see when it started people did not get hurt untill they wanted to steal stuff and make money on it
All Posts (12216)
Sort by
see when it started people did not get hurt untill they wanted to steal stuff and make money on it
most of these chips are mind controal s it's done through computer programming and mind controal it's all the chips do. see they need to stay tuned into the people to make it work. it means they need to connect to you some how.
alot are hearing first names and it's becouse they are cutting words out trying to make it like thy can choose what i say. so if there is proof the government and police involved they hope they get away with it all these frequencies are mixed recall me talking about Underhand ?
They got 1 frequencie to listen and stuff with a few guy on it. then another to listen then they use first names on the other to start trouble the government would like you to kill one another. every one wants to claim it's a program and i got a feeling that the government is doing it all the time and haveing something to launch the program they say it's 2 people if there are 2 people and 2,000 listening why are they all hearing a few voices becouse of the voice synthsizer and i figure the system that keeps me on it is in the pawtucket police department or close by this is why they do not shut the chips off becouse there afraid to get cought.
See i always hear them changeing my words all day long to day there word is your dead and there saying im saying this as i hear them in my head.
These guys got a words list keywords to use to piss people off. and they mix it with racial coments.
these guys try to get others in fights and double talk people.
They try to get people to respond then try to get them to talk to people. some of these guys try to make it look like someone has there wife or familey member. This is what and say to others while they are doing things themself. so we got mixed people on here. if they blaim one or 2 people they forgot to look at the others some use a technologie to hide themself.
what would the police let it go on for and the government there afraid to get cought.
see some people are talking to others and stuff then talking shit like someone knows it all then they do not. why would some stay on a frequencie for years and hear only a few people then know it all it's imposable to do.
now people are comeing forward with more evidanve and still some do not belive. me i have not done anything more then the police or the government.
they use the mental disorder bullshit to to away with shit replying to others it's all in your head.
yeasterday i heard someone was explaining chip types and the swine ful vaccine with the ready made chip in it this is a chip that works one way they say to listen only a NWO chip. i was told this was to monitor people so even if they got an old they can only listen with the new one and record data to track people.
see chips are no god i been wanting to gt mine and my wife jennifer's chip removed and the government refuses and the doctors and the people want it out but some will not let it happen
alot are hearing first names and it's becouse they are cutting words out trying to make it like thy can choose what i say. so if there is proof the government and police involved they hope they get away with it all these frequencies are mixed recall me talking about Underhand ?
They got 1 frequencie to listen and stuff with a few guy on it. then another to listen then they use first names on the other to start trouble the government would like you to kill one another. every one wants to claim it's a program and i got a feeling that the government is doing it all the time and haveing something to launch the program they say it's 2 people if there are 2 people and 2,000 listening why are they all hearing a few voices becouse of the voice synthsizer and i figure the system that keeps me on it is in the pawtucket police department or close by this is why they do not shut the chips off becouse there afraid to get cought.
See i always hear them changeing my words all day long to day there word is your dead and there saying im saying this as i hear them in my head.
These guys got a words list keywords to use to piss people off. and they mix it with racial coments.
these guys try to get others in fights and double talk people.
They try to get people to respond then try to get them to talk to people. some of these guys try to make it look like someone has there wife or familey member. This is what and say to others while they are doing things themself. so we got mixed people on here. if they blaim one or 2 people they forgot to look at the others some use a technologie to hide themself.
what would the police let it go on for and the government there afraid to get cought.
see some people are talking to others and stuff then talking shit like someone knows it all then they do not. why would some stay on a frequencie for years and hear only a few people then know it all it's imposable to do.
now people are comeing forward with more evidanve and still some do not belive. me i have not done anything more then the police or the government.
they use the mental disorder bullshit to to away with shit replying to others it's all in your head.
yeasterday i heard someone was explaining chip types and the swine ful vaccine with the ready made chip in it this is a chip that works one way they say to listen only a NWO chip. i was told this was to monitor people so even if they got an old they can only listen with the new one and record data to track people.
see chips are no god i been wanting to gt mine and my wife jennifer's chip removed and the government refuses and the doctors and the people want it out but some will not let it happen
so if there are 2,000 people ivolved in this then how many are 2 ?
see they try to keep people from talking to others then talk to a third party a few listens then tell others
then other people go talk to make it all a lie and get out of there involvment. there are alot of loosers involved in this one.
see alot of people from other states attacked each other and then they blaim other people. see these people hide between others some you know but they lie to you. then they cut up words and names and tell people stuff. some are police they figure the will never be cought others are afraid of what they will learn who is involved in this stuff. so you have people giveing others names lieing there way out of it so they can hide some are there becouse they hate you. or becouse there rapist hiding who they are lieing about others to get them killed to hide what they did. some of them are gangstalkers. this been going on for year and they do not want there machines captured or themself.
see the Police here will not admit to the chips in most states it's the same and they were spose to take my chip and my chip out for 5 years atleast i want mine and my wifes removed and they refuse to do so. so the governments and people are responsable. s they will not disconnect from out chips and do stuff to hide themself thus everyone is a program with a lieing voice...
see the police first had the idea of the 2020 Neural Chip and wanted Violent offenders and stuff but the cops now are afraid to get cought. they say it's a myth there hideing it.
so how did the drug dealers and public get chips the government will not say.
so every one invilved in this is there own fault. each has a level of involvment and the governments of the world know so they talk no action. you need to call the human rights alot and the government also. but they will probly deny it all as people die
everyone one wants a fake name and wants to be someone else to pass on the blaim.
i told my friends the police were watching me 5 years ago when i learned about the implant and they refused to remove the implants and i have been harassed for 5 years every day. this is what they do and others got involved and there afraid to get cought like i said it got to be 2 people if a 2,000 are involved.
they double talk to lie and change your words so who is safe the government and police or is everyone passing the buck to try to get out of there involvment.
see first they stick you in a mental hospital and give you a diognosis then they act like your crazy and are talking to yourself all day long. then they got others on here that are not cops that are plain assholes so they try to act like it's all in your head. i do not have thousands of people just in my head they wil not remove my implant and my wifes implant also we have been chipped for 5 years so it proves others do not want to get cought. 2 people is easy for the government to remove the chips with no harm 2,000 idiots are another problem.
Assholes are sayng im doing this to myself becouse they told me to stop thinking. who the hell do you stop thinking. i think they should disconnect me and my wife from the equipment and remove the implants they refused to remove and keep lieing about and acting like they have no involvment
2,000 people can not be 2
GonzalvezFrancisco Ladies andgentlemen!
I have today 21/07/2010 a complaint against the Baselauthorities
for physicaland psychological torture by non-lethal and
less-lethalweapons...furnis.I, I'm already looking forward to the
rot of Excuses ..... nokidding!! Gonzálvez Francisco, Gempenstrasse
... 10,4053 Basel - Switzerland !
best regrads
just the other month 4 providance cops were busted for a drug ring late more centralfalls cops were busted where is law and order these day. deffanitly not in Rhode Island
this is illegal and could be how people ubducted children and girls. trying to make it look a certian way like there familey and try to get them picked up it's how they tryed to cut me off from talking to people for years and tryed to setup my wife and myself see they been useing a technologie to conect to people and hide there real voices and try t act like there a computer program.
this is why some of you think there are others you know and they are not they cut up words and use voices then they try to pretend your someone. this guy thought it was his familey doing stuff o him and it could have been another. people been useing this in the USA for a long time it's what the rapist do to pretend there someone else. see they want you to think they are someone they are not and change what you say.
they try to pretend there other people and i have not hears more then 20 voices in 5 or 6 years and there are so many storys about Anubis. there are places i have never been ans people that have never talked to me and this is how people say there others
see some people are rapist and stuff and drug smuglers this is one teqniuqe they used to try to get into position to compermise one. they lie and say there other people they been useing this for years to try to setup people.
this is why it's hard to find people becouse radios are used with chips to turn them on and off and some have edited computers and chips with Mods
some chips also use hacks for illousions of seeing people it's a holutionation.
so they are alive and they need a antivirus to empty the chips
look up a Nurale chip 2020. this is a police correctional officers chip
and check out DNA Chips it's an injection. this is why they claim there are robots and dead there useing Mods.
i figured i would release this im a hacker and am trying to destroy the software. there are rapist useing names and this tequnique to hide themsef they try to use holutionatoins with a DNA chip
to connect to it and use a chip image to lie about who they are. i started to hack in 2005 and people stole software. all the chips are no good and they need to be destroyed. they need to be removed and DNA chis have a DNA chip Removal Kit your Governement should have one. they drug addicts and rapist do not want people to know about it and they need to be found show this to your government.
they also have a Coccine buy with a chip attached in the Coccien and there are also Verichips. there are also radioes connected to computers and and DEW weapons invoved chips are easy to hack but i can proove 50 or more people wanted to stay connected to me and my wife and lie all day and will not disconect. and lieing about how they are and have been useing this for years and do not want to get cought. look into the Verichip hack. they need to be banned.
States see there always sayng anubis is doing something and his wife some of these people will not disconnect from others implants they will not disconect. from people so they can act like it's one preson and then when others are connecting to them always saying someone is doing something dobule talking and stuff so if i do not come in contact with people that are chipped people then do come in contace with people around the world that's how they tryed to hide the story the rapist hide in other they should check there community and the missing persons list to check to see if they were chipped. these people are hide amungst others. some are using chips to make it look a different was and some do thing phisicly to people and try to abduct woman and children. so they use a chip to locate people and blame others for this they are agmungst you and the lie to others to hide what they did they some don't know others do and will not admit what there doing. some have a DNA chip and refuse to disconnect from other to blame them fr it. see they keep connecting back to people to make it look like it's one preson or 2 when it's so it's more then 100 people connecting to people spreading roumors and blaiming other so the sex offenders try to get away with it. what you forgot is sex offeders can also have this equiment. so they all blame 2 people or a few so where are the sex offends they figured they could not get cought becouse they use chips and use others chips.
I have called the United States Department Of Justice about the chips in R.I. Mass. And N.Y.
There are many types of implants and people never want to talk about it so thy hide the drugs and rapist themself. this is why some of these people are realy stupid for allowing these chips and machines to be used. by people hideing it all they allow this to happen.
see they removed my swedish web page to hide it all.
001.flv
003.flv
005.flv
some people used hacks it's jigsaw from the movie a cop that was firedput it in chip[s this is how they tricked many people into and trickthem into defending themself the presidant and others will not listed towhat's going on right now they deny my email. this came from a firedcop he is launching a war becouse he got fired im tryng to fix chips andpeople are helping and others are not stoping the attack they lied andtricked people to defend themself. these guys are in a lot of places atonce. they tryed to do this from othes chips. there are DNA chipsinvolved and other things also. this cop started the jigsaw in 2005. forsome reason. they started this thing they were fired one cop could havesetup the other they said they were going to kill people i made lots ofattempts to warn the government and hey never listened. i was notinvolved in 911. but i defended myself. they esclated thigs and used myand my wifes name like others the whole country is fucked up. wheretrying to fix it now. others need to fix chips and get rid of the badprograming. the 911 thing could have been a chip hack. ron paul may notbe involved but hundreds o thousands of people are and it was like themovie saw they used people that hate each oher to set them up. i recallwhat the fired police did just the other day im sending the story toprint. and the USA may have to be fixed or destroyed. this is all i knowabout what's happening. someone got into proples chips and fucked themup my story you can find here and my web page tells a tail of what hadto be done. we are trying to get the involvment of human rights and fixit. no one will respond. this is all peole that had reasons to do thingsto others. they tryed to make others fight back the cop started thisstuff he knew chips. then others got involved and they need to bedeprogramed or the chips need to be destroyed. many are fighting to stopit others keep putting it back in chips. they blame others and somehate others and some know others and there are tryng to use voices inheads to lie about who they are to get others to attack
Over the last year I have managed to hold a job in the deli at a local grocery store. In their desperate attempts to destroy my family, discredit me, cause illness and ultimately death; they have waged warfare and continued their attacks against me at work. In the process, several of my co-workers have gotten ill, some have been hospitalized, and many have quit. Also several pieces of electronics having come under attack (to generate harmful ELF frequencies) have failed.
Neither my family nor my co-workers are aware that technologies, toxins and "gang stalking" are all being used.
I would like to go on record regarding how I feel about the people aiding and abetting the perpetrators. Whether it be the person that makes things taste funny, the person that attacks your pets, the person that goes to your work looking for a reason to file a complaint or to push your buttons and most importantly, those people who are aware of the 1000's of crimes committed by these perpetrators against these nations and the World and have consistently failed to disarm them, failed to arrest them, have provided access to weapons and other technologies and failed to control, disable or destroy them.
I have used this analogy: If you are the "driver" of a vehicle used to rob a bank, while inside the bank, people are hurt or killed; but you are only the "driver". Sure it is understood that in attempts to white wash the sins of these people against us, various groups are engaged and told something that might suggest they are not committing a crime and asked to do something. "Could you give me a ride to the bank; I'll pay you $50?" Sure :-) But then while in the bank, that person robs and kills someone. The "Driver" didn't know this at the time, but found out later, this time the bank robber / murderer says I'll give you $100 to drive him to the next bank? This is the scenario that makes the "driver" just as guilty as the person running into the bank that kills someone in the process.
Of course with the type of murder that is happening to us, it takes 100 trips to the grocery store, and when you get fired, when you become ill, or when you die big bonuses are paid to the perpetrators and their accessories. The 'ignorant" people and groups that are brought in to white wash the sins of the truly guilty are sometimes also manipulated into accepting gifts or other tokens in an effort to make them look as guilty as the people that do this for a living.
Obviously I am not suggesting that the people that are asked to "give someone a ride to the bank" be prosecuted for murder; but I am demanding justice against the people that are willfully participating in this ritualistic murder ( in any and all capacities ) with the motive and intent to impede, obstruct, or denied justice and profit from our death, illness, loss of income, or destruction to our families (or other negative effect on the health and well being of human beings)
Again, The constant and repeated sadistic, ritualistic attempts to murder me and other members of my family continues 24 / 7. They are constantly attacking my skull, spine and brain stem, trying desperately to cause my death.
I would like to support, John Finch's and the MCMail Team's efforts to try and ensure that none of us are forgotten in death; for the sake of our families and loved ones or those people or groups that we have seen fit to designate as beneficiaries.
Left in the hands of the perpetrators and those less sensitive to the suffering, heartache, hardships endured by us, our families and loved ones, restitution would go by the wayside for those of us that have died; and that is not acceptable. For those of us who have suffered the most, the cost to make things right is not cheap. The World Court and the Governments of all Nations affected by this crime must be made to understand that restitution WILL BE PAID to the victims or in the event of their death, to their legally designated beneficiaries. Our families will not be left in the dark to endure continued heartache and hardships.
Important Information regarding this crime being committed against us!
The perpetrators of this crime against us have been profiting from our untimely deaths for almost 20 years.
Monies from various sources have been put aside in our name. These include:
* Court Ordered Judgments
* Fabricated Letters of Agreement (supposing willful participation in various programs)
* Settlements
* Life Insurance
Almost 20 years ago, an ending to an atrocity committed against unwitting subjects of experimentation involving a "radio tooth implant" was ordered and funded by all involved Countries, the true perpetrators of this crime against us denied knowing our identities. They also indicated that the number of implant victims involved were greater than there actually were at the time. An arrangement was made to pay the victims and remove the implants as they were identified, and a Fund was established to hold these monies, "Ronald McDonald House Charities Fund, UK". In truth, the perpetrators always knew who we were, they tracked us and targeted us till death occurred so they could then make a claim to the funds that had been put aside for us, or for our families. In 1999 after this technology was already outlawed, more of us were implanted with "radio teeth" solely because the funds that had been put aside had not yet been exhausted... This time, the tooth implants were white enamel finished crowns (instead of gold), radio active on the inside. These can easily be identified on an x-ray (a white halo will emanate from them, and often times the gum's around them will recede).
If we identified ourselves (and we all have more than once) we should have been paid something substantial and our implants should have been removed. Instead, the perpetrators have been perfecting their ability to control, manipulate and impede our communications. They, over many years found ways to disguise their purpose and intent and increase our value to them dead. They have tortured us, ritually abused us, destructively manipulated our life's and the life's of our loved ones, and lethally engaged us. They purposefully recklessly endanger our life's and continue to fabricate allegations of wrong doing against us.
They have controlled the media in order to discredit our testimonies. They even illegally and illicitly flagged us as "enemy combatants" in order to impede justice and prevent or deter other organizations and agencies from coming to our aid. This has resulted in our rights as guaranteed by the Constitutions and Charters of our respective Countries and our inalienable rights being denied to us.
Their intent has always been to shorten our lives by extraordinary means. Have our deaths appear to have been from suicide or natural causes like an illness or an accident. They then send in our death certificates with evidence indicating we were implant victims; and having listed themselves as beneficiaries, collect all monies that were put aside for us (if they took the time to prove our brains had been damaged, even more money was allocated and paid to them). They increased our value to them dead by obtaining Life Insurance in our name without our knowledge or consent. Life insurance would typically not be paid in cases involving suicide, but a suicide rider / waiver exists on these policies due to the psychiatric abuse endured by the unwitting subjects. Again these monies if paid should have been for beneficiaries we would logically designate; not paid to the people who are responsible for murdering us (made to look like something else).
They have done this also with other settlements that have been issued in our names through the use of charitable sounding organizations like the following Eugenic Society organizations: International Planned Parenthood Federation, UK, Society for the Study of Social Biology, USA and For Kids Sake, CAN. It is very important for all Targeted Individuals to understand this crime being committed against us so that we can stop them. And to deter their continued attacks and prevent them from profiting from our death, to establish a Will and designate primary and alternate beneficiaries.
Last Will and Testament - Robert Alan Desrosiers
The continue perceived gross criminal negligence by both the United States of America and Canada in addressing the decade long illegal lethal engagement, torture, ritual abuse and reckless endangerment to me and members of my family has pushed me to document my Last Will and Testament; primarily to designate beneficiaries and insure that the criminals responsible are brought to justice.
As an American Citizen, my Constitutional Rights are guaranteed and protected by FISA. They have been denied me for over a decade. FISA provides for a US Government advocate to be assigned in the event my rights have been infringed upon. I demand one be assigned. I am also a lawful Permanent Resident of Canada, married to a Canadian Citizen with equal rights and protections under the law. I served honestly and faithfully in the USAF and I have a secret clearance; as did my father. DOD weapons are frequently used in this illegal engagement; as such I demand a military advocate be assigned. I have repeatedly demanded both of these things, even in writing, but to date, neither has been assigned; or at least neither has communicated with me directly.
To serve justice:
I demand the release of all Government, medical, and any affiliated records from both countries be released to these advocates, my family in both countries, and if it becomes necessary at my family's discretion to serve justice, the Prosecutor for the International Criminal Court or anyone else they designate.
Several Settlements have already been issued in my name over the last decade. None of these have ever been paid to me or anyone I have legally designated. In fact the perpetrators of this crime against us through various forms of fraud and purposeful deceptions, awarded these settlements to themselves. This crime has been repeated against over 180 innocent victims that were murdered, making it look like suicide, illness or an accident.
To insure monies from any and all settlements, life insurance or other are paid only to persons I have designated, I declare my beneficiaries to be:
25% to my Husband, Shawn David (Larose) Desrosiers
25% to my Parents, Louis and Xiomara (Suarez) Desrosiers
15% to my Brother and Sister-in-law, Louis Jr and Robin Desrosiers
15% to my Husband's Parents, Deb and Pat Larose
10% to my Husband's Brother and Sister-in-law, Doug and Holly Larose
10% to my Brother's Son, my Godson, Jared Desrosiers
To try and insure that the life's, health and well being of my beneficiaries are not put at risk, I declare an alternate beneficiary for any or all of my designated beneficiaries to be:
100% of the apportioned amount to the Roman Catholic Church.
Signed this 15th day of April, 2009
Robert Alan Desrosiers
If you are devout Christian born-again person seeking a temporary place to live, then I have a small spare room for male or female. Greyhound bus station is down the street.
$150 a month is all that is required to share expenses in a nice small 850 sq house with a nice sized fenced yard. First three months is just $50. Will need to share in a few chores and submit to strict house rules that are countermeasures against perpetrators. Very good location to everything including city bus/train system for transportation.
No smoking, drinking, drugs allowed. No indoor pets are allowed without some exceptions. No criminal background. Must be 100 percent honest and organized/tidy individual to live with my brother and I who own the home. I have two cats, so should like animals.
I am building a sufficient support system for Targeted Individuals, and seek to make a close community of TI's in Utah USA that live with and/or in close proximity with other TI's so that we can work together to help each other. A lot of problems can be curbed or eliminated from using a buddy system. It makes no sense for TI's as individuals to have to face alone thousands of perpetrators in their community. I am an adviser to Freedomfchs.com . Thank you, Kenneth M. Wilbourne Jr, Utah, e-mail: Gallilee7@yahoo.com, 801.394.0212.
p.s. EVERYONE NEEDS TO BECOME A SAVED SOUL (born-again in spirit) to become eligible for Heaven. Learn how at Biblelineministries.org :o)
I'm posting this information because of a recent attackagainst me
using these techniques of dream manipulation that ibelieve to be very
destructive if you don't become aware that it isbeing done to you. It
involves a cognitively implanted seed of acrime that you were never
involved in and leads you to believe thatyou are guilty and must hide
your tracks or cover it up. This sametechnique was done to me for
almost a year in 1999 and can eventuallybecome a semi-conscious
concern and lead to paranoia about somethingthat you never did.
Awareness of what these bastards are doingis the best defense!
Although this article refers to thesetechnology belonging to NSA and
the CIA, I am convinced the criminalsare part of the Eugenic Society,
mass murder, population controlgroup with headquarters in the UK....
they have managed toinfiltrate, influence and control various weapons
andother technologies from several agencies in many countries.... it
willend soon!
(see below information that was recently sent to mealso)
Satellite Surveillance and Human Experimentation
http://web.archive.org/web/20021215081046/http://www.greenpages.com.au/baird/
-----Original Message ----
From: Robert Desrosiers <desrosiers_r@yahoo.com>
To:mcforums@yahoogroups.com;mcmailteam@gmail.com; MCVictimsEU@yahoogroups.com;mcactivism@yahoogroups.com;info@freedomfchs.com
Sent:Tuesday, December 9, 2008 3:51:53 PM
Subject: NSA Mind Control andPsyops
NSA Mind Control and Psyops
by Will Filer
Esu-@aol.com
The followingwas sent to me by Will Filer Esu-@aol.comon July 27,
1999. It offers a new explanation for governmentmind control. Will
has stated to me that he is a formerconsultant to the U.S. National
Security Agency and asked me topost this information immediately. He
also believes he is inimmediate danger because ofthis information.
Subliminal Implanted PosthypnoticSuggestions and Scripts Using
Acoustically Delivered andPhonetically Accelerated Posthypnotic
Commands withoutSomnambulistic Preparation in the Subject for
Intelligence andCounterintelligence Applications by the United
States NationalSecurity Agency.
1. INTRODUCTION:
1. The followinginformation is an overview of one area of NSA
IntelligenceTechnology and Applications. A Technology Title,
Applications,Technology Description, case history summaries and the
NSA'sBehavioral Modification Procedure Outline documented for the
non-technical person.
2. TECHNOLOGY TITLE:
1.Subliminal Implanted Posthypnotic Suggestions and Scripts Using
Acoustically Delivered and Phonetically Accelerated Posthypnotic
Commands without Somnambulistic Preparation in the Subject for
Intelligence and Counterintelligence Applications by the United
States National Security Agency. "Computer Simulated Subconscious
Speech Language".
3. APPLICATIONS:
1.Intelligence:
1. Used on foreign and domestic diplomats,spies, and citizens to
gather intelligence, steal advancedtechnology for US Defense
applications. Surveys of citizen'sopinions to government events and
propaganda. Heavy survey useduring times of war, economic strife and
political elections. Waragainst drugs. Used to identify investments
that have high yieldto support clandestine operations. Used to
direct field agentswithout the agents having to carry communications
hardware andencryption devices.
2. Counterintelligence:
1.Used on foreign and domestic diplomats, spies, and citizens to
identify intelligence operations; scope, participants, communication
methods, and weaknesses in individuals, systems, equipment, or
signals that can be exploited. Additional applications include
misinformation dissemination, confusing and confounding leaders
during critical decision moments, distorting significance of various
facts to sway decisions and actions in US favor, behavioral
modification of foreign spies to betray their loyalties, self
initiated executions (suicides).
3. Behavior Modification andAccelerated Resocialization:
1. Thistechnology is used to develop and control spies, political
candidates, and other public figures through psychological
intimidation, fear and extortion.
2. The NSA uses thistechnology to resocialize (brainwash) the US
civilian votingpopulation into "Giving their lives to Christ"
(giving up theirpersonal will and civil rights to the NSA). Each
subject isrequired to maintain a "Personal Relationship with Jesus
Christ"(following the precepts of the Bible and doing what is
ordered bythe NSA). The technology is also used to monitor and
optimizeNSA employee performance and loyalty.
4. DEFINITIONS ANDACRONYMS:
1. Age Regression: The act of bringing back pastmemories in a
subject though the use of hypnosis. The memoriescan be veryvivid
and real in the mind of the subject.
2.Hypnoamnesia: Temporary loss of memory due to a posthypnotic
suggestion.
3. NSA: United States National Security Agency,Fort Mead, Maryland.
4. ODO: On-Duty Officer, orofficer-on-duty.
5. Posthypnotic Command: Same asPosthypnotic Suggestion. This term
"Command" is more commonlyused when the hypnosis is forcibly given
to the subject and whenthe subject's will has been broken down
though the use of REMSleep Deprivation and Suggestibility Index
increasing drugs likeCNS and Cardiovascular Stimulants. The exposure
to extreme REMdeprivation and select chemical stimulants cause the
subject tohave no ability to resist the "Suggestion" any longer
therebymaking it a"Command".
6. Posthypnotic Suggestion: A subconscioussuggestion or command
resident and potentially active in thesubject following a hypnotic
trance or period of direct access tothe subconscious mind.
7. Posthypnotic Suggestibility Index:An index or rating of a
subject's susceptibility and sensitivityto hypnosis.
8. REM DEP: Abbreviation for REM SleepDeprivation or REM
Deprivation. A subject deprived from REM Sleephas multiple symptoms
i.e. reduced protein synthesis, blackcircles around eyes, loss of
short term memory, confusion,impulsiveness, anger, frustration,
diminished self-esteem,increased suggestibility, reduced
productivity, apathy, anddepression. Long term REM Deprivation
results in death.
9. Script:A carefully constructed series of words arranged in the
form of aposthypnotic suggestion. The script will generally consist
offour separate parts;
(1) an identifier (subject's name,description, or other identifying
factor),
(2) triggeractivation condition or conditions (when, what or how the
suggestion will trigger),
(3) the content (what the trigger willprecipitate in the perception
of the subject),
(4) and aduration (when or under what conditions will it stop or
finish).Additional reinforcing scripts are usually added to
"strengthen"or reinforce the central posthypnotic command.
10.Somnambulatory State: An abnormal condition of sleep in which
motor acts (like walking, running) are performed. This state is
typically achieved and a prerequisite to traditional hypnosis.
11. Subliminal Implant: A posthypnotic suggestion successfully
delivered to the subject's subconscious mind.
12.Transceivers (NSA): Nearly microscopic electronic surveillance
devices that collect and transmit encrypted audio, color video, and
location coordinates collected at the subject site to NSA Satellites
that in turn forward it to NSA central intelligence operations. The
devices also receive encrypted audio scripts from NSA central
intelligence operations through the satellites and deliver it to the
subjectÆs site in the form of a subliminal posthypnotic suggestion.
These devices are approximately the size of the head of a straight
pin and can be concealed in houses, offices,automobiles, planes, and
street corners.
5.TECHNOLOGY OVERVIEW:
1. In addition to the ability to see andhear what is going on inside
people's homes, vehicles, andbusinesses through the use of nearly
microscopic digitalsurveillance technology, the NSA is able to
interrogate andinfluence a person subconsciously without the
knowledge orconsent of the subject.
2. Thought Labels (Response Labels):
1. Have you ever watched a baseball game? Did you see the catcher and
pitcher communicate using a series of itches, baseball cap
rearrangement, and clothing tugs? An elaboration of this
communication technique is used by the NSA to detect a fleeting
thought in a subject or "read minds" so to speak.
2. Letsdiscuss how an itch, clothing tug or even an innocent sneeze
canbe used to label a thought. For simplicity, we will call itches,
clothing tugs, sneezes, coughs, or involuntary muscle spasms that are
performed during subconscious interrogation "thought labels".
3. Post-Hypnotic Delivery Method:
1. The NSA combineshypnosis and thought labels to interrogate people
without thesubject being aware of it. "How can hypnosis be used?"
you mightask. The subconscious mind operates at a speed of about
1200 to1400 words per minute. This is many times faster than the
conscious mind that operates at 250 to 450 WPM (words per minute).
The posthypnotic script can be spoken at fast conversational speed
approximately 250 WPM and a recorder or a computer speeds upthe
message up to approximately 1200 to 1400 WPM. Remember whathappens
when you play a 33 rpm record at 78 rpm? The resultingvoice sound
like the old American cartoon characters theChipmunks. This is only
slightly past doubling (2X) the deliveryspeed. At speeds as high as
1400 WPM, the voices would sound likea high pitched chattering
whine. Remember when the words "DrinkCoca Cola" were written on one
frame of a movie in a theatre backin the 1960s? The frame rate in
movies is played at 30frames/second. At 1/30th of a second the
conscious mind could notrecognize the message but the subconscious
mind could read itclearly. The audience increased their Coca-Cola
consumption by65% that night resulting in the Federal Government
prohibitingsubliminal advertising. The following probable reasons
for notachieving a higher percentage of subliminal delivery
effectiveness (> 65%) are described as follows. In that 1/30th of a
second some people were blinking, some people were looking around the
theatre, looking at spouses, children, candy, popcorn, etc. or they
had sufficiently poor eyesight that they could watch the movie but
could not distinguish the small writing clearly.
2. In theearly years of this technology, the NSA originally recorded
aspoken posthypnotic suggestion message into a tape deck and sped it
up by speeding up the tape. This process was labor intensive,
required each officer to have excellent diction and mastery of the
language and dialect required, and was of poor quality dueto
background noise and the delay in timing during recording and
processing. It also required extensive training to assure that each
officer spoke at the same rate of speed so that the resulting "sped-
up" script was delivered at the correct speed. Now computers are used
to append digitized samples of optimized, ideal phonemes together to
form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the variety of
languages on the planet, phonetic elements from each language and
distinct dialect are sampled, digitally edited to optimize them, and
appended during delivery to form words and words arranged to make
sentencesin the from of scripts that resemble hypnotic suggestions.
Theempty space between words is minimized and pitch rise is
compressed and filtered. Repetitive sine waves are also removed from
the phonetic element's acoustic wave train thus reducing the actual
number of sine waves making up a word by 50% or more. This reduces
the actual length of the time it takes the phoneme to be delivered
prior to accelerating (speeding-up) the delivery (like fast forward).
This helps the message to be played at higher speeds and reduces the
subject's ability to recognize it as accelerated speech. The
technique of using optimized digitally sampled and edited phonemes
appended together to for words and then sentences structured as
hypnotic suggestions can be termed "computer simulatedsubconscious
speech language".
4. The subconsciousmind is also very sensitive. It can hear things
that theconscious mind ignores. If you have watched television, you
haveprobably noticed that there are many "subliminal tapes" on the
market to program your subconscious mind. These tapes have their
"messages" recorded/hidden in the sounds of ocean waves, music, or
other sounds but they are not sped-up to subconscious delivery speeds
and are therefore not very effective. The subconscious mind can hear
and discern the message even when there is background noise like
waves, cars, planes, or even when someone else is speaking to you in
normal conversation. Your conscious mind won't hear anything unless
it is very quite in the house. If you are veryattentive you may hear
what sounds like a low-pitched tape onfast forward, and played at
low volume. This is the sound of theNSA's high-speed audio
subliminal message.
5. Thismodification of the phonetic elements, played at low volume,
combined with the environmental background noise makes it very
difficult for a subject to record the NSA message. Even if the
subject were to effectively record the message, it is very difficult
to filter (separate) the NSA's message from background noise. Then,
reconstructing the missing sine waves from the acoustic wave train
and slowing the message down to discern the actual content of the
"posthypnotic" script with the conscious mind would be nearly
impossible for the average citizen. To briefly summarize, thesubject
would have no chance in analyzing a NSA message withoutthe following
items:
1. Professional state-of-the-arttechnology recording equipment.
2. Digital acoustic wave editingequipment.
3. Advanced engineering knowledge of acoustic wavescience.
4. Phonetics and linguistics expertise.
5.Hypnosis theory and scripting.
6. Ideal environmental conditionsfor recording.
7. NSA ignorance of the subject's intent andability to capture a
message.
6. This technology isthe perfect intelligence tool. It is nearly
impossible to detector measure, difficult to trace back to the NSA.
The symptoms thatthe NSA can "program" or inflict into the subject
can cause fearthat they might be thought to be insane if theywere
to report the NSA activities. The subject does not know thesource of
the technology or the technology itself, the subjecthas no proof or
evidence, only their perception, suffering, andisolation.
Additionally, potential recourses that are availableto the subject
can be interrogated out and preventative actionstaken by the NSA to
further isolate or disable the subject.
4. Using the Post-Hypnotic Delivery Method with Thought Labels:
1. The NSA technique is simple; they transmit their human programming
message through the audio-visual electronic surveillance equipment
installed in your home, car, or office to you. The subliminal message
delivered to you could be "Mr. Jones, imagine that the IRS were
auditing your taxes. Think back to atime you have cheated on your
taxes and that you are worriedthat the IRS might find out in an
audit. If you have nevercheated on your taxes and have nothing to
fear you will feel anitch on your right-hand ear lobe that will go
away when youscratch it. If you can be caught by an IRS audit, you
will feelan itch in the left nostril of your nose that will
disappearafter you itch it twice." From your perspective, you have
justhad a fleeting thought about your past tax returns and had an
innocent itch (thought label). To the NSA Officer On Duty (ODO), you
have just communicated to him whether you have ever:
1)cheated on your taxes, and:
2) If the IRS could catch you in anaudit.
2. This is a very oversimplified example of a typicalNSA
interrogation. Actual interrogation messages may consist ofseveral
hundred words and be very complex and sophisticated. Mostmessages
consist of several dozen words. Yes indeed, the NSA hasexceeded the
wildest expectations of the book "1984". As you canimagine, the spy
world has reached a new plateau that directlyaffects every person in
the USA and abroad. This electronicsurveillance system extends down
through Mexico, Central America,and deep into populated regions of
South America. It also hasbeen installed in Australia, Africa, and
the free-world countriesin Europe.
3. The NSA's goal is to have the whole worldunder its electronic eye
by the year 2000. They are almost therenow, but are having
difficulties with high-tech countriesthat have the
counterintelligence resources to identify the highfrequency bursts
of microwave transmission from thetransceivers. The system also has
the ability to take a "voiceprint" from any person and place it on
file. This file can beused to locate the subject later by comparing
it to real-timesurveillance audio samples received from the field as
long as thesubject is speaking in close proximity to a transceiver.
If theperson is aware that the NSA has this capability and remains
silent, the NSA can transmit a periodic worldwide subliminal message
that addresses the person by name and causes them to dream and talk
in their sleep. After the person talks, the voiceprint would be
eventually identified and the person's location can be identified
nearly anywhere in the world. Yes, it is a small world, and getting
smaller all the time.
4. This technology was originallyconceived under CIA studies and
fascination with the power ofhypnosis in the late 1950's and
perfected by very early 1960s andimplemented with unlimited
resources to all areas of vitalnational security interest first.
Originally, after noting thebehavioral effects in visual subliminal
effects like the highlypublicized event where stating "Drink Coca
Cola" on a singlemovie frame "delivered a higher rates of speed than
normal movieviewing raised the obvious question, "Does the human
hearing workas good as eyesight accepting subliminal messages?"
Preliminarytheory work was transferred to Fort Mead NSA who had
expertise incharacterizing language in analog domains where a
sampledphoneme could be edited (shortened by removing excess sine
waveforms from the "acoustic wavetrain") and electronically
reconstructed back into shortened words of language. Some of the
early experiments included "Remote Viewing at NSA where the Viewer
would relax, open their mind and explain the clarity of images that
were described by the NSA using this technology. These early
experiments allowed the NSA to refine the specifications of the
"Computer Simulated Subconscious Speech Language" and the scripting
formats to maximize the ability to deliver an accurate "vision or
picture" into the subject. Pictures already seen by the subject could
simply be recalled using "Age regression" script variations.
6. OTHER REFERENCE MATERIAL:
1. Please refer to the book"Inside America's Most Secret Agency, The
Puzzle Palace" by JamesBamford, Published by Houghton Mifflin
Company, 1982. This bookcontains extensive information and
references on the NSA'shistory and the NSA's first surveillance
system that originallyonly eavesdropped on telephones and is now
expanded toaudio-visual.
7. NSA CASE HISTORY EXAMPLE SUMMARIES:
NSA Self-Initiated Execution (Suicide):
1. Bamford's "ThePuzzle Palace" references one of the NSA's first
self-initiatedexecution (suicide) with this "Thought Control"
technol ogy theydeveloped. The NSA employee reportedly ran off NSA
propertysaying demons were in his mind and he killed himself.
2.NSA Initiated Execution to Cover-up in the News:
1. AUniversity of California at Berkley student that went into a bar
on or around November 27, 1990 took hostages and insisted to the
police that the CIA Director talk with him so that he could get
relief from the suffering. The young man had sent letters to the
president and the CIA but the requests had fallen on deaf ears. After
the young man panicked and shot a customer in the bar, a SWAT team
fatally shot him, the San Jose police found copies of the letters
written to the President referring to people that could "read minds"
and that he had learned how they do it. The NSA had been
unsuccessfully brainwashing him and had no alternative but to
terminate him to assure their security. It is interesting thatwhat
was originally broadcast on the news "The gunman wasdemanding to
talk with the Director of the CIA" etc. disappearedquickly
(suppressed?) from later news accounts.
3. NSAInitiated Execution to Cover-up in Music:
1. Curt Cobain ofthe musical group "Nirvana" was another victim of
NSAbrainwashing and was terminated by NSA. Cobain had started
writing clues to the NSA activities into his music to communicate it
to his music followers. He referred in music to the NSA as the
"Friends inside his head". Once the NSA puts on the highest level of
brainwashing pain, the subject expires quickly. Cobain used heroin to
numb and otherwise slow the effect of the brainwashing.
4.NSA Initiated Executions in Overseas Defense Project:
1. Some years back several employees of the United Kingdom's
Government working on a top secret Radar Project committed suicide
with no apparent penetration by a hostile government, drug abuse or
any other commonality other than working in a secured government
project. They were not "Staged" suicides (murders) because some of
them happened behind doors that could not be opened from the outside.
These men were subjected to the same technology and processes that
the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands
of others have experienced.
5. Musical references of NSATechnology:
1. Talking Heads; a music group popular in theeighties, wrote a song
explaining the scientific process of theNSA's brainwashing
technology ina song called "Wild Wild Life". The song gave an
example of whatthe audible transmission sounded like at the end of
the song(like a tape on fast forward). They mentioned in the song
that"They (NSA) talk so fastà" and that the musical group had spent
"All their time and money" unsuccessfully trying to find a place that
the NSA would not be able to harass them. The Talking Heads exposed
the technology, gave an example of what it sounds like, scenarios of
how the NSA might select you or the brainwashing, and the scope of
the electronic surveillance system.
6. NSACounterintelligence Experiments:
1. Many experiments wereperformed by the NSA to determine the
conditions and proceduresthat would be required to turn spies that
were trusted by USenemies into assassins that we could invisibly
manage. In earlyexperiments, the resulting NSA experimental subjects
would getextensive attention in the news because of the horror and
unusualnature of the atrocity.
2. One example that comes to mindhappened several years ago and
created much news. A man becameobsessed with his son, poured
gasoline on him and ignited it. Hehad planned to do the same to
himself but his desire for survivaloverpowered the NSA's behavioral
conditioning. After he wasimprisoned, he spoke about how all of a
sudden his mind becameclear and he couldn't figure out how he could
do this crime. Thehypnosis was simply removed and the subject was
allowed to sleepso that experts studying the file would not find out
anythingif the subject would have been subjected to traditional
hypnotherapy or other psychoanalytical techniques. Another successful
counterintelligence experiment completed with no liability or
traceability to the NSA.
3. Perhaps ten years ago I read ofseveral elderly people died of
sleep deprivation in Florida. Thedoctors tried everything they could
do but could not stop thesleep deprivation that resulted in a 100%
effective terminationyield. The NSA had developed the right
combination of deliveredanxiety scripts combined with muscular
tension and deliveryschedules optimized according to decreasing post
hypnoticdurability over time as the subject's health degraded.
4.David Koresh of the Branch Davidians spent many hours talking with
FBInegotiators about God and the Bible and finally waited for "God"
to tell him what to do in the final hours of the siege. The compound
probably had numbers of Personal Journals (required for subjects by
the NSA during brainwashing) that could lead to questions about how
this cult came to this level. Additionally, just like other loose
ends the NSA had to secure, "God spoke to them and said to commit
suicide" and they did securing another one of the NSA's great
experiments in mind control and social pathology.
5. A friendof mine, David Sautter and I worked at Singer, Kearfott
Division, producing government weapons where we worked under a multi-
tier security system; Company Security, FBI, DIA, and at the top of
the ladder watching the watchers; the NSA. I discussedthe NSA's
technology with Dave and a few months later, I heardhe had committed
suicide inside of a locked room. This themeshould familiar by now
and the details of the case will bedestroyed or rewritten by NSA
influences to preserve nationalsecurity.
7. The cases of NSA activities go on and on. Withaccess to the FBI's
Crime Information Center (CIC), we could findseveral thousand files
having the characteristic patterns wherethe NSA had experimented on
the individuals with their "ThoughtControl" technology.
8. Currently, the NSA has many subjectsin the field (our society)
that need only a series of "triggers"(carefully constructed
posthypnotic scripts) to send them overthe edge and on a mission to
kill. The NSA calls them "Shootersona Shelf". A recent example was
Russell Eugene Weston, Jr. thatwent on a shooting spree at the
Capitol around July 26, 1998. Hewas diagnosed with schizophrenia,
had delusions that he had anaffiliation with the CIA or FBI and
thought a radio-trackingdevice was planted in his tooth. He was a
product of NSAbrainwashing. He did not have the ability to recognize
theadvanced technology even though he knew that "someone" (CIA, FBI,
etc.) was communicating with him and that this communication ability
spanned across the USA leading him to believe that he had a tracking
device planted on him. Because of the real effects of the NSA
hypnosis treatments, he therefore reasoned that the schizophrenia
medication would not help and so he quit taking it. This was a man
desperately trying to alleviate the suffering the NSA inflicted on
him.
9. Through the years, I have met thousands of peoplethat have been
brainwashed into Christianity to a level where Godtells them what to
do in their minds (described as a gentlevoice by victims) and they
mindlessly obey. Yes, they have"Friends inside their heads" also. It
appears the BiblicalAnti-Christ in the Book of Revelations has
arrived and isconvincing many subjects that Jesus is back on earth
anddirecting them.
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
1. The following procedural outline documents typical techniques,
processes, explanations, and definitions of the National Security
Agency's Behavioral Modification Procedure using SubliminalImplanted
Posthypnotic Suggestions through acousticallydelivered phonetically
edited language elements combined intoscripts without somnambulistic
preparation in the subject.
2. In simpler terms, the subject is unknowingly given hypnosis while
the subject is completely awake and is tortured and punished with
this hypnosis into a predetermined behavior by the National Security
Agency. The behavior is usually extremely religious, is called
"reborn" by the church, with the subject's life-long goal of "a
personal relationship with Jesus Christ".
1. ABSTRACT,Behavioral Modification:
1. The NSA's behavioral modificationprocess starts with
identification and qualification of thesubject. The NSA used to
choose subjects based onthe subject's net present value to the
agency in publicvisibility, financial resources, political clout, or
otherintelligence and counter-intelligence reasons. Additional
considerations are given to minimizing security risks of exposure,
the subject's posthypnotic suggestibility index, the subject's
intelligence and reasoning ability, moral and superstitious beliefs,
and the subject's social status and the weakness of the subject's
primary support groups (family). Now a recent report referenced in
the March 26th Business section of the Orange County Register from
the National Sleep Foundation reports that 40% of Americans are
experiencing sleeping problems. This news could indicate that the NSA
is broadening its influence to the greater public. As explainedbelow
in this document, the NSA always starts its behavioralmodification
process with REM Deprivation.
2. Afterselection, the subject is subjected to long periods of REM
SleepDeprivation and reinforced torturing posthypnotic suggestions
that will breakdown the subject's will, confidence, self-reliance,
and moral values. Meanwhile, the subject is increasingly isolated
from their familiar and trusted peer groups causing the subject to
experience depression, apathy, and ultimately social and financial
failure.
3. Typical post-hypnotic induced delusionsreported by subjects are
tingling in various areas of the body,which are thought to be
resulting from microwave beams. Hearingticks thumps or cracks from
walls, ceilings,clocks, lights, etc. Beliefs that the subject's
neighbors areconspiring against them, or that the subject is being
followed.Sometimes subjects believe that the various perceptions,
feelingsand experiences are the result of "Implants" in their body.
Itis important for the subjects to understand that the NSA controls
this technology from nuclear hardened underground shelters and the
neighbors next door have nothing to do with the subject's
experiences. Nobody has the time or inclination to follow a subject
around with a microwave gun to tickle various parts of the body. We
are saturated with microwaves all the time from television stations,
communication satellites, etc and yet we do not have any symptoms
because microwaves do not have the ability to triggerlocalized
synaptic responses in our brains. Furthermore, whenthe subject is in
a room surrounded by several people, and thesubject is the only one
experiencing the "thoughts", tinglingfeelings, etc., then obviously
a delivery method is beingemployed that affects only the subject;
high-speed acousticdelivered hypnosis.
4. After a while, the subject has anemotional breakdown and a new
support group is built around thesubject. The new support group is
typically a church withdoctrines centered in the Bible but the NSA
also uses cults andother social groups. The NSA prefers Christian
churches becausethe doctrines allow "God or Jesus to speak directly
to thesubject" and the negative reinforcement can be attributed with
Satan and the positiverewards can be considered to be blessings from
God therebymasking the NSA's technology and processes. When the NSA
usesother relationships without in which the subject experiences a
religious awakening and "Gives their Life to Christ" and the NSA
achieves total control of the subject.
5. The subject isslowly released from the damaging uncomfortable
hypnosis and itis replaced with positive rewarding hypnosis as "God
and Jesusworks in their life". Soon, the subject has complete
loyalty toJesus (AKA: NSA) and will do anything on command from
Jesus(NSA).
6. The subject is required to give daily statusreports in the form
of prayers in the privacy of their home,office, or car where the
NSA's electronic surveillance systemcaptures and sortsthe prayers
by "Keywords". The NSA then delivers additionalhypnosis in the form
of punishments or rewards or directs thesubject accordingly to
"God's will". If the subject resist's theNSA's instructions,
additional punishments are inflicted on thesubject.
7. The subject is institutionalized in this systemwhere any
nonconformances committed by the subject are watched,critiqued, and
reported on through prayer by other "Christians"to the NSA. Thus,
the new church peer group acts as a behavioralreinforcing mechanism
that will bring any of the subject'sproblems to the NSA as they have
been trained themselves (this issimilar to the Nazi Gestapo of World
War 2 and other communistapproaches).
8. A subject that has successfully completed theNSA's behavioral
modification program lives out the rest oftheir mediocre life in
service to Jesus (NSA) and never causesany waves in the church or
news media for fear of reprisal fromthe NSA. The subject's lives are
relatively unproductive becausetheir focus is on their "Life after
death" and not what theyaccomplish while they are alive. They avoid
"worldly activities",and usually are confused and disjointed in
rational thoughts andconcepts. For instance, they don't believe in
anything that isnot in the Bible, i.e. dinosaurs, evolution, space
travel, eventhough they ride on airplanes and watch television both
of whichare not referenced in the Bible.
3. BEHAVIORAL MODIFICATIONPROCESS:
1. Triggering Techniques:
1.The NSA minimizes security subject might recognize when the NSA
was not actively watching causing a security concern and it would be
cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when using
negative reinforcement continuously. It is not practical or
economical to watch a subject continuously to apply real time
deliveries. Additionally, using all three script delivery patterns
confuses the subject, causes the subject to believe they are always
being watched, and maximizes behavioral change over time though
continuous pressure.
2. Real-Time Subconscious ImplantDelivery:
1. Real-time means that the NSA ODO is transmittingthe posthypnotic
command script to the subject and observingthe subject's response.
This technique is required forsubliminal interrogations. All NSA
standard posthypnotic commandscripts can be delivered real-time.
This form of delivery canprecipitate the perception of a "voice"
heard in the mind of asubject to give them information (true or
false) or ordersdepending on the purpose of the NSA's activities.
3.Prescheduled Subconscious Implant Delivery:
The NSA centralswitching computer can transmit a script to a
specified subjectat a pre-specified time. The transmitted script's
transmissionrange can be limited to a single building, a city, or a
largegeographical area (i.e. North America or Europe). By having
prescheduled scripts, the subject has seemingly randomly occurring
thoughts and feelingsthat can't be associated with a commonly
recurring situationlike event-triggered scripts precipitate.
4. Event-Triggered(conditional) Implant Delivery:
1. Posthypnotic subconsciousimplants that are triggered (activated)
with an event, thought,or code word (event-triggered or conditional)
are stronglyexperienced by the subject and are powerful tools for
reinforcinga predetermined desired behavior and inflicting
delusions.
2. This type of posthypnotic commands are the ones most commonly used
by hypnotherapists to help people quit smoking, study better, or in
general, change behavior (behavioral modification). There is
extensive information on the Internet and college libraries about
this form of posthypnotic command delivery and how to"script" and
use them.
3. The NSA can reinforce apredetermined desired behavior by
associating a subconsciousimplant (negative or positive
reinforcement) with an event. Anexample is that when the NSA want's
to isolate the subject fromthe company of a specific person place or
thing, the subject willbe implanted with a feeling of increased
anxiety, hostility,tension, simple discomfort, or a feeling of a
lack of peace. Whenthe subject leaves the person, place, or thing,
anotherposthypnotic implant is triggered that rewards the subject's
behavior with a feeling of relief from the anxiety, hostility,
tension, discomfort, and peace is restored in the subject's mind.
Example: This script will always cause a girl or boy not to sleep
with the opposite sex: "You will feel very tense and not be able to
relax if you kiss, sleep with, or stay long at your (boy or girl)
friend's house and you will feel a deep peace when you leave their
house to go back home". These types of scripts left unmanaged and not
removed can cause great harm as the subject develops and social
conditions and behaviors change over time.
4. It should benoted that the NSA precisely tailors the type of
negative and/orpositive reinforcement, the degree of the
reinforcement, theduration of the reinforcing effect and the
conditions of thetrigger. This posthypnotic event-triggered
reinforcement can beinitiated gradually and can remain so subtle
that the subjectbelieves that the discomfort is naturally occurring
and that it is the subject's decision uninfluenced by anyone else
that the subject should avoid the person, place or thing.
5.This subconscious implant can be combined with other implants like
a posthypnotic-triggered thought to enhance the subject's decision
toward the situation. For example the subject can be subconsciously
implanted with a command to be very sensitive to the changes in their
feelings and to feel great about making strong decisions to take
charge of their lives. This can be reinforced with another
posthypnotic suggestion to avoid all the situations that cause the
subject discomfort and that each time the subject commits
himself/herself to removing a situation of this kind in their lives,
they will feel an increasing control over their lives. Notethat as
the subject perceives an increasing control over theirlives they are
actually losing control to the NSAproportionately. Numerous other
examples exist and it is beyondthe scope of this document to
document every possibility.
5. Stage 1 (Prescreen Evaluation):
1. The subject'sPosthypnotic Suggestibility Index is determined by a
series ofsimple tests. Hypnoamnesia is applied to the subject for
the nameof an object or individual and the subject's speed is timed
todetermine how quickly they can overcome or not overcome the
posthypnotic suggestion "You will not be able to remember the name of
"____" no matter how hard you try. Other posthypnotic suggestions can
be used to create fear or discomfort in the subject that can be
remedied by flight or movement. The subject must overcome a
posthypnotic suggestion that they cannot move no matter how hard they
try. In summary, a posthypnotic suggestion is given to the subject
and the subject's ability to overcome it is evaluated.
2. Afull study of the subject's religious, superstitions, fears, and
insecurities is made through standard subliminal interrogation
techniques and behavioral observation.
3. Interrogationscenarios are presented to the subject using
standard subliminalinterrogation techniques and somnambulistic
interrogationtechniques. The standard two types of scenarios are
"Open-endedQuestions" (similar to multiple choice with response
labelspre-assigned to each choice) or "Reject if Disagreeable"
(negative response label if the subject disagrees). More advanced
techniques of interrogation scenarios are used as required or as
determined by the experience of the ODO.
4. Real-timeobservation, standard subliminal interrogation
techniques andsomnambulistic interrogation techniques are used to
determine thesubject's overall social status, abilities, attitudes,
andcommunication skills with primary support groups and friends.
5. Scientific understanding and practical applications experience in
the fields of psychology, hypnosis, and problem analysis are
considered risks in the subject that may complicate or inhibit
subsequent behavioral modification processes. Once the subject
identifies the technology used it is nearly impossible to contain the
potential security breach without terminating the subject. Most NSA
initiated executions (suicides) are the result of the subject
identifying the technology used or carelessness on the part of the
ODO managing the file.
6. The NSA technology affordspowerful control over the subject, the
subject's environment, andthe subject's ability to plan and
implement a disclosure toappropriate Government Agencies. When the
subject finally doesachieve a disclosure, the subject's physical and
mental conditionis depleted. The subject's ability to communicate
concisely hasbeen arrested, and the subject has already been set up
anddishonored in the sight of local and federal law enforcement
agencies to assure the subject's testimony is questionable and
unsubstantiated. Where the NSA feels that these steps cannot be
achieved in medium risk subjects, the NSA will not recruit the
subject into the behavioral modification process.
6. Stage 2(Standard Process):
1. This stage is where most subjects arebehaviorally modified to
serve and follow "God" (AKA NSAmanagement of the subject's civil
rights). If the subject acceptsreligion and direction at this stage
the NSA reinforces thesubject's relationship with Jesus and closes
the file. Thisshortened program receives the maximum return for the
NSA for theleast investment and minimizes the security risk. It also
causesthe least amount of damage and institutionalization in the
subject.
2. Coincidence:
1. Coincidence is usedto create the perception in the subject that
supernatural eventsare beginning in the subject's life. A
combination ofposthypnotic commands and pre-information awarded to
the subjectprior to an upcoming experience that the NSA intelligence
systemhas discovered gives the subject a feeling that "God" or some
other supernatural being is taken interest in their life.
2.The following is one typical technique used by the NSA. NSA
Intelligence gathers information regarding the topic of the sermon in
the subject's church. This information is gathered through electronic
surveillance equipment installed in the church. The NSA then implants
a posthypnotic command that triggers the subject's mind into concern
and contemplation about the sermon's topic prior to going tochurch.
When the subject hears the sermon, the sermon seems tobe speaking
directly to the subject that adds to God's mysteriousand
unexplainable ability to address the innermost concerns ofthe
subject, especially when the subject has not shared thoseconcerns
with any other human being.
3. Anothertypical method used by NSA concerns tragic events
occurring toloved ones. NSA Intelligence receives a local broadcast
orpreliminary information through electronic surveillance that a
subject's relative has been injured or killed. The subject is given a
posthypnotic suggestion that a feeling of dread or loss is welling up
inside them and they are directed to think of that particular loved
one. When they are finally notified through official channels,the
subject believes that they have special powers, insights, or
communications from God, aliens, or other entities.
3. REMSleep Deprivation:
1. The Rapid Eye Movement (REM) stage ofsleep is controlled and
usually limited to one to two cycles pernight resulting in micro-
sleeps during the day. REM deprivationinhibits short-term memory,
concentration, tactile abilities,verbal articulation, reasoning, and
self will. Protein synthesisis inhibited and thereby reduces the
subject's ability to healafter physical damage or after periods of
extensive exercise. Theresult is that the subject's general health
degrades as doessocial bonds and work/school performance.
2. The NSA performscontrol of REM Sleep through various methods.
Posthypnotic implants can be implanted that place a subject in a
light sleep (posthypnotic trance) with various combinations of
muscular tension and computer cycling implant deliveries (to be
discussed later).
3. Subjects typically complain of no sleep,restless sleep, waking up
every hour on the hour, staying awakeuntil the hour they have to get
up, waking up an hour after theyretire and not returning to sleep,
and typically cannot recallany dreams. Additionally, they will
complain of repeatingtorturing thoughts, racing thoughts, and facial
itching andnumbness. Daily fatigue, poor recall of names, and
caffeineconsumption is typical.
4. Dark rings' surrounding the eyesis evident and the darkened area
around the eyes can be reportedas sore or tender by the subject. The
subtle perceptualimpairing effects of REM deprivation make it more
difficult forthe subject to identify the REM Deprivation problem.
When the REMdepravation onslaught is gradual and accompanied by a
posthypnotic command that the subject "will feel energetic and
rested", the subject will not recognize the REM Deprivation.
Additional posthypnotic commands can be implanted that will make it
difficult for the subject to "see or perceive" the rings surrounding
their eyes. I have seen many subjects with very dark eye rings and
the subjects could not recognize them at all.
4. ShameFactor Enhancement:
1. Various posthypnotic suggestions areimplanted in the subject
after a week or so long period of REMdeprivation. The content of the
posthypnotic scripts isconstructed to cause the subject to perform
embarrassing andotherwise shameful acts (usually sexual but always
anti-social).These shameful behaviors are used by the NSA later to
shame theperson into a lower self esteem, reduced confidence in
their ownself discipline, a need for forgiveness from God. These
embarrassments provide a means to Blackmail or discredit the subject
if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement agency to document
the behavioral discrepancy to retain anonymity. The NSA has been
known to help subjects avoid prosecution to gain loyalty or create an
adversarial relationship between the acting agency and thesubject
(another intimidation factor) even though the NSA wasresponsible for
creating the behavioral problem in the subject'slife.
5. Religious Relevance and Convictions:
1.The NSA typically implants posthypnotic suggestions that are
clearly referenced in the Bible. The subject may be punished (through
negative reinforcement) by anything that is referenced in the Bible
to substantiate the validity of the "Word of God". When the NSA does
not follow the standard Biblical references, most subjects fail to
recognize the contradictions out of ignorance or an inability to
rationalize, or, they find other ways to justify the events to
receive peace from God (NSA). This component of the NSA process is to
provide the subject with an increased sense offear and intimidation
resulting from God's presence and force."Thou shall not disobey
God".
6. Paranoia:
1. Paranoia is a powerful tool used by the NSA. It provides a means
to develop the subject's distrust of other people including the
subject's primary group that could provide positive support during
this time of distress in the subject's life. Paranoia is often
recognized and discounted as a character fault by most peoples in
American society and therefore discredits the subject's testimony
even further. Uninformed, but well wishing people including friends,
may recommend to the subject to pursue counseling. This negative
feedback can make the subject fear that people will believe the
subject is crazy.
2. When the subject seeks professional counseling, the result will be
a misdiagnosis with an expensive, inappropriate and ineffective
treatment. The observed symptoms result from simply hypnosis, not
biological, chemical, or environmental stresses. A misdiagnosis
strongly motivates the subject not to communicate their experiences
to others to avoid social disgrace of a "schizophrenia" label and
additional financial burden. This isolation of the subject and their
reluctance to communicate their experience to others reduces NSA
security risk. The NSA cannot allow the subject to share information
with other subjects that have already experienced the program and
thereby starting a pool of information that could be compiled and
used to expose the NSA system.
3. The subject is led to believe that the subject's neighbors, work
associates and/or family are conspiring against the subject through a
number of scripts delivered to the subject by the NSA. The NSA can
further complicate the conspiracy delusion by using the same
technology to have a work associate ask the subject a question or to
make a comment that can be used by the NSA to confirm the subjects
fears. This technique further isolates the subject from trusting
their peer groups, causes additional emotional distress and hostility
toward these people. The subject sometimes resorts to violent
behavior, which is viewed by observers as irrational, unprovoked
behavior that may be treated as criminal behavior by law enforcement
personnel.
7. Stage3 (Extreme Process):
1. This method is very severe andusually results in a two to five
year program. Because of theseverity of the suffering, the subject
is usually permanentlyimpaired for integration into normal
mainstream life and isessentially institutionalized. The result is
that the subjectmust reside in a less competitive environment like a
churchgroup. Subjects that receive this program tend to be highly
superstitious, are agitated easily when objective evidence that
contradicts their belief system is presented. They tend to believe in
the spiritual world (demons, ghosts, god, spiritual entities, etc)
and consider the spiritual world to be more powerful and important
than the material or real world. This program basically follows the
following steps; REM deprivation, breakdown of self esteem and
confidence, intense suffering, exaggerated conscience, spiritual
contact, reborn in Jesus Christ, Spiritual battle, release (saved by
the Savior), and recovering (blessed by Jesus Christ). Whenever
possible the NSA will skip or reduce these steps to minimize security
risk and financial cost.
2. Increasing Dependence on Drugsand Alcohol:
1. As the REM Deprivation increases the subjectmust depend on
Central Nervous System (CNS) Stimulants tocompensate for degradation
of productivity at work, school, andin interpersonal relationships.
This serves the NSA in severalways. Use of drugs (especially CNS
stimulants) increases thesubject's index of suggestibility. Or in
other words, thepost hypnotic commands are more effective and the
subject hasgreater difficulty resisting the impulses generated by
thecommands. In addition, the increased stress of coping with the
drugs in conjunction with the resisting the newly introduced
posthypnotic commands serves to push the subject closer to an
emotional breakdown. If the subject uses illegal drugs, the NSA tries
to set the subject up for a conviction to get assure that the subject
looses credibility. Who would believe a drug user that claimed that
he/she was being harassed by a government agency that was tormenting
them with hypnosis? It also serves the NSA in the program by
documenting something that the subject will be ashamed of when the
program reaches the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also inhibit REM
Stage sleep and increase irritability over time thereby further
degrading and isolating the subject.
3. In summary, the NSAbenefits from the subject responding to the
REM Deprivationassault with self-medication. This response
discredits thesubject by labeling them in society as a drug user, it
enhancesthe effect of the implanted posthypnotic commands and it
givesthe subject a reason for shame that will be used against the
subject later to justify the punishment from "God". It should be
noted that the subject is not really guilty of anything, except being
a victim that was manipulated in a carefully controlled scientific
behavior modification process.
3. PoorNutrition:
1. The poor nutrition reduces the energy thesubject has and serves
later as another justification of God'spunishment. The subject will
be taught later that "the body isthe temple" and that to abuse it is
to violate God's will.
4. Apathy:
1. After the subject's self-esteem is brokendown and continuing
failure and persistent suffering start todominate every day, the
individual becomes apathetic as a defensemechanism. At this stage
the subject has committed another sinof "not persevering through
faith" which is later used on thesubject later to increase a feeling
of guilt.
5.Depression:
1. Depression precipitates as a result of chronicREM Sleep
Deprivation, social isolation and afeeling of helplessness in the
subject. Commonly, when thesubject seeks professional counseling,
they are misdiagnosed andtreated for depression with medications but
the root cause of theproblem (negative reinforcing posthypnotic
suggestions inflictedover long periods of time) is not treated or
corrected.
6. Insecurity:
1. The subject starts to experience severeinsecurity in this stage.
The NSA uses this insecurity againstthe subject in several ways.
Because of the impaired reasoningability and emotional isolation,
the subject is susceptible tothe approaches of insincere people,
which are used by the NSA toemotionally hurt the subject more. This
allows the NSA toconvince the subject that people can't be trusted
andthat only the NSA (Jesus) can be trusted. This serves to isolate
the subject from supportive peer groups and makes the subject
emotionally dependent on the NSA resulting in the NSA gaining more
power in the subject's life.
7. Journals and Diaries:
1. Most of the subjects are directed to keep a "Journal" or diary by
the NSA so that the subject can record and review feelings, events,
observations, and "God's directions" that normally would be
unavailable due to short term memory loss during extended periods of
REM Deprivation. The NSA uses the Subject's Journals in a variety of
ways.
8. Degrading Spelling and Grammatical Performance:1. Subjects in
these prolonged stages of REM deprivation,confusion, and emotional
distress,have very poor grammar, spelling, and short attention
spans.
9. Slowed Speech:
1. Subjects experience slower speech andhave a greater time
articulating concise points as a result ofthe REM Deprivation and
other performance degrading posthypnoticcommands. Very slight
alcohol consumption can exasperate thedamage of REM Deprivation and
precipitate slurred speech.
10. Confusion:
1. Confusion results from three primarysources; REM Deprivation,
specific posthypnotic commands toreinforce the confusion, and the
emotional damage and stress thatis being inflicted. The confusion
allows the NSA to continuouslyinflict damage to the subject's life
without real-timeobservation. A confused person generally is not as
productive as an organized clear thinker is and has a greater
potential to offend people by what they say or do and is less likely
to recognize when they have made mistakes. All of these symptoms
assist the NSA's objectives in this stage and subsequent stages. In
addition, the confusion restricts the individual from analyzing the
source of their suffering and taking corrective actions, and
therefore reduces the NSA's security risk.
11. PoorConcentration:
1. Difficulty concentrating impairs thesubject's productivity and
restrains the subject from makingself-improvements and corrections
in behavior. It makes it verydifficult for the subject to do any
research or reading toevaluate his/her condition. This paves the way
for the NSA todemonstrate that the subject cannot do anything on
their ownwithout "God", thereby increasing the frustration and
anxiety ofthe subject (inducing emotional breakdown) and ultimately
makingthe subject totally dependant on the will of God.
12. LooseAssociation and Personality Disorders:
1. The subjectexperiences disjointed thought at this stage (Loose
Association)that appears to observers as a strange sense of humor or
inappropriate responses when engaging in conversations. Ongoing
sarcasm and other negative attitudes and undesirable personality
traits can be present.
13. Anger:
1. The way thatthe subject experiences anger is of profound
importance. If thesubject allows the NSA to redirect the increasing
anger andhostilities toward the NSA to another person in the form of
violence (misplaced aggression), the NSA will reinforce the violent
behavior with posthypnotic commands. The result is a person that can
achieve national acclaim as a murderer that heard voices of Satan
directing him/her. Typically, the Subject is encouraged to commit
acts of violence with spouses, friends, or employers resulting in
further social isolation and increased shame. Some examples of NSA
directed victims of misplaced aggression include recent US Postal
Workers whom work within the Postal Service. This is one of the vial
"communication intercept" channels the NSA is directed to monitor.
The routes of suspect mail and the postal worker processing it are
continuously monitored by NSA. Sometimes the NSAODO takes issue with
a Postal Worker and harasses them orsubjects the postal worker to
behavioral modification.
14. Delusions:
1. Delusions are used to discredit thewitness and also provide an
additional source for fear,intimidation and confusion. Delusions can
be but are not limitedto the Subject developing conspiracy theories
of fellow employeesand friends, beliefs that Angels or Demons are
communicating orvisiting them, tingling sensations from microwave
guns orimplants, beliefs in supernatural events, etc.
15. AudioHallucinations:
1. Subjects often report hearing wallsclicking, footsteps in the
house, the sound of someone trying toopen the door, drilling at the
door, etc.
2. Theseaudiohallucinations are also used to discredit the witness
and alsoprovide an additional source for paranoia, fear, and
negativereinforcement.
16. Voices in the Subject's Mind:
1. The voices in the subject's mind are achieved in a variety of ways
using real-time and prescheduled posthypnotic suggestion deliveries,
and Noun Substitution implant techniques.
2. NounSubstitution Posthypnotic Implant:
1. The subject can have aposthypnotic suggestion implanted that
changes the form ofpronouns in the subject's internal thinking. The
result is thesubject perceives that someone is telling him/her to do
somethingwith nearly every thought. An example is; the subject
thinks, "Ishould go to church today". With the noun substitution
posthypnotic suggestion the subject experiences the following
internal thought, "You should go to church today!" Notice that by
implanting the posthypnotic command into the subject's subconscious
mind to think the pronoun "You" instead of "I" the subject will
perceive that they are being directed by a voice even though the
majority of the internal thought content is their own naturally
occurring thought. This subconscious implant can be used in
combination with other implants to increase the subject's perception
of threat, fear, and therefore paranoia. It can be used with other
posthypnotic suggestion implants that will give the subject the
perception of either a "good" or "evil" voice or spirit is directing
him/her. This implant is powerful because it gives thesubject the
perception that the spirit, angel, God or HolySpirit knows and
directs the subject's every thought. It providesa convincing proof
that "God knows every thought of hischildren". Subjects that don't
have a superstitious frame ofreference and seek professional help
are usually misdiagnosed asschizophrenic.
17. Tinnitus (Ear Ringing):
1.Tinnitus is commonly reported by subjects harassed by the NSA and
typically has no pharmacological or biochemical basis and is produced
by a posthypnotic suggestion. It is often misdiagnosed as ringing
caused by excessive aspirin use and is actually an audio
hallucination triggered by hypnosis.
18. Complete QuietSilence:
1. Used by the NSA as a positive reinforcement fortwo general
reasons; the subject has the tinnitus removed toindicate that the
subject has "The Lord's Peace Restored", andsecondly, the subject
has achieved a milestone toward beingreleased by God (the NSA).
19. Quiet Wind:
1. Theaudio hallucination of a quiet wind is used to convince the
subject that the Holy Spirit is visiting him/her. An excellent
example of this hallucination combined with the fear that accompanies
it is contained in Phil Collin's lyrics of a song that has the chorus
"I can get so scared, Listen to the wind".
20. VisualHallucinations:
1. Visual hallucinations are usuallyimplanted in the waking moments
when a subject is coming out ofor is in a somnambulatory state
(light sleep) preferably in adarkened room. The hallucinations are
fleeting, usually lastingless than one minute and are not durable.
Typical hallucinationsreported by subjects are Angels, large
spiders, and movement ofvarious shadowy objects across the ceiling,
bright spot of lightahead of the subject, etc.
2. The television show "Sightings"has had numerous reports of people
seeing "Aliens" at wakingmoments. These types of news accounts
create confusion in USsociety and serve to keep people searching for
the wrongphenomenon thus keeping the NSA's technology secure
(disinformation).
21. Tactile, Olfactory hallucinations andMuscle Spasms:
1. Tactile hallucinations can be more durableand are used to
communicate a desired direction to the subjecttypically aftera real-
time interrogation. Typical behavioral cues issued bythe NSA are
manifested in the form of:
1. Temporarysensation of pressure to the tip of the right index
finger(symbolizing Faith or have Faith).
2. Temporary sensation ofpressure to the tip of the left index
finger (symbolizing noFaith or "deception of Satan").
3. Temporary sensation ofpressure to the center of the right palm
(symbolizing Jesus"Sitting at the right-hand of God").
4. Temporary sensationof pressure to the ball of the right foot
(symbolizing "Get onthe Ball" or "hurry-up").
5. Temporary sensation of pressureto the tip of the right foot big
toe (symbolizing "RightDirection").
6. Temporary sensation of pressure to the tip oftheright foot
center toe (symbolizing "Fucking-up Direction").
7. Temporary sensation of pressure to the tip of the left foot big
toe (symbolizing "Wrong Direction").
8. Temporarysensation of pressure to the buttocks (symbolizing "Bad
Attitude"or "subject is acting like an ass").
9. Temporary sensationof pressure on tip of penis or clitoris
(symbolizes immoralthoughts like subject is thinking/acting with his
penis or herclitoris).
10. Temporary sensation of pressure to the leftear drum (symbolizing
"do not listen").
11. Temporarysensation of pressure to the right ear drum
(symbolizing"listen").
12. An involuntary blink of the right or left eye(symbolizing: right
eye = God's agreement orleft eye = Satan's agreement).
13. Temporary tinglingsensation on the Testicles (symbolizing
insufficient maleconfidence or "Having no balls or strength").
14. Temporarytingling on other areas of the body to imply that
somethinginvisible and/or supernatural is touching the subject. May
beperceived as threatening or reassuring to the subject. Can be used
to intimidate and confuse the subject often times combined with
additional posthypnotic implants to inflict delusions like "being
attacked with microwaves" or being caressed by Angels.
15.Muscular spasm or perceived pressures near the jugular vein on
right side of neck (symbolizing Satan having subject by Jugular or
throat). This is used to inflict fear and doubt.
16.Muscularspasms are sometimes used to inflict severe pain on the
subjectby causing extreme involuntary contraction of the sphincter
inthe anal region or other lower back or leg muscles.
17.Perceived odor sensation of a thick, sweet smell (symbolizing
Satan's sweet victory over the subject's soul).
9. Thissection is written in an attempt to provide interested
individuals with some of the considerations and precautions when
seeking to demonstrate the NSA's civil rights abuses by demonstrating
the effectiveness and concepts of subliminal access using Subliminal
Implanted Posthypnotic Suggestions and Scripts Using Acoustically
Delivered and Phonetically Accelerated Posthypnotic Commands without
Somnambulistic Preparation in the Subject.
1. Reverseengineering of the NSA's technology to prove it's abuses
againstthe American people is quite difficult. Conside the
following.
2. If the scientists and technicians perform their research in a
facility that the NSA has the standard transceivers installed, and
therefore the NSA can influence the direction of research or the data
by effecting perceptual effects in the researchers. These perceptual
effects can be confusion, lack of attention to important details,
oversights, bad assumptions, incorrect interpretation of the test
data. These same misperceptions will also be incorporated into the
research test subjects. The technology cannot be developed and
optimized if the NSA has any access to the test subjects. The test
scripts given to the testsubject delivered from the researcher can
be neutralized by theNSA delivering a canceling script immediately
after theresearcher's script. The NSA's test script can also include
ahypnoamnesia script at the end to cancel any residual perception in
the subject so that the test subject would report no effects and the
researcher would conclude the test script had no effect.
3. The research must be carried out in a facility secured from all
NSA electronic intrusion. All equipment in the facility must be
TEMPEST protected and electrically isolated from the outside world.
The research personnel and their subjects must never leave the
secured area of the facility so that they cannot be subliminally
interrogated by the NSA. The NSA would take this opportunity to
deliver disinformation scripts to the subject or researcher.
Foodstuffs and supplies would be the logical choice of NSA intrusion
if all other security measures were effective against the NSA.
4. The NSA will exploit all opportunities to introduce microscopic
transceivers into the facility of it's surrounding grounds. The
minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to capture
response labels during subliminal interrogations. This can be through
normal illumination or infrared to see through window, or millimeter
wave or other technologies that can see through barriers like walls
and ceilings.
3. Audible response labels can be used if the NSA has a micro
receiver with a micro speaker inside but cannot get a transmitter in
and operating without detection. Sneezes, coughs, clearing of throat
that can be picked up by laser microphones, audible amplification
microphones, etc. can also be used as response labels.
5.The NSA currently has satellites with millimeter wave technology
that will allow visible intrusion into most facilities. The test
facilities should be deep underground, AKA 1000 feet with no adjacent
access from other facilities, sewer lines, water lines or power
conduits etc.
6. Any facilities existing will have to bedebugged before habitation
and research begins.
7.Subjects must be able to be subjected totraditional hypnosis
after facility habitation as a test priorto research to assure that
the NSA has minimal scripts alreadyimplanted.
8. This technology is the highest level ofintelligence gathering for
the USA. The abuses resulting frommismanagement of this area of the
NSA's intelligence system mustforce Congress to legislate additional
laws to protect thecitizens. The NSA must regulate this system
better. The NSA willtake all necessary steps without limit to assure
that thistechnology is preserved and autonomously under their
control.
10. Conclusion: America's greatest and highest level intelligence
asset is being mismanaged and the mismanagement must be corrected
before all the Enemies of our great country acquire it. Imagineif
China had this technology to use on their defenselesspopulation?
11. May God help us all in protecting theAmerican public and
preserving and managing this vitaltechnology's vital potential to
serve America's NationalSecurity.
http://www.topica.com/lists/EDD/read/message.html?mid=1601892956
=============================================================================================
From Newshawk:
Mass Mind Control in the Present-Day U.S.-- The big picture
There are a number of interlockingsystems, technologies and techniques
which are currently beingdeployed against the citizens of the United
States of America bycertain segments of ournational government.
First, there are literally COUNTLESSmind-control projects and
sub-projects in operation at this timewhich target SPECIFIC
subjects/victims in a variety of ways;using one or more of a number of
technologies such as drugs,(ritual) psycho-sexual abuse, a vast panoply
of different EM/RFmind control technologies, repetitive conditioning,
hypnotictrance induction, and so on and on and on.
Reliable reportsfrom MANY different sources indicate that as many as
TEN MILLIONindividuals many be ACTIVE subjects/victims of these kinds of mindcontrol activities, and huge quantities of hard documentation on a greatmany of these projects DOES exist.
However, in addition tothese kinds of mind control operations, there are
ALSO mindcontrol and mind manipulationactivities that target MASSES
of people in large geographicalregions at the same time. Indeed, there
is VERY strong evidencethat the operators of HAARP for example, have
ever since HAARP'searliest days intended that it be used for, among many other things,GLOBAL mind control.
There is in FACT much evidence to showthat HAARP is NOW being used for just such utterly evil purposes by theUnited States federal government.
Of course, there are manyother EM/RF technologies and systems which
are, or may be,applied to mass-scale mind, mood, thought and
consciousnesscontrol/manipulation operations: such as the nationwide
"GWEN"(Ground Wave Emergency Network) system, certain ELF and ULF transmittersystems, and so on (such as your TV set, even IF it's turned OFF!)
Another way to manipulateand "regulate" the minds and consciousness of a mass of people at aVERY basic, fundamental level is to CONTROL the population's PRIMARYsources of INFORMATION. This is one of the MOST powerful ways shape thecollective consciousness of the public, and it is CLEAR that many massmedia outlets in the United States are both willingly and un-wittinglyaiding and abetting the manipulation of
our minds by thegovernment, and are assisting the FedGov in carrying out manysocial-engineering agendas.
The mass media's treatment ofschool shooting incidents, for instance,
plays DIRECTLY andTOTALLY into the schemes of those who deployed the mind-controlledkillers to carry out these shootings, in a grand plan to
shutdown our Constitution's 2nd Amendment, among other things.
Moreover, very carefully designed CONDITIONING programs and tacticshave been brought to bearagainst nearly EVERY segment of society;
disseminated throughoutthe nation and the world by mass media and
entertainmentindustries and corporations; and imbedded in ALL forms of so-calledentertainment at this point, such as movies, TV shows, video
andcomputer games ESPECIALLY, some pop music, and so on.
Thiscondition of constant, relentless bombardment with grotesquely violentimagery, which the general population, ESPECIALLY its younger members,is inundated with by nearly ALL forms of popular contemporaryentertainment
and sources of "information", is indeed directlyderived from those
mind-conditioning programs and systemsdeveloped at Fort Detrick (and
other similar locations). SanDiego shooter Charles Williams' father
worked at the Army's FortDetrick facility for THIRTEEN YEARS.
Specifically, indoctrination/conditioning programs were developed at
Fort Detrick in which subjects were repeatedly, continually and
continuously immersed in virtual reality-type video/computer "games"
of extreme and GRAPHIC brutality, for long stretches of time and
over an extended time frame.
This kind of psychologicalassault proved very effective in rapidly
obliterating subjects'ethical and moral values and cultural norms with
regard toviolence, brutality, killing and so on.
These systems wereperfected, applied to the brainwashing and
conditioning ofmembers of the U.S. military and also turned over to
theintelligence sectors for other applications. The intelligence sector,
in turn, DELIBERATELY and successfully undertook to have this samekind of HIGHLYnegative, destructive and effective conditioning applied to SOCIETY AS AWHOLE, via mass conditioning of our consciousness through theentertainment and information industries, as noted.
OneOTHER method of mass mind control/manipulation/conditioning which is NOWbeing utilized MORE and MORE -- ESPECIALLY against the most vulnerablemembers of our society, our CHILDREN -- is the
highly-reprehensible/questionable and increasingly common MANDATED
DRUGGING of ever-growing numbers of children through hugely intrusive,invasive, ill-advised, psychologically unpredictable and often
destructive programs mandated, usually for young males, by psychiatrists
and social workers. More and more of our children are being dosed on a
long-term basis with any of a number of psychotropic/psychiatricdrugs
like Prozac, Ritalin, Luvox, and soon.
These drugs not ONLY are PROVEN to induce SEVERE andoften VERY VIOLENT psychotic reactions among a significant percentage ofsubjects, but ALSO clearly and provably create a stupefied,dumbed-down, zombified mental state in targeted subjects which is aPERFECT "ground state" for the carrying out of yet OTHER mindcontrol/manipulation/conditioning activities
on these very samesubjects. In general, this kind of psych-drugging makes
the jobof further mind control programming MUCH easier. And this kind ofdrugging is being done to ever-increasing numbers of our children, downto toddlers as young as TWO and THREE YEARS OLD!!
Now,there is ANOTHER way in which our present-day society is being
literally and effectively mind-controlled en masse.
Most allof the individually-targeted mind control programs we noted
aboveuse one or more methods to induce a PSYCHOTIC BREAK or SPLITPERSONALITY in the victim/subject. In fact, one or more of these
deliberately-induced split personalities formed as a result of
psycho-sexual abuse or other conditioning are those facets of the
subject's psyche which ARE actually "programmed"; to kill, or whatever
else. It's been shown that forcing victims/subjects to witness,experience
or participate in just about any highly-traumatic andshocking events on a
repeated basis will induce the kind ofpsychotic break(down) that is a
necessary prerequisite forintensive mind control programming/conditioning.
SO: WHEN oursociety as a whole is FORCED to confront and WITNESS over and over andover again something as FUNDAMENTALLY shocking as having our youngpeople perpetrating inconceivably horrific massmurders of peers and others on A REGULAR BASIS, as is NOW THE CASE inthe present-day United States, then the population as a whole AND on anindividual basis to some extent develops an analogous, similar
psychological break, and in FACT to some extent develops split
personality/multiple personality disorder conditions... READY FOR
FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarilydisturbing events which impact society AS A
WHOLE, such as theseschool shootings by young people that have just
occurred, ALSOserve the malignant, demonic agendas of the FedGov/NWO socialcontrollers who set these terrible mass killings off; and the incidentsthemselves serve to further condition, manipulate and "mind control" thepopulation of the United States in the year 2001.
http://www.topica.com/lists/Slick-D/read/message.html?mid=1601615926
==============================================================================================
What are Artificial Neural Networks? The implementation of NeuralNetworks for brain-like computations like patterns recognition,decisions making, motory control and many others is made possible by theadvent of large scale computers in the late 1950's. http://www.rgsoftware.com
Electronic Mind Control
http://apfn.org/apfn/electronic.htm
APFN MIND CONTROL INFO & LINKS:
http://www.apfn.org/apfn/mind.htm
Contrails (Chemtrails)
http://www.apfn.org/apfn/contrails.htm
We Are At WAR
by Sheriff Mike
http://www.apfn.org/apfn/atwar.htm
[Help] MIND CONTROL VICTIM!
http://www.apfn.org/apfn/victim.htm
WIZARD OF OZ and the ILLUMINATI MIND CONTROL
http://www.apfn.org/apfn/oz.htm
THE AMERICAN HALLUCINATION
http://www.apfn.org/apfn/halluc.htm
Aluminum FoilDeflector Beanie
An Effective, Low-Cost Solution To CombatingMind-Control
http://zapatopi.net/afdb.html
Secret US Human Biological Experimentation
http://www.apfn.org/apfn/experiment.htm
Click here to donate to APFN
Subscribe to apfn-1
chooser.gif (706373 bytes)
Powered by groups.yahoo.com
American Patriot Friends Network
"...a network of networkers..."
APFN Message Board
APFN ContentsPage
APFN Home Page
Hit Counter
Lastupdated 09/12/2004