleilmavis (IN CHINESE)
Welcome to join 欢迎加入 https://peacepink.ning.com/
Here is a group for members who speak Chinese
以下是一个专门为说中文的受害者设的讨论组
https://peacepink.ning.com/group/chinese
受害博客
http://guopeixi167.blog.163.com/ http://mcvictimsworld.ning.com/profile/wixngpynodinb
CHINA – MINDCONTROL http://worldvictimsofstalkingsupportunion.webs.com/ http://mindcontrol.com.cn/ http://blog.sina.com.cn/u/2769498521
鉴于精神侵害技术的现实存在亟需新的精神疾病诊断标准 http://user.99114.com/225990/Cooperate_643954.html
PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL: tijohnfinch@gmail.com,MCmailteam@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile
TARGETED INDIVIDUALand a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION
Im looking for any peace pink members that are members of the church of christ
like me
hannum@usa.com
The experience of “Artificial Telepathy” is really not that extraordinary. It’s as simple as receiving a cell-phone call in one’s head.
Indeed, most of the technology involved is exactly identical to that of cell-phone technology. Satellites link the sender and the receiver. A computer “multiplexer” routes the voice signal of the sender through microwave towers to a very specifically defined location or cell. The “receiver” is located and tracked with pinpoint accuracy, to within a few feet of actual location. But the receiver is not a cell phone. It’s a human brain.
Out of nowhere, a voice suddenly blooms in the mind of the target. The human skull has no “firewall” and therefore cannot shut the voice out. The receiver can hear the sender’s verbal thoughts. The sender, in turn, can hear all of the target’s thoughts, exactly as if the target’s verbal thoughts had been spoken or broadcast. For this reason, the experience could be called “hearing voices” but is more properly described as “artificial telepathy”.
Now, if artificial telepathy were entirely voluntary, like a conversation between friends sitting across the room from one other, it might be kind of cool. One could talk back and forth with one’s friend, exchanging verbal thoughts exactly as if speaking on the phone, but without ever using one’s voice or mouth. It’s a completely silent, subvocal form of speech. Between lovers, this would be beautiful.
The problem is that artificial telepathy provides the perfect weapon for mental torture and information theft. It provides an extremely powerful means for exploiting, harassing, controlling, and raping the mind of any person on earth. It opens the window to quasi-demonic possession of another person’s soul.
When used as a “nonlethal” weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protestors, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon.
Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. Embarrassing private moments cannot be hidden: they are subject to all manner of hurtful comments and remarks. Evidence can be collected for blackmail with tremendous ease: all the wrongs or moral lapses of one’s past are up for review.
Like a perverted phone caller, a hostile person with this technology in hand can call at any time of day, all day long. Sleep can be disrupted. Prayers can be desecrated, religious beliefs mocked. Business meetings can be interrupted, thoughts derailed. Love can be polluted, perverted, twisted, abused. Dreams can be invaded, fond memories trashed.
The attacker cannot be seen or identified, the attack cannot be stopped, and the psychological damage is enormous. But there is no physical damage, not one single mark is left on the body and there is absolutely no proof that any crime or any violation ever took place! Everything that “happens” to the victim happens inside the victim’s head. What physical evidence is there to give the police? Without physical evidence, how can one photograph the “crime scene” or fingerprint the stalker? There are no footprints leading to or from the scene. Indeed, there is no physical scene at all, and no evidence that an attack ever took place.
Most people who experience this abusive form of “artificial telepathy” feel as if their mind has been raped. They find themselves hunted, stalked, harassed and abused by a person or persons who refuse to give their names, who defile one’s mind with the most foul and perverse language imaginable, and who refuse to hang up or go away. The caller or callers delight in the perverse and sadistic torture of their targets. Furthermore, they delight in violating the privacy of their targets, reading the target’s mind and commenting on everything the target thinks, in an effort to demonstrate as brutally as possible that the target has no privacy at all.
The callers act, in short, exactly like rapists or perverted stalkers. Imagine what a man might do if he found a “magic cell phone” that allowed him to dial into the heads and the private thoughts of anyone on earth. The temptation to choose a target at random and start spying on or abusing that person would be enormous, almost irresistable. It could become a sick and twisted hobby, a guilty pleasure very quickly. Put into the hands of a secret police unit, the potential for abusing such technology is even more chilling.
Now, the natural reaction of a normal and intelligent person who undergoes the horrible experience of mind rape for the first time is to panic and reach for a real phone. They call family, contact their doctor or call police with a bizarre complaint that “someone is beaming voices into my head.”
But if the police are the ones behind the abuse, the victims aren’t going to get much help, are they? And if the police are not the perpetrators, then how are they to make an arrest? It’s much more convenient and easy to believe that the caller is a nutcase.
In short order, the victim of mind rape finds herself or himself undergoing the additional humiliation of being carted off to the psych ward, often being committed involuntarily by a loved one “for one’s own good.”
The more vehement the efforts to prove that the voice or voices in one’s head are “real”, the more smug become the smiles of the medical doctors, who gently insist that such technology does not exist, that the voices cannot possibly be real, and that one must take a powerful psych med and lie down for a good long rest.
The experience of “hearing voices” — especially voices that give a running stream of negative abuse — will gain one automatic admission to the rubber room. Indeed, hearing voices is a classic example of schizophrenia. If you hear voices, you are, by definition, crazy.
Yet when released from the psych ward with an expensive supply of meds, “voice hearers” often find that the meds are ineffective — exactly as one would expect if their problem had nothing to do with brain chemistry and everything to do with a bio-electronic attack by unseen stalkers.
Voice hearers often puzzle psychiatrists, because many of them don’t fit the classic model of schizophrenia, which usually begins onset in the early twenties. The victims of “artificial telepathy” are often well into their thirties or fourties and many have no prior history of serious mental illness or drug abuse. Many seem to be alert, healthy, and rational even while insisting that they can hear voices. They agree with the psychiatrists that, yes, they are depressed, but who wouldn’t be a bit depressed under such trying circumstances? To be stalked and verbally bullied every waking hour of the day is a form of mental torture.
Victims of mind rape quickly learn not to discuss their “psychological problems” with family and coworkers. It’s embarrassing, it’s bizarre, it gets very little sympathy and only serves to alarm most people. The only way that another person can “help” is to suggest that the mind rape victim see a psychiatrist, who will promptly double one’s dose of psych meds and antidepressants. The result is a very stiff medical bill, which only adds financial pain to the mix. And the verbal harassment continues.
As they learn to endure their daily torture, voice hearers can usually return to mainstream life, where they are able to carry on intelligent, coherent conversations, hold down jobs, and function quite normally. In fact, if they don’t discuss their “problem” they usually can’t be told apart from normal people on the street. Because they are normal people.
The growing number of voice hearers in our society is therefore well masked. Those who continue to insist that there is a “secret society of people beaming voices into our heads” are simply laughed into silence or labelled paranoid schizophrenics. They are completely discredited. In fact, many voice hearers have internalized the idea that they are mentally ill, and they struggle to understand how their “auditory hallucinations” could continue to seem so very, very real.
Naturally, many of these voice hearers are deeply confused. They turn to support groups, including such on-line communities as the Voice Hearers’ support group at Yahoo.com.
Anyone who doubts that “artificial telepathy” exists need only contact such a Voice Hearers community, where they will encounter people who continue to insist that they are being harassed by real people using an unknown or unexplained technology.
Surprisingly, there is a tremendous amount of scientific literature and circumstantial evidence to back up that claim.
In the following posts, we will explore the history of synthetic telepathy and learn the names of the scientists who developed this sinister technology. We will also identify and examine some of the government agencies that are fielding and using this weapon of torture against innocent civilians.