Thursday, July 29, 2010

NSA

NSA Mind Control and Psyops

by Will Filer

1. INTRODUCTION
2. TECHNOLOGY TITLE
3. APPLICATIONS
1. Intelligence
2. Counterintelligence
3. Behavior Modification and Accelerated Resocialization
4. DEFINITIONS AND ACRONYMS
1. Age Regression 2. Hypnoamnesia 3. NSA 4. ODO 5. Posthypnotic Command 6. Posthypnotic Suggestion 7. Posthypnotic Suggestibility Index 8. REM DEP 9. Script 10. Somnambulatory State
11. Subliminal Implant
12. Transceivers (NSA)
5. TECHNOLOGY OVERVIEW
2. Thought Labels (Response Labels)
3. Post-Hypnotic Delivery Method
4. Using the Post-Hypnotic Delivery Method with Thought Labels
6. OTHER REFERENCE MATERIAL
7. NSA CASE HISTORY EXAMPLE SUMMARIES
NSA Self-Initiated Execution (Suicide)
1. Bamford's "The Puzzle Palace"
2. NSA Initiated Execution to Cover-up in the News
3. NSA Initiated Execution to Cover-up in Music Curt Cobain
4. NSA Initiated Executions in Overseas Defense Project
5. Musical references of NSA Technology
6. NSA Counterintelligence Experiments David Koresh Russell Eugene Weston
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
1. ABSTRACT, Behavioral Modification:
3. BEHAVIORAL MODIFICATION PROCESS:
1. Triggering Techniques:
2. Real-Time Subconscious Implant Delivery:
3. Prescheduled Subconscious Implant Delivery:
4. Event-Triggered (conditional) Implant Delivery:
5. Stage 1 (Prescreen Evaluation):
6. Stage 2 (Standard Process)
2. Coincidence
3. REM Sleep Deprivation:
4. Shame Factor Enhancement:
5. Religious Relevance and Convictions:
6. Paranoia:
7. Stage 3 (Extreme Process):
2. Increasing Dependence on Drugs and Alcohol:
3. Poor Nutrition:
4. Apathy:
5. Depression:
6. Insecurity:
7. Journals and Diaries:
8. Degrading Spelling and Grammatical Performance:
9. Slowed Speech:
10. Confusion:
11. Poor Concentration:
12. Loose Association and Personality Disorders:
13. Anger:
14. Delusions:
15. Audio Hallucinations:
16. Voices in the Subject's Mind:
17. Tinnitus (Ear Ringing):
18. Complete Quiet Silence:
19. Quiet Wind:
20. Visual Hallucinations:
21. Tactile, Olfactory hallucinations and Muscle Spasms:



From: abemarf@aol.com (Abemarf)
Newsgroups: alt.mindcontrol
Subject: The NSA and Mind Control
Date: 20 Aug 1999 08:50:21 GMT

NSA mind control and psyops

The following was sent to me by Will Filer on July 27, 1999. It offers a new explanation for government mind control. Will has stated to me that he is a former consultant to the U.S. National Security Agency and asked me to post this information immediately. He also believes he is in immediate danger because of this information.

If you have comments on this document, feel free to post them to the MINDCONTROL-L list.

- Wes Thomas, moderator, MINDCONTROL-L list

Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.


1. INTRODUCTION:

1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA's Behavioral Modification Procedure Outline documented for the non-technical person.

2. TECHNOLOGY TITLE:

1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. "Computer Simulated Subconscious Speech Language".

3. APPLICATIONS:

1. Intelligence:

1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen's opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.

2. Counterintelligence:

1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).

3. Behavior Modification and Accelerated Resocialization:

1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.

2. The NSA uses this technology to resocialize (brainwash) the US civilian voting population into "Giving their lives to Christ" (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a "Personal Relationship with Jesus Christ" (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.

4. DEFINITIONS AND ACRONYMS:

1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.

2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic suggestion.

3. NSA: United States National Security Agency, Fort Mead, Maryland.

4. ODO: On-Duty Officer, or officer-on-duty.

5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term "Command" is more commonly used when the hypnosis is forcibly given to the subject and when the subject's will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index
increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the "Suggestion" any longer thereby making it a "Command".

6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.

7. Posthypnotic Suggestibility Index: An index or rating of a subject's susceptibility and sensitivity to hypnosis.

8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.

9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;

(1) an identifier (subject's name, description, or other identifying factor),
(2) trigger activation condition or conditions (when, what or how the suggestion will trigger),
(3) the content (what the trigger will precipitate in the perception of the subject),
(4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to "strengthen" or reinforce the central posthypnotic command.

10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.

11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject's subconscious mind.

12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject's site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.

5. TECHNOLOGY OVERVIEW:

1. In addition to the ability to see and hear what is going on inside people's homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.

2. Thought Labels (Response Labels):

1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or "read minds" so to speak.

2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation "thought labels".

3. Post-Hypnotic Delivery Method:

1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. "How can hypnosis be used?" you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words "Drink Coca Cola" were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.

2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting "sped-up" script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.

3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions.

The empty space between words is minimized and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element's acoustic wave train thus reducing the actual number of sine waves making up a word by 50% or more. This reduces the actual length of the time it takes the phoneme to be delivered prior to accelerating (speeding-up) the delivery (like fast forward). This helps the message to be played at higher speeds and reduces the subject's ability to recognize it as accelerated speech. The technique of using optimized digitally sampled and edited phonemes appended together to for words and then sentences structured as hypnotic suggestions can be termed "computer simulated subconscious speech language".

4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many "subliminal tapes" on the market to program your subconscious mind. These tapes have their "messages" recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won't hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA's high-speed audio subliminal message.

5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA's message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the "posthypnotic" script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:

1. Professional state-of-the-art technology recording equipment.
2. Digital acoustic wave editing equipment.
3. Advanced engineering knowledge of acoustic wave science.
4. Phonetics and linguistics expertise.
5. Hypnosis theory and scripting.
6. Ideal environmental conditions for recording.
7. NSA ignorance of the subject's intent and ability to capture a message.

6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can "program" or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.

4. Using the Post-Hypnotic Delivery Method with Thought Labels:

1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be "Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice." From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever:

1) cheated on your taxes, and:
2) If the IRS could catch you in an audit.

2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book "1984". As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.

3. The NSA's goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a "voice print" from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.

If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person's location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.

4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950's and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.

Originally, after noting the behavioral effects in visual subliminal effects like the highly publicized event where stating "Drink Coca Cola" on a single movie frame "delivered a higher rates of speed than normal movie viewing raised the obvious question, "Does the human hearing work as good as eyesight accepting subliminal messages?"

Preliminary theory work was transferred to Fort Mead NSA who had expertise in characterizing language in analog domains where a sampled phoneme could be edited (shortened by removing excess sine waveforms from the "acoustic wavetrain") and electronically reconstructed back into shortened words of language.

Some of the early experiments included "Remote Viewing at NSA where the Viewer would relax, open their mind and explain the clarity of images that were described by the NSA using this technology. These early experiments allowed the NSA to refine the specifications of the "Computer Simulated Subconscious Speech Language" and the scripting formats to maximize the ability to deliver an accurate "vision or picture" into the subject. Pictures already seen by the subject could simply be recalled using "Age regression" script variations.

6. OTHER REFERENCE MATERIAL:

1. Please refer to the book "Inside America's Most Secret Agency, The Puzzle Palace" by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA's history and the NSA's first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.

7. NSA CASE HISTORY EXAMPLE SUMMARIES:

NSA Self-Initiated Execution (Suicide):

1. Bamford's "The Puzzle Palace" references one of the NSA's first self-initiated execution (suicide) with this "Thought Control" technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.

2. NSA Initiated Execution to Cover-up in the News:

1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could "read minds" and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news "The gunman was demanding to talk with the Director of the CIA" etc. disappeared quickly (suppressed?) from later news accounts.

3. NSA Initiated Execution to Cover-up in Music:

1. Curt Cobain of the musical group "Nirvana" was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the "Friends inside his head". Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.

4. NSA Initiated Executions in Overseas Defense Project:

1. Some years back several employees of the United Kingdom's Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not "Staged" suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.

5. Musical references of NSA Technology:

1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA's brainwashing technology in a song called "Wild Wild Life". The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that "They (NSA) talk so fastà" and that the musical group had spent "All their time and money" unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.

6. NSA Counterintelligence Experiments:

1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.

2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA's behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn't figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.

3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject's health degraded.

4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for "God" to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, "God spoke to them and said to commit suicide" and they did securing another one of the NSA's great experiments in mind control and social pathology.

5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA's technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.

7. The cases of NSA activities go on and on. With access to the FBI's Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their "Thought Control" technology.

8. Currently, the NSA has many subjects in the field (our society) that need only a series of "triggers" (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them "Shooters on a Shelf". A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that "someone" (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.

9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have "Friends inside their heads" also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.

8. NSA BEHAVIORAL MODIFICATION PROCEDURE:

1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency's Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.

2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called "reborn" by the church, with the subject's life-long goal of "a personal relationship with Jesus Christ".

1. ABSTRACT, Behavioral Modification:

1. The NSA's behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject's net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject's posthypnotic suggestibility index, the subject's intelligence and reasoning ability, moral and superstitious beliefs, and the subject's social status and the weakness of the subject's primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.

2. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject's will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.

3. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject's neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of "Implants" in their body.

It is important for the subjects to understand that the NSA controls this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject's experiences. Nobody has the time or inclination to follow a subject around with a microwave gun to tickle various parts of the body. We are saturated with microwaves all the time from television stations, communication satellites, etc and yet we do not have any symptoms because microwaves do not have the ability to trigger localized synaptic responses in our brains. Furthermore, when the subject is in a room surrounded by several people, and the subject is the only one experiencing the "thoughts", tingling feelings, etc., then obviously a delivery method is being employed that affects only the subject; high-speed acoustic delivered hypnosis.

4. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow "God or Jesus to speak directly to the subject" and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA's technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and "Gives their Life to Christ" and the NSA achieves total control of the subject.

5. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as "God and Jesus works in their life". Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).

6. The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA's electronic surveillance system captures and sorts the prayers by "Keywords". The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to "God's will". If the subject resist's the NSA's instructions, additional punishments are inflicted on the subject.

7. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other "Christians" to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject's problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).

8. A subject that has successfully completed the NSA's behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject's lives are relatively unproductive because their focus is on their "Life after death" and not what they accomplish while they are alive. They avoid "worldly activities", and usually are confused and disjointed in rational thoughts and concepts. For instance, they don't believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.

3. BEHAVIORAL MODIFICATION PROCESS:

1. Triggering Techniques:

1. The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.

2. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.

2. Real-Time Subconscious Implant Delivery:

1. Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject's response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a "voice" heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA's activities.

3. Prescheduled Subconscious Implant Delivery:

The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script's transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can't be associated with a commonly recurring situation like event-triggered scripts precipitate.

4. Event-Triggered (conditional) Implant Delivery:

1. Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.

2. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to "script" and use them.

3. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want's to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject's behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject's mind.

Example: This script will always cause a girl or boy not to sleep with the opposite sex: "You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy or girl) friend's house and you will feel a deep peace when you leave their house to go back home". These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time.

4. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject's decision uninfluenced by anyone else that the subject should avoid the person, place or thing.

5. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject's decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.

5. Stage 1 (Prescreen Evaluation):

1. The subject's Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject's speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion "You will not be able to remember the name of "____" no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject's ability to overcome it is evaluated.

2. A full study of the subject's religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.

3. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are "Open-ended Questions" (similar to multiple choice with response labels pre-assigned to each choice) or "Reject if Disagreeable" (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.

4. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject's overall social status, abilities, attitudes, and communication skills with primary support groups and friends.

5. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.

6. The NSA technology affords powerful control over the subject, the subject's environment, and the subject's ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject's physical and mental condition is depleted. The subject's ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject's testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.

6. Stage 2 (Standard Process):

1. This stage is where most subjects are behaviorally modified to serve and follow "God" (AKA NSA management of the subject's civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject's relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.

2. Coincidence:

1. Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject's life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that "God" or some other supernatural being is taken interest in their life.

2. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject's church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject's mind into concern and contemplation about the sermon's topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God's mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.

3. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject's relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.

3. REM Sleep Deprivation:

1. The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject's ability to heal after physical damage or after periods of extensive exercise. The result is that the subject's general health degrades as does social bonds and work/school performance.

2. The NSA performs control of REM Sleep through various methods. Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be
discussed later).

3. Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.

4. Dark rings' surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem. When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject "will feel energetic and rested", the subject will not recognize the REM Deprivation. Additional posthypnotic commands can be implanted that will make it difficult for the subject to "see or perceive" the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.

4. Shame Factor Enhancement:

1. Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.

2. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject's life.

5. Religious Relevance and Convictions:

1. The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the "Word of God". When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God's presence and force. "Thou shall not disobey God".

6. Paranoia:

1. Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject's distrust of other people including the subject's primary group that could provide positive support during this time of distress in the subject's life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject's testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.

2. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a "schizophrenia" label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.

3. The subject is led to believe that the subject's neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement
personnel.

7. Stage 3 (Extreme Process):

1. This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.

2. Increasing Dependence on Drugs and Alcohol:

1. As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject's index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.

2. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject.

3. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from "God". It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.

3. Poor Nutrition:

1. The poor nutrition reduces the energy the subject has and serves later as another justification of God's punishment. The subject will be taught later that "the body is the temple" and that to abuse it is to violate God's will.

4. Apathy:

1. After the subject's self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of "not persevering through faith" which is later used on the subject later to increase a feeling of guilt.

5. Depression:

1. Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.

6. Insecurity:

1. The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can't be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject's life.

7. Journals and Diaries:

1. Most of the subjects are directed to keep a "Journal" or diary by the NSA so that the subject can record and review feelings, events, observations, and "God's directions" that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject's Journals in a variety of ways.

8. Degrading Spelling and Grammatical Performance:

1. Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress, have very poor grammar, spelling, and short attention spans.

9. Slowed Speech:

1. Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.

10. Confusion:

1. Confusion results from three primary sources; REM Deprivation, specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject's life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA's objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA's security risk.

11. Poor Concentration:

1. Difficulty concentrating impairs the subject's productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without "God", thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.

12. Loose Association and Personality Disorders:

1. The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.

13. Anger:

1. The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial "communication intercept" channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.

14. Delusions:

1. Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.

15. Audio Hallucinations:

1. Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc.

2. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.

16. Voices in the Subject's Mind:

1. The voices in the subject's mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.

2. Noun Substitution Posthypnotic Implant:

1. The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject's internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, "I should go to church today". With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, "You should go to church today!"

Notice that by implanting the posthypnotic command into the subject's subconscious mind to think the pronoun "You" instead of "I" the subject will perceive that they are being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject's perception of threat, fear, and therefore paranoia. It can be used with other posthypnotic suggestion implants that will give the subject the perception of either a "good" or "evil" voice or spirit is directing him/her.

This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject's every thought. It provides a convincing proof that "God knows every thought of his children". Subjects that don't have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic.

17. Tinnitus (Ear Ringing):

1. Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.

18. Complete Quiet Silence:

1. Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has "The Lord's Peace Restored", and secondly, the subject has achieved a milestone toward being released by God (the NSA).

19. Quiet Wind:

1. The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin's lyrics of a song that has the chorus "I can get so scared, Listen to the wind".

20. Visual Hallucinations:

1. Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc.

2. The television show "Sightings" has had numerous reports of people seeing "Aliens" at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA's technology secure (disinformation).

21. Tactile, Olfactory hallucinations and Muscle Spasms:

1. Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:

1. Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).

2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or "deception of Satan").

3. Temporary sensation of pressure to the center of the right palm (symbolizing Jesus "Sitting at the right-hand of God").

4. Temporary sensation of pressure to the ball of the right foot (symbolizing "Get on the Ball" or "hurry-up").

5. Temporary sensation of pressure to the tip of the right foot big toe (symbolizing "Right Direction").

6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing "Fucking-up Direction").

7. Temporary sensation of pressure to the tip of the left foot big toe (symbolizing "Wrong Direction").

8. Temporary sensation of pressure to the buttocks (symbolizing "Bad Attitude" or "subject is acting like an ass").

9. Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).

10. Temporary sensation of pressure to the left ear drum (symbolizing "do not listen").

11. Temporary sensation of pressure to the right ear drum (symbolizing "listen").

12. An involuntary blink of the right or left eye (symbolizing: right eye = God's agreement or left eye = Satan's agreement).

13. Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or "Having no balls or strength").

14. Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like "being attacked with microwaves" or being caressed by Angels.

15. Muscular spasm or perceived pressures near the jugular vein on
right side of neck (symbolizing Satan having subject by Jugular or
throat). This is used to inflict fear and doubt.

16. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.

17. Perceived odor sensation of a thick, sweet smell (symbolizing Satan's sweet victory over the subject's soul).

9. This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA's civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.

1. Reverse engineering of the NSA's technology to prove it's abuses against the American people is quite difficult. Consider the following.

2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers.

These perceptual effects can be confusion, lack of attention to important details, oversights, bad assumptions, incorrect interpretation of the test data. These same misperceptions will also be incorporated into the research test subjects. The technology cannot be developed and optimized if the NSA has any access to the test subjects. The test scripts given to the test subject delivered from the researcher can be neutralized by the NSA delivering a canceling script immediately after the researcher's script. The NSA's test script can also include a hypnoamnesia script at the end to cancel any residual perception in the subject so that the test subject would report no effects and the researcher would conclude the test script had no effect.

3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world.

The research personnel and their subjects must never leave the secured area of the facility so that they cannot be subliminally interrogated by the NSA. The NSA would take this opportunity to deliver disinformation scripts to the subject or researcher. Foodstuffs and supplies would be the logical choice of NSA intrusion if all other security measures were effective against the NSA.

4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it's surrounding grounds. The minimal requirements for the NSA to take control of the research are:

1. NSA audio delivery (a micro receiver with a micro speaker)

2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.

3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.

5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.

6. Any facilities existing will have to be debugged before habitation and research begins.

7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.

8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA's intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.

10. Conclusion: America's greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population?

11. May God help us all in protecting the American public and preserving and managing this vital technology's vital potential to serve America's National Security.

http://www.topica.com/lists/EDD/read/message.html?mid=1601892956

=============================================================================================

From Newshawk:

Mass Mind Control in the Present-Day U.S. -- The big picture

There are a number of interlocking systems, technologies and techniques
which are currently being deployed against the citizens of the United
States of America by certain segments of our national government.

First, there are literally COUNTLESS mind-control projects and
sub-projects in operation at this time which target SPECIFIC
subjects/victims in a variety of ways; using one or more of a number of
technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply
of different EM/RF mind control technologies, repetitive conditioning,
hypnotic trance induction, and so on and on and on.

Reliable reports from MANY different sources indicate that as many as
TEN MILLION individuals many be ACTIVE subjects/victims of these kinds
of mind control activities, and huge quantities of hard documentation on
a great many of these projects DOES exist.

However, in addition to these kinds of mind control operations, there are
ALSO mind control and mind manipulation activities that target MASSES
of people in large geographical regions at the same time. Indeed, there
is VERY strong evidence that the operators of HAARP for example, have
ever since HAARP's earliest days intended that it be used for, among many
other things, GLOBAL mind control.

There is in FACT much evidence to show that HAARP is NOW being used for
just such utterly evil purposes by the United States federal government.

Of course, there are many other EM/RF technologies and systems which
are, or may be, applied to mass-scale mind, mood, thought and
consciousness control/manipulation operations: such as the nationwide
"GWEN" (Ground Wave Emergency Network) system, certain ELF and ULF
transmitter systems, and so on (such as your TV set, even IF it's turned
OFF!)


Another way to manipulate and "regulate" the minds and consciousness of
a mass of people at a VERY basic, fundamental level is to CONTROL the
population's PRIMARY sources of INFORMATION. This is one of the MOST
powerful ways shape the collective consciousness of the public, and it is
CLEAR that many mass media outlets in the United States are both
willingly and un-wittingly aiding and abetting the manipulation of
our minds by the government, and are assisting the FedGov in carrying out
many social-engineering agendas.

The mass media's treatment of school shooting incidents, for instance,
plays DIRECTLY and TOTALLY into the schemes of those who deployed the
mind-controlled killers to carry out these shootings, in a grand plan to
shut down our Constitution's 2nd Amendment, among other things.


Moreover, very carefully designed CONDITIONING programs and tactics have
been brought to bear against nearly EVERY segment of society;
disseminated throughout the nation and the world by mass media and
entertainment industries and corporations; and imbedded in ALL forms of
so-called entertainment at this point, such as movies, TV shows, video
and computer games ESPECIALLY, some pop music, and so on.

This condition of constant, relentless bombardment with grotesquely violent
imagery, which the general population, ESPECIALLY its younger members, is
inundated with by nearly ALL forms of popular contemporary entertainment
and sources of "information", is indeed directly derived from those
mind-conditioning programs and systems developed at Fort Detrick (and
other similar locations). San Diego shooter Charles Williams' father
worked at the Army's Fort Detrick facility for THIRTEEN YEARS.

Specifically, indoctrination/conditioning programs were developed at
Fort Detrick in which subjects were repeatedly, continually and
continuously immersed in virtual reality-type video/computer "games"
of extreme and GRAPHIC brutality, for long stretches of time and
over an extended time frame.

This kind of psychological assault proved very effective in rapidly
obliterating subjects' ethical and moral values and cultural norms with
regard to violence, brutality, killing and so on.

These systems were perfected, applied to the brainwashing and
conditioning of members of the U.S. military and also turned over to
the intelligence sectors for other applications. The intelligence sector,
in turn, DELIBERATELY and successfully undertook to have this same kind
of HIGHLY negative, destructive and effective conditioning applied to
SOCIETY AS A WHOLE, via mass conditioning of our consciousness through
the entertainment and information industries, as noted.


One OTHER method of mass mind control/manipulation/conditioning which is
NOW being utilized MORE and MORE -- ESPECIALLY against the most
vulnerable members of our society, our CHILDREN -- is the
highly-reprehensible/questionable and increasingly common MANDATED
DRUGGING of ever-growing numbers of children through hugely intrusive,
invasive, ill-advised, psychologically unpredictable and often
destructive programs mandated, usually for young males, by psychiatrists
and social workers. More and more of our children are being dosed on a
long-term basis with any of a number of psychotropic/psychiatric drugs
like Prozac, Ritalin, Luvox, and so on.

These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT
psychotic reactions among a significant percentage of subjects, but ALSO
clearly and provably create a stupefied, dumbed-down, zombified mental
state in targeted subjects which is a PERFECT "ground state" for the
carrying out of yet OTHER mind control/manipulation/conditioning activities
on these very same subjects. In general, this kind of psych-drugging makes
the job of further mind control programming MUCH easier. And this kind of
drugging is being done to ever-increasing numbers of our children, down to
toddlers as young as TWO and THREE YEARS OLD!!


Now, there is ANOTHER way in which our present-day society is being
literally and effectively mind-controlled en masse.

Most all of the individually-targeted mind control programs we noted
above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT
PERSONALITY in the victim/subject. In fact, one or more of these
deliberately-induced split personalities formed as a result of
psycho-sexual abuse or other conditioning are those facets of the
subject's psyche which ARE actually "programmed"; to kill, or whatever
else. It's been shown that forcing victims/subjects to witness, experience
or participate in just about any highly-traumatic and shocking events on a
repeated basis will induce the kind of psychotic break(down) that is a
necessary prerequisite for intensive mind control programming/conditioning.

SO: WHEN our society as a whole is FORCED to confront and WITNESS over
and over and over again something as FUNDAMENTALLY shocking as having
our young people perpetrating inconceivably horrific mass murders of
peers and others on A REGULAR BASIS, as is NOW THE CASE in the
present-day United States, then the population as a whole AND on an
individual basis to some extent develops an analogous, similar
psychological break, and in FACT to some extent develops split
personality/multiple personality disorder conditions... READY FOR
FURTHER MIND CONTROL PROGRAMMING.

THUS: such extraordinarily disturbing events which impact society AS A
WHOLE, such as these school shootings by young people that have just
occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO
social controllers who set these terrible mass killings off; and the
incidents themselves serve to further condition, manipulate and "mind
control" the population of the United States in the year 2001.
http://www.topica.com/lists/Slick-D/read/message.html?mid=1601615926

==============================================================================================

What are Artificial Neural Networks? The implementation of Neural Networks for brain-like computations like patterns recognition, decisions making, motory control and many others is made possible by the advent of large scale computers in the late 1950's. http://www.rgsoftware.com/

Electronic Mind Control
http://apfn.org/apfn/electronic.htm

APFN MIND CONTROL INFO & LINKS:
http://www.apfn.org/apfn/mind.htm

Contrails (Chemtrails)
http://www.apfn.org/apfn/contrails.htm

We Are At WAR
by Sheriff Mike
http://www.apfn.org/apfn/atwar.htm

[Help] MIND CONTROL VICTIM!
http://www.apfn.org/apfn/victim.htm


WIZARD OF OZ and the ILLUMINATI MIND CONTROL
http://www.apfn.org/apfn/oz.htm

THE AMERICAN HALLUCINATION
http://www.apfn.org/apfn/halluc.htm

Aluminum Foil Deflector Beanie
An Effective, Low-Cost Solution To Combating Mind-Control
http://zapatopi.net/afdb.html

Secret US Human Biological Experimentation
http://www.apfn.org/apfn/experiment.htm



[mind control]

Friday, July 09, 2010

Censoring The Truth ..........

CENSORING THE TRUTH (RIP DEMOCRACY)
INTRODUCTION
This article contains discussion of genuine human/democratic rights and civil
liberties abuses with a focus on the restrictions to justice and individual freedom
occurring whenever and wherever the truth is suppressed.
Firstly, it must be said that because influential criminals do control not only the
bulk of the worlds wealth but also the more effective methods of information transfer
(and personal expression) it is possible for them to severely limit peoples choices through
censorship of the truth. For example, if a defence department (or one of its contractors)
wants to develop an invention with a military application they get the government to
place a secrecy order on it thereby gaining exclusive development rights and preventing
the public from speculating on how it could be misused. Anyone attempting to expose
the truth will then be covertly victimised, maybe even institutionalized. Also, to silence
any wealthy/influential members of the community who may have an attack of
conscience over the matter they use national security legislation, defamation laws, threats
of scandals etc. It’s all very neat, tight and totally undemocratic, allowing well-placed
villains to dictate to us all. In fact secrecy orders are there to help governments to hide
their crimes.
Another example relates to vital information connecting MP’s with vested interest
groups (affiliations, contributions, secret deals and so on). As a result the public is
frequently hoodwinked by politicians and those that direct them. Accordingly, the
voting, lobbying and protesting decisions that people make are often badly skewed
because they are not in possession of all the facts. So, instead of governments being truly
open and representative of the general population they usually reflect elitist attitudes on
how society should be run and make decisions that favour the influential few. The rest of
us are patronized with rhetoric and lies, being expected to trust people who are clearly not
worthy of our trust. The systems of accountability (including the media) are inadequate
and corrupt. MP’s don’t represent the people just because they’re from the people, yet
they should represent their views and ideals. Unfortunately democracy (government by
the people) has become a remote notion not based in reality. It’s only talk. Equally, the
media don’t inform the public or represent community standards on many issues; instead
they harass and ostracise those that do; (refusing to even confront them lest their
consciences be threatened by the truth). The barrier is placed there by agencies.
Our best solutions lie with our willingness to be open to the absolute truth and our
demands that it be given to us. Only total disclosure will suffice as those entrusted with
power are usually untrustworthy; abusing authority, opportunity and ability to make
secret matters that belong in the public domain.
CENSORSHIP (OF WHAT AND BY WHO)
The simple truth is that wealthy criminals (who are above the law) control our
natural resources, our financial institutions, our media outlets, our government
beaurocracies, the spy networks and much much more. Most importantly they control the
flow of information through the media which they also use to control/intimidate their
opponents. Lies, rumours, half-truths, beat-ups, selective photography, selective
wording, editing and more keep public figures under thumb as they realise they can be
destroyed by their secrets and publicly denigrated… Many public figures are involved in
shady financial dealings, have drug habits, are involved in prostitution, gambling scams
and so on which all facilitate this. As for non public figures, covert harassment
techniques and degradation are used because even if they had something to hide they
normally couldn’t use it on them publicly as such people have no public profile.
So what do they censor, exactly? Certainly not explicit media sex and violence,
profanity, lies, brainwashing material or anything else that generates big dollars. No,
what they censor is the ugly truth about serious criminal activity that benefits very
wealthy criminals and power brokers. We get part of the story when it’s convenient or
can’t be hidden but usually we get nothing. I’ll save discussion of advanced weapons and
spying for later but a few examples follow…
EXAMPLE 1. WARFARE
A crisis, like the current Middle East situation, can be easily kicked off (or pushed
along) by government agents (military or otherwise) who set up an atrocity (a murder or
act of terrorism), often to pin the blame on the enemy i.e. they’ll even kill their own
people to stir up a conflict. The stirrers then retaliate to the atrocity; gaining for their
masters the financial rewards they originally sought. The stirrer’s reaction is backed by
the public who only see the scenario from one angle; the one they’re fed by the media.
So while the whole thing is stage-managed, from acts of madness through to the eventual
peace negotiations, profits are made by the guilty whilst the cost for the innocent is often
death. Likewise for the not so innocent (but duped) pawns who are motivated to fight in
the name of religious/cultural hatred, the results can be catastrophic. Those guinea pigs
can even be subjected to torture/death courtesy of experimental weaponry which is trialed
during such times. And any discussion of such problems in oral or written forms
(including entertainment) can be stifled via covert censorship and corruption.
EXAMPLE 2. DRUGS
Most rock stars and models, many sport stars, MP’s and journalists as well as
numerous “artists”, businessmen and other public “actors” are guilty of substance abuse.
The public knows this but not the full extent of the problem. It’s rampant. They also do
not know of the connections between celebrities with “personal health” problems and
those that compromise them over it. Aside from the obvious lack of character evident,
because these people are monitored and blackmailable, they are also more likely to be
coerced into other criminal conduct. As with drugs, the same can be said of any other
criminal act that public figures have committed or been lured into by association; such as
media surveillance feedback etc. And it must be remembered that it’s a crime to fail to
render assistance, to associate with criminals, to criminally harass or to be an accessory
before, during or after the fact re any crime.
EXAMPLE 3. ASSASSINATIONS
Where public figures cannot be silenced and will not cooperate they can be
publicly humiliated (over something as simple as an “arranged” traffic fine), killed or
anything in between. The assassinations usually occur only where the whistle is about to
be blown publicly on something serious. Dupes can take the blame or it can be called an
accident or a suicide etc but the fact is that the agencies and organised crime groups are
usually behind it. For example, programmed assassin John Chapman was targeted with
neurophone-based technology; transmitting voices into his head. These voices said God
was instructing him to kill John Lennon then turn himself in. As a result the album
Lennon was working on was never released, not even in an edited form. I wonder what
he would’ve said about the developments of the last 20 years. Very convenient.
NB This sort of thing helps to scare other public figures into compliance and
prevents them from helping victims of agency abuse.
Similarly, though less seriously, other outspoken peace advocates can be vilified,
banned and so on just for opposing warfare. Notice how few celebrities have spoken out
about the wars in Afghanistan, Iraq, Lebanon etc as opposed to the number protesting
Vietnam. And I don’t accept that conscription was the sole reason for protest back then.
People now are too afraid or apathetic to care and those that do… well (for e.g.) the
members of the group “Dixie Chicks” suffered abuse for openly opposing the latest Iraqi
war and few others dared open their mouths until recently when the US governments
stance softened enough to allow open objections to be raised.
Quite obviously, to harass anyone for holding an opinion is wrong (unless they’re
promoting criminal activity) yet the innocent are often silenced while the guilty carry on;
promoting death and destruction for ulterior motives. The media misrepresent the truth
(and the “players”) on the world stage because they are corruptly controlled, like the
MP’s, businessmen etc. All too often the truth is censored and a stage-managed show
takes its place. The public dutifully lap it up. And in the case of arranged murders not
even the victims closest, most influential friends or family are willing or able to air their
concerns publicly.
EXAMPLE 4. THE LAW
E.g. In the early ‘90’s NSW state police Special Branch held criminal files on
numerous politicians and journalists but was unable to properly investigate the serious
political/corporate crimes involved; due to the “protected species” mentality surrounding
celebrities as well as the covert harassment they themselves endured (as police monitored
by criminals while they worked). Eventually, amid a flurry of discrediting media reports
(some maybe correct) the Special Branch unit was disbanded and all files destroyed by
the state government. Now, curiously, the corrupt MPs/journalists responsible for this
obliteration were amongst those believed to be guilty of the crimes mentioned in the files.
Funny that. Surely if having a few corrupt police in that unit meant that it needed to be
disbanded we should see parliamentary dissolutions and media reshuffles at regular
intervals since they’re no better. However, that’s not the case because they’re protected
by agency/criminal thugs and can do as they like.
NB As with everything I tell the reader this information is not based on mere
speculation, observation or even just personal experience but on actual information
supplied by those with direct knowledge and involvement. During 16 years of research,
I’ve spoken to 100’s of police, spies, military experts, journalists and political aides. For
example, well known journalists who helped including Mike Minehan (ex Ch 9, ACA),
Ross Saunders (ex Ch 2) and John Hill (ex Ch 10, News room supervisor). These were
amongst those that confirmed that media surveillance feedback and neurophone
technology harassment are common criminal practices effected by the media mafia and
the spy agencies. Nevertheless, if the reader wants the proof of any of the matters
discussed here to come from an “official source” you’ll be waiting forever; that’s the
whole point of this discussion… such information is secreted/censored and this sort of
article is the only place you’re going to get it.
THE CRIMINAL THINKING BEHIND CENSORSHIP
As with most evil practices, wealth and power are the motivating factors behind
controlling people through censorship. Yet because brainwashing, mushrooming and
patronizing of the public doesn’t work on everyone “they” have their goons harass those
that still question their conduct and thereby pose a perceived threat to their criminal
empires. At the same time selection criteria and bastardization processes work to ensure
the cooperation of most employees in the spy agencies, the military, the police, the media
and government. Few will question what they’re told to read, do etc.
In fact most will not question any instructions that come from their bosses. Even within
groups of businessmen, loyalty to their superiors and/or their criminal “mates” is usually
put well before their duties to the general community. The bottom line (the end) justifies
the means in their criminal minds and society is expected to applaud them for it; as
always the criminal deludes himself by focusing on his results and ignoring his methods.
For e.g. How many times have we all endured politicians placing their primary
allegiances to their party and the party line, campaign contributors, wealthy socialites and
so on above the best interests of the general community courtesy of some secret deal that
favours the elite few at the expense of the majority. Being out of touch with the average
citizen (yet frequently in contact with wealthy criminals) MP’s delude themselves to the
point where some actually believe they have made the wisest moves; ignoring the
criminality behind it. The same can be said of thieves of intellectual property,
victimisers, drug cheats etc etc.
Again, those speaking the truth on such matters are ridiculed/silenced. In the case
of knowledgeable, authoritative or well known people (such as honest scientists, spies,
police or public figures) they can be set up for institutionalization or even death for just
thinking about blowing the whistle. Further examples of public figures who were clearly
killed were Hanse Cronje (cricketer, killed in a plane “accident” while working on a tellall
expose on match-fixing); similarly suspicious was the death of cricketer Bob
Woolmer; Grace Kelly (Princess/actress, killed in a car “accident” after ordering the
mafia to leave Monaco); Robert Kennedy (US AG, “assassinated” while fighting
organised crime); Diana Spencer (princess, killed in a car “accident” when proving an
embarrassment to the monarchy). The list goes on. There is also a real link between
prominent peace advocates and orchestrated assassinations. At the risk of laboring the
point, examples include John F Kennedy, Martin Luther King, Y. Rabin, A. Sadat and M.
Ghandi. All made popular, peaceful moves and comments that threatened powerful
criminals who profit from war/hatred etc. On each occasion there was more to the
incident than the actions of a lone, crazed murderer and the media know it, so why don’t
you… The media doesn’t wait for positive proof to speculate or comment about other
matters… No, it’s because such things are done on behalf of the military/media/business
conglomerate that rules the world and committed by agency (or agency provoked) goons.
Think about it… How many good people that strived (publicly) to “make the world a
better place” died peacefully in their dotage? Not many. Ask yourself why. Do you
think “they’re” going to tell you they do such things? No, they’d rather terrorise the
public with lies about terrorism, preventable crimes, illnesses and more to justify their
surveillance society (and reductions in civil liberties) and to occupy the public’s thinking
while powerful criminals do as they please. No, they’d rather “dumb down” the
population and keep them quiet. Our heads are filled with trivia and fairytales while the
ugly truth remains hidden.
So the problem is the fact that the mainstream media influences, if not totally
controls, what people know (and believe). They feign ignorance on some matters and lie
about others so others have to strive to spread the actual truth on matters including the
methods such people use to silence/discredit us. Meanwhile we quietly fight their
systems of secrecy and oppression. Unfortunately such is the power of the media that if
they told the public “the sun rises in the north” or even “God is an alien”, once such lies
were reinforced with corrupted evidence, for many, that would become the new truth.
There’s neither integrity nor sincerity in most of what they present and their greatest lies
are lies of omission.
HOW THEY SILENCE PEOPLE
As previously mentioned, National security laws, defamation actions, media
scandals, threats and more stop most influential people in their tracks. However, for
private citizens, who cannot be bought or intimidated, more covert methods are used
including high tech assaults from satellite/computer technology. Outspoken and
authoritative scientists, spies etc may actually be killed but such extremes are not
commonplace with others, though some victim’s suicide.
Firstly, whether you realise it or not, everyone has to endure total monitoring of
all telecommunications by the NSA’s satellites/computers. However, as well as this the
NSA, NRO, CIA etc spy on conversations, movements, writings and even brain waves.
Having nothing to hide provides no protection. It’s the monitors who have something to
hide and they target the innocent, leaving most of the guilty alone; to do their dirty work
for them.
Now privacy invasions are not the only means of harassment… For persons of
interest direct responses to private comments or actions can include sirens wailing,
choppers hovering, planes buzzing, operatives interfering in their lives and so on. This
can escalate to the infliction of debilitating pain/illness, psychological trauma, even
death… as a result of laser-facilitated, mostly satellite-based, psychotronic or directed
energy weapons. These are trained on targets as they’re tracked 24/7 by the government
agencies who use these technologies. These extreme methods are usually reserved for the
disempowered and non-connected. Regardless, the catalyst can be as innocuous as a
political comment or even expressing likes/dislikes regarding TV/radio etc. This is
because politics and the media are thoroughly protected operations and any “astute”
criticism of them is “discouraged”. This “discouraging” can be done even in the privacy
of the citizens residence. That practice is, of course, like all the criminal activities of the
government spy agencies, made a matter of National security and so remains a secret;
especially as 99% of the population would democratically object if they knew about it
(the other 1% are the criminals). In this way “National Security” effectively secures the
positions of well placed criminals while denying the rest of us our basic human rights
including the rights to privacy and freedom of expression. (It’s noteworthy that the U.S
haven’t even signed the optional protocol of the Covenant on Civil and Political Rights).
NB On top of all this there are methods of putting thoughts/words into peoples
heads using subliminal or audible neurophone-based technologies. Thoughts can also be
extracted and transferred using these, in conjunction with mind reading technologies i.e.
powerful computers take the results of satellite screening of the EMF/brain waves and
interpret them… then disseminate them to complicit players or dupes. In this manner
many targets field the words/thoughts/actions via “coincidences” that happen around
them and blame the wrong people (appearing paranoid and being thus discredited). In
reality many targets can be harassed at once by these methods.
In addition, all of the results of any satellite surveillance can be computer
transferred, and fed to numerous not so innocent agency “ghost” writers or any criminally
corrupt media outlet (as well as any operative or dupe) so that they can be intertwined
into presented material so as to subtlely/covertly humiliate, terrorise, destroy and
discredit targets. Many spies are in fact writers who place material into, speeches, news
items, ads, movies, songs etc. This, coupled with denial about this very common
practice, makes the victims angry/bewildered responses appear to be unprovoked and
therefore dangerously paranoid. The best response is therefore to do nothing although all
targets let off steam at times to cope with the constant harassment. Meanwhile the guilty
media identities , politicians, etc smugly present themselves to the public but secretly
treat them as somehow inferior and deserving of whatever lies/”entertainment” they
choose to feed them.
This leads me to the roles of other professionals (in the legal and medical
fraternities) who compound the problems by prostituting their skills with no regard for
justice or the truth. For example, psychiatrists in general are used to discredit those
victimised/silenced using covert methods by declaring that such things don’t happen
(because there’s no hard evidence). Also, psychiatrists working for agencies/mobsters
may suggest unnecessary treatment for those merely questioning powerful, well-placed
criminals. Some of the more corrupt in the “profession” even use the collected brain
wave patterns of victims (as “harassed or influenced”) and incorrectly correlate these
patterns with those of known criminals. NB Anyone targeted by mood management
technologies (et al) would be waging a constant mental battle with his/her tormentors
anyway but this doesn’t mean they are potential criminals. However, because the
tormentors have a criminal bent (and little self restraint) they cannot understand this so
they persist in trying to provoke normal law-abiding citizens. Occasionally they succeed
with real murderers, terrorists etc but it’s rare. Because most targets are chosen due to
their hatred of crime; they are difficult to provoke.
Again, on psychiatry it’s noteworthy that psychiatrists recommend “breeding out”
schizophrenia which is supposedly passed on but it’s really “ethic” cleansing that they’re
promoting. I subscribe to the view that psychiatry is a largely bogus profession/science
invented and promoted to be used against those who question the powers that be, those
who know too much and those presenting a social inconvenience. Most of its claims are
not based on proof or in scientific fact. On top of this the brutality and inhumanity
evident in the treatment of the (mostly experimental) victims is equaled only by the lies
and deception evident in the “doctors” diagnoses. Complicit pharmaceutical companies
are also a party to their crimes. Personally I’ve only had one encounter with a corrupt
psychiatrist and it was short-lived (10 mins) but I’ve spoken to many other victims. I
honestly believe that to claim that those outside a profession (be it psychiatry, politics,
journalism or whatever) aren’t in a position to criticize those within is a transparent,
defensive ploy aimed at restricting said criticism to whistleblowers. Observers from
outside are objective enough to pinpoint professional carelessness or criminal misconduct
within a profession and so their views must not be dismissed. Those within a profession
or political party or club or media outlet or any group for that matter will naturally be
reluctant to acknowledge corruption or fault whether through their own guilt or through
blind faith and self delusion.
EXAMPLES OF CENSORED TRUTHS
· The world is dominated by secretive, powerful families including members of the
Illuminati, the mafia and other such groups. They use government spies and their
own goons to do their dirty work. They influence most governments,
beaurocracies and corporations by one method or another.
· Despite the mass media’s portrayal of spies as heroes, in reality most are
criminals involved in the monitoring/harassment/murder of innocent people.
They also infiltrate various writing roles intending to misinform and “dumb
down” the population.
· The mainstream media is controlled by organised crime, restricted and influenced
by government secrecy orders and centrally involved in the harassment of “dogooders”
with surveillance feedback and other criminal harassment. Independent
media outlets are marginalised; with insignificant audiences. Three quarters of
what’s newsworthy is never presented and what takes its place is largely trivia;
which we’ve been brainwashed to crave.
· There is enough food, water, clothing and shelter in the world for everyone but
greed restricts the access to it.
· Classified, military technologies exist which can cause people or objects
(including aircraft) to disappear or disintegrate, to levitate or deviate. They can
affect the weather. They can also torment, injure or kill remotely. Most of it is
laser-facilitated and satellite-based. It’s trialled during wars (e.g. in Iraq and
Lebanon) and on civilian targets (certain prisoners, psych inmates, peace
advocates, whistleblowers, banned writers etc). It’s illegal human
experimentation and it’s totally covered up.
· Secretive NSA/NRO satellite tracking and surveillance technologies monitor all
telecommunications (and more) worldwide. These are computer analysed and
stored. The NSA, CIA etc then intercept and use these along with the private face
to face conversations/actions of persons of interest. As with the technologies
mentioned below, NASA is primarily responsible for secretly delivering the
developed technologies into space. Their cover is space exploration and alien
searches which they successfully sell to the public as legitimate ventures.
· Technologies exist which allow voices, ideas, moods, pain etc to be delivered
personally to targeted individuals. These can be radio wave, microwave or
satellite laser delivered.
· The brain waves of many people are remotely monitored by satellite scanners and
interpreted courtesy of more super computers each of which process more
information than ten times the world’s total population. One day, when this
extends to the monitoring of everyone’s brain waves, we will all be linked, 24/7,
to the system in a futuristic, hellish computer state. To even think of challenging
the evils of the criminals that rule the world would then bring instant harassment
or death. So all dissent, all democracy will effectively end at that point. Without
public exposure this is inevitable.
· Because of the aforementioned electromagnetic technologies (et al), terrorism,
war and even serious local crime is all solvable if not totally preventable.
However, because such technologies generate money and control emotions and
their misuse excuses reductions in civil liberties etc you are not told about them.
They are not used for good, only evil. In other words, terrorism, war, crime etc,
suit the grand design of the globalists so they’re not going to alert the public to the
existence of the relevant technologies by using them to stop crime. Instead they
continue to be used to oppress ordinary, law-abiding citizens who dare to protest
(by whatever means) about the inequities/crimes of our systems and those
responsible for them. It’s all a black operation funded by criminal corporate
entities and protected by government secrecy provisions.
· Despite pathetic/defensive cries of “If it ain’t broke don’t try and fix it” from
those benefiting by maintaining the status quo, our less than perfect systems are
deliberately flawed in order to favour the criminals guiding them. People of
integrity who observe this are marginalised or eliminated so their voices cannot be
heard. Systems examples follow:
E.g. 1 THE LEGAL SYSTEM It’s inequitable and unjust, usually affording
people only the justice they can afford. In a fair society justice would not be a
commodity but a right. Consistency in verdicts and sentencing would then be the
norm.
E.g. 2 THE PENAL SYSTEM It’s barbaric; encouraging inequity, brutality
and inhumanity. It exposes inmates to drugs, homosexuality and more serious
offenders without the necessary protection of adequate segregation. It’s an
expensive solution when the only legitimate purpose of incarceration (in my
view) is prevention.
E.g. 3 THE INFORMATION TRANSFER SYSTEM The media is owned,
monitored, controlled and/or warped by organised crime figures and their spy
agency connections. This is the most crucial element in their censorship package.
They don’t lie about everything but they omit or warp the most crucial
information on the most important topics while filing our heads with lies or trivia.
The public’s right to know the truth is undeniable and should remain absolute.
Only criminals would manufacture reasons for secrecy on matters that are clearly
of concern to everyone. The worst cover up is the fact that the government spy
agencies commit heinous crimes with impunity. This is perhaps the most evil,
undemocratic facet of the entire system of government and law enforcement and
if affects everything else. Other examples of media cover ups include “cash for
comment” scandals, subliminal brainwashing and so on.
Information is power and the people have very little of either. That which you do
have is illusionary; a con foisted on you by their front men (presenters who smile
nicely and lie in your face through the mass media).
· Satellite surveillance, mind reading and neurophone technologies, coupled with
media/corporate/political/corporate cooperation, allow for numerous deceptions
which generate money/control. These include supernatural/psychic phenomena,
“alien” encounters and the growing community belief that such things are real.
The experiences are real but not the explanations. Despite the fact that some are
conmen most victims are either dupes or targets of illegal experimentation. And
while the cryptic/unreal references to the relevant technologies are numerous
(films, songs, books, TV) nowhere is it spelt out clearly that government agencies
and organised crime (Illuminati/Mafia) connections can and will rape minds,
transmit voices, physically harm using lasers etc etc. In other words… Because of
these technologies those experiencing certain psychic/alien/religious/paranormal
phenomena should seriously question their assessments.
· Most published writers use unpublished writers’ works which have been
submitted but discarded. They steal ideas, characters and more. So, just as you
can’t believe anything you read from well known people you can’t disbelieve
anecdotes to the contrary from silenced, nameless people because this is where
most material is actually sourced.
· TV/radio call ins, interviews, comments, statistics and so on are often stagemanaged;
i.e. set up. Also the opinions given on air are often not those of the
celebrity in question but the ones they’re told to go with. This is made easier
because only like-minded or corruptible people are hired by media outlets to start
with. The majority views of the general public are thereby
suppressed/underrepresented and then, via a constant bombardment of the
minority views that are aired, these majority views are gradually changed to suit
the control freaks behind it all; i.e. those that dictate to us with smiles and hoopla.
By the way, it’s not surprising that talented public figures should participate in
all of this especially since talent brings adulation which bestows power which is
corruptible. All too often it’s about keeping the public calm and quiet. Even
where the issue at hand rates vigorous comment or questioning of the authorities
the media take a softened approach because of the corrupt connections behind the
stage managed coverage. Simply put, they don’t want to stir people up to the
point where they really care.
· While wars are fought over oil and other natural resources, information on
frictionless engines and 1,000 other inventions has been suppressed because they
negate the need for dwindling resources and would create a shift in infrastructures
and power bases. Many other inventions that are not stopped are instead
controlled tightly by the government which places secrecy orders on any
development deemed to be of military value. In fact technologies exist which can
remotely do anything from trigger an animal attack to popping the planet like a
balloon. Man has been allowed to become more and more God-like in his
abilities which may explain why so many in positions of power have
megalomaniacal belief systems to rationalise their actions.
· Many diseases are created/invented and the cures to many others are suppressed.
One reason for this is to allow human culling another is because there’s more
money (for doctors and corrupt, heartless pharmaceutical companies) in treatment
than cure.
· The risks of many things are underplayed (deliberately) by the media to keep a
check on public reactions. Examples include the health risks associated with our
industrialised, pre packaged environment and activities. Even the dangers of
things like swimming are understated e.g. unless there’s evidence fatal encounters
with sharks are listed as drownings even if there are witnesses.
· Martial law (absolute control of communications, travel, banking, wages, prices,
assets etc) can be falsely triggered by a manufactured crisis. Terrorist attacks,
widespread rioting, natural disasters, financial crises etc could all be arranged
whenever deemed necessary (with ulterior motives).
Please note that any repetition here is to positively reinforce the message; there is
far too much going on in the world today that people are not told about. And sadly
people, especially in the affluent western democracies, are brainwashed/lulled into not
questioning or caring thus allowing these cover ups to continue.
PREJUDICE AND POLITICAL CORRECTNESS AS COVERS
Many desperate, sometimes puerile arguments are offered by wealthy criminals in
order to defend against the legitimate, sincere criticisms of genuinely concerned members
of the general public. Their stock standard phrases include “You’re mad”, “You’re
jealous” and so on but there are others, more sophisticated and better thought out. One of
these is “prejudice” (for a minority situation) the other is the general notion of “political
incorrectness” which, more times than not, is just a distraction or cover for moral/legal
incorrectness.
Aside from nonsense about terminology (hey why say manager when you can say
womanager anyway hmm) part of the thinking behind “political correctness” is that in the
same way that the national flag can be the last recourse of the scoundrel, any association
with particular groups can be a way of certain criminals evading criticism or being
singled out. By connecting themselves to a religious, cultural, ethnic, political or sexual
minority “Prejudice” can be the defense to all accusations of wrongdoing in an attempt to
shift guilt and deflect blame. So where even individual or “mateship” defences are
inadequate “minority status” works most of the time especially if the accuser is, in some
way, actually biased. In all cases labeling criticism as “prejudicially derogative”, by
playing on simple semantics, phraseology and contextual misunderstanding, is the ploy.
By doing this most people are opened up to false accusations of bigotry and the criminal
has a general defence.
My argument is that people should speak plainly, not cryptically or
euphemistically. Being tied to politically correct nonsense is a form of precious
censorship. It’s a matter of simple, effective communication being restricted to reduce the
incidence of feigned offence. How would it be if we got to the stage where even doctors,
talking amongst themselves, said something ambiguous like “He’s got “men”? Does he
have meningitis, meningococcal disease, or meniers disease? Is he mentally challenged
or gay? No? It could be slang for “he has support”. Clearly such talk can create
unnecessary confusion.
The simple fact is that we are all different but with similarities that are more
obvious with reference to particular groups or our association with them. Now,
especially with respect to criminal activity, we should have no problem identifying
individuals or core groups of offenders by their recognizable titles. If, for example, you
have a group of Middle Eastern youths who are gang raping Anglo-Saxon women (itself
done out of a lack of respect and real prejudice) say so. Why should we allow
“prejudice” to be used in their defence? Equally, but less seriously, if the members of a
religious, sexual, ethnic or individual group (be it a minority or not) are hiring their own
people exclusively (or even preferably) they are guilty of real prejudice that restricts
opportunity for others and that also needs to be addressed. Again, often those who are
the quickest to cry “racist”, “sexist”, “Nazi” etc are really that way themselves but are
trying to silence others who are not biased just angry and indignant about the inequities
and crimes for which certain members of the group are responsible. Generalisations are
to be expected but you cannot solve any problem by limiting discussion of any aspect of
it. Silly terminology restrictions and more do just that. They stifle genuine
dialogue/writings on important matters and force us all to skirt around the truth.
Simply put, it isn’t discriminatory to question criminal conduct. Democratic
rights do not extend to the right to mistreat others. No one suggests vilifying every litter
bug or parking offender so the bulk of society’s resources (especially in law enforcement)
need to be directed at serious offenders regardless of who they are or what they hide
behind. Nevertheless, it appears that serious criminals (especially in high places) would
rather target the misdemeanors (or even personalities) of their accusers in order to silence
them.
As for those who are victims of crime etc, it’s only natural that anyone victimized
by members of a particular group will be upset with them. You cannot expect targets to
respectfully name each offender if the group is predominantly from a particular race,
creed, occupation etc. Real prejudice is hating people because they are who or what they
are as ordinary, law-abiding citizens not merely identifying offenders by the correct
description that quickly and simply points them out.
To elaborate on this thinking, you also can’t really blame every member of a
particular group of people when it’s clear that the majority have a different attitude to the
offenders from that group. But equally you shouldn’t go into denial about wellestablished
events involving offenders from a group to which you belong just to protect
yourself from labeling. That’s tantamount to protecting criminals and fostering criminal
behaviour; again via censorship. For example, certain Muslim extremists believe that
Allah will reward them for carrying out suicide bombings against their enemies. The
average Muslim is appalled by such a notion but they shouldn’t deny it happens. Also
the average Jew is just as horrified by the Jewish persecution of the early Christians
(including the role of some Jews in Christ’s death) as he or she is by the persecution of
their own people during the holocaust of WW11. However, this doesn’t mean that either
set of events should be denied or forgotten, lest they be repeated. Final example (to
prove I’m not biased), my own faith is based in Catholicism yet the Catholic church has
committed/concealed crimes including the Spanish Inquisition and their more recent
association with organised crime. The average Christian condemns such hypocrisy but
you cannot pretend it doesn’t happen. The only ones denying all of these things seem to
be the non-average culprits and their criminal associates. You can pin the blame for a
certain problem on Al Queda, Zionists, Jesuit spies, the man in the moon or any other
suspect but the emphasis should be on right and wrong as delineated by honest observers;
i.e. the “average” citizen.
Yet again, criminals must not be allowed to blur the line by clinging to their
membership of a particular group. It’s never the group that’s to blame but a criminal
element within it and those wolves must not be allowed to masquerade as sheep. And
while on that, it’s their lust for power and wealth, their ego(s) that generate conflict
between groups in the first place when harmony would reign without them…
I reiterate, criminals simply must not be allowed to hide behind their national
flags or anthems, their wealth of fame, their power or political affiliation, their family,
mates, culture, creed, race, sex, colour or anything else. And they must not succeed in
silencing critics with counteraccusations based on any of these things.
“ABOVE THE LAW” STATUS
All the problems outlined here could be eliminated if there was real accountability
in politics, government and so on. Unfortunately even Federal police don’t have the
resources, training or power to stop wealthy criminals using high tech satellite
surveillance/harassment technologies. I’ve spoken with many helpful officers in the
relevant units but they are always powerless to assist (in any event), as “national
security” is thrown at them by the agencies as a blanket defence to their crimes against
humanity. Now this situation is arranged deliberately by the powers that be so it can be
said that the police have a responsibility in this area yet they have no means of carrying
out their duties. Similarly Ombudsman’s offices, Inspector generals offices, Internal
affairs units, Parliamentary committees even Royal commissions are all of limited
effectiveness and therefore of dubious real value. They’re often toothless tigers; there
more for show than anything else. What all of this means is that we have connected
individuals (“businessmen”, journalists, politicians etc) operating outside the law without
fear of challenge. That is not a democratic system or one worthy of respect. There
should be adequate means of making officials and others accountable to ensure that
corruption is limited. Instead we have phonies operating unfettered as community
leaders, some even hiding behind feigned interest in “causes”, whilst in reality they work
for and with those who actively persecute other people for really standing up for what is
right or genuinely backing vital causes.
PROTECTION FROM COVERT ATTACKS
There are international treaties, conventions and the like which outline our rights
as citizens and human beings. The Nuremberg code, The Geneva convention and The
Universal Declaration of Human Rights are amongst these. The latter lists our rights to
freedom of thought, speech, expression etc but although these rights live in the hearts and
minds of the average law-abiding citizen, the political prisoner and so on they do not
actually exist in reality. They are only there for show. So, when it comes to commentary
on entrenched criminal activity, inequitable systems or government/corporate
brainwashing there is no real protection. The powers that be (including their hypocritical
front men who publicly ratify such treaties/conventions) only use their fine words as
some sort of grand cover, to be trotted out to counter accusations that they’re stifling free
speech or hiding the ugly truth.
For example, in western democracies political leaders sombrely refer to the
atrocities committed by governments that thumb their noses at UN requests. They
proudly boast that such things couldn’t happen in their lands but they do. The difference
is that in the west covert undetectable methods are used (spies, high tech, the media mafia
etc) and the media fails to report this. Consequently, victims not only have to deal with
oppression but discreditation because society, in general, is brainwashed into believing
that such things don’t happen. And even if they did know most people, these days, are
too apathetic to care unless it directly affects them.
Further, public figures are trusted and therefore are used to dull public
perceptions. This effectively means that fewer people need to be oppressed; only those
seeing behind the insincere words, the false smiles, and the celebrity hoo ha. These few
then try to exercise their real democratic rights only to discover that such rights don’t
really exist. With Big Brother surveillance covering all telecommunications, as well as
the conversations/actions of persons of interest and the thoughts of many anything except
total subservient, ignorant acceptance of our systems and their representatives (lies and
all) will lead to the sort of covert, criminal harassment I’ve been outlining. And there’s
no protection from that at all.
Just on real protection… The European Parliament and The UN have called for
bans on all weapons for human manipulation; effectively exposing the procedures I’ve
referred to (see unidir@unorg.ch and the EP resolution A4-0005/99, 28/1/99). However,
because the media is part of the overall conspiracy of silence on the methods used (the
media itself actively harassing targets with surveillance feedback etc) the public remains
largely unaware of the problem and, consequently, are also unaware of any of the
important matters which the victims wish to highlight. Yet without public demands
there’ll be no change. So… the heart of the problem, as I see it, is the central control of
the mainstream media by organised crime figures and spies who work for the
political/military/corporate conglomerate (which is the Godfather that Big Brother
answers to).
THE VICTIMS: WHO’S TARGETED AND HOW
Again, anyone openly expressing views contrary to those foisted on the public by
the ruling conglomerate is targeted. People of integrity, advocates of truth, peace, equity,
justice, humanity and so on are attacked for even questioning obvious wrong doings. It’s
a process of “ethic cleansing” which some have termed “the silent holocaust”. The
challenging of the U.S. governments selective “world police” role is an example. If you
so much as suspect that the U.S. may foster trouble in oil rich states to justify interference
(whilst ignoring the plight of refugees etc in war torn third world countries, which have
nothing to offer) and you say/write as much you will be oppressed by those same
criminals. Similarly, if you argue that the ruling conglomerate fosters the drug trade or
1,000 other things, you will be oppressed for it.
Simply put, spies and criminals access advanced weapons to target those
questioning high level criminal activity. They pretend the targets are somehow deserving
of such treatment and use the cover of “National Security” to prevent intervention or
discussion of their corrupt, criminal conduct. Complaints about such covert
torture/harassment are then dismissed as paranoia (clearly all participating in such
cowardly procedures belong in jail).
Now, some of the methods used to silence those who know too much and protest
include the following:
· The infliction of pain, injury or death courtesy of directed energy weapons
positioned (mainly) in space.
· The delivery of neurophone technology, (voices, noise, hallucinations etc)
courtesy of psychotronic weapons positioned (mainly) in space.
· The monitoring and feedback of thoughts using state of the art
computers/software which is linked (via satellite) to the brain waves of scanned
targets. The individual bio electronic resonance frequency of each brain allows
identification and the latest tracking/location technology sets it all up, again, via
satellite.
· The media feedback of illegally obtained satellite surveillance results including
the words, actions, thoughts and more (taken out on context) from the victims.
These results are often deliberately misinterpreted to annoy the targets. This is all
done via computer/agency transfer to the media.
· The on-the-ground harassment of victims using agency operatives, PI’s, corrupt
emergency services personnel, pilots etc.
Now, all of these are “black” operations partially funded by the same criminals
who have their enemies placed in these programs and they expect a return (information,
ideas etc) as well as the satisfaction of destroying their critics.
Humiliation, torture, scorn, marginalization and more beset the targets, often for the
remainder of their lives. In effect they’re not real threats but nuisances; nonetheless
they’re convenient guinea pigs for a policy of experimenting in human remote control. In
other words; the powers that be do not kill most of the victims outright. Instead high tech
computers facilitate surveillance, harassment and so on.
Now, fear, greed, apathy, ignorance, complicity and more prevent public figures
from intervening. If they did they could have their careers/lives terminated. Once again,
I ask you to think about the public figures who were truly worthy of some respect who’ve
met untimely ends due to assassinations, accidents and supposed suicides and you’ll see a
pattern. They all challenged the media mafia or the war mongers or the conglomerates
profiteers etc and so paid the price. Very bluntly stated we do not live in a democracy
only a quasi democracy. And our real rights are attacked/diminished every time
oppressive laws are passed or restrictions are placed on our freedom of expression,
association etc. Terrorism, political correctness, fear mongering and so on can facilitate
such things as: detention without representation; conviction without notification;
compulsory participation (voting, jury duty, military service); fines/bans for fairly
criticizing officials/systems; unaccountable agency operations involving torture, framing
and covert experimentation; draconian/restrictive deformation laws to silence powerful
critics etc etc. All of these things are undemocratic and wrong yet that assessment itself
also cannot be discussed publicly. We may only hear the justifications not the
challenges. Yet censorship of any part of the truth (or honest discussion of what is the
truth) is undemocratic.
SOLUTIONS
The most obvious solution appears the most unlikely and that’s to engender
honesty, integrity and good character into our youth so that those attaining positions of
authority/power will not abuse it or us.
Regardless, belligerent resistance is required. We must persist in trying to expose the
methods used to conceal important facts. The biggest frustration is the realization that
without the cooperation of corruptible people in positions of authority/influence we
cannot succeed. Our democratic/human rights are in jeopardy both individually and as a
society but few people realise this. The UN and European Parliament can talk all they
like but if no one reports it…
Again, and sadly, I’ve no doubt that the day will come when satellite brain wave
scanning leads to the situation where all effective challenges to criminals in high places
will be stymied at the source before we even verbalise or write about it. People will
become conditioned to acceptance and neutralisation with every perceivable tactic being
known to the criminal elite ahead of time. It seems to me that one day a lack of
intelligence, integrity and intestinal fortitude will prevent most from even recognising the
problems I’m referring to let alone solving them.
This could be fought if, at the schooling level the tendency to suppress views (to
stifle truly free thinking) was eliminated in the interests of democracy and fair progress.
Such a “revolution” would force a freeing up of previously suppressed information
because people would then “demand to know” instead of being “happy to accept”
whatever they’re told. Sadly the ruling conglomerates brainwashing of our youth is
thorough and utterly controlling. Students just regurgitate what they’re told without
question, or their life prospects are greatly diminished. Still, it’s not so much what is
taught as it is what is not taught: ethics, corruption control, alternate solutions/theories
etc.
An example of the brainwashing at play is the notion that non-western, nondemocratic
countries are the only ones who indoctrinate the population and incarcerate
dissidents (free thinkers usually) while in the west we enjoy total freedom of (peaceful)
expression. Yet as you now know (if you didn’t already) the treatment of those who
question the evil that is hidden behind the ruling conglomerates facades is as brutal as
any it’s just all done in secret. Still if the good people of the planet knew this the world
would be a much better place because the weight of public opinion would force change.
And this is the value of persisting with our efforts to raise awareness even though it
seems our attempts just create a ripple in a big pond. Another hope is that those of us
working to expose the truth may inspire others who may one day get through to the
public figures who facilitate all of this and bring about a change of heart…
A huge obstacle to this is the control of certain professions (politics, publishing,
journalism, psychiatry etc) through agencies and organised crime syndicates. This leads
to the public brainwashing. In fact the term “brainwashing” was itself introduced by a
CIA spy, Ed Hunter, working as a journalist. Similarly the term “paranoid
schizophrenia” was introduced by CIA psychiatrists. So, the agencies and the mafia (etc)
plant people in key positions and recruit more from within the key professions. This is
why it’s difficult to locate any genuine people in public life and when you do they’re
afraid of being targeted just for retaining a little integrity/humanity; they’re surrounded
by spies/criminals. Acceptance of such a harsh truth is itself contrary to the brainwashed
mindset we’ve been given. “Spies and gangsters only torment each other” is the
conventional media reinforced thinking but that’s simply not true. They’re everywhere.
They stage-manage world events and our perception of them. This is what they do for a
living.
CONCLUSION: Today censorship has become a twisting, controlling factor in how we
view the world we live in. It seems it’s acceptable to publicly promote many
pornographic, profane, blasphemous, violent, irresponsible entertainments (and activities)
yet it’s clearly unacceptable (to the powers that be) to discuss the ugly truth about the
hidden evils of this world. So, the defining factor is not whether it’s right or wrong but
whether it generates money. There’s money in sex, drugs, war, fraud, illegal experiments
and so on therefore they’re alright; “they” promote what they want and hide the rest.
However, what you don’t know really does hurt you.
Also “we can therefore we do” seems to be the prevailing philosophy. There’s
little real regard for morality or ethics or how it affects other people. It’s all about money
and control. Integrity and justice are replaced by self delusion and public deception and
most public figures willingly participate. It’s a tragic state of affairs but ignoring it won’t
help.
So, in our quasi democratic system not only does the real truth not get a mention
but bans, lies, torture and more prevent concerned citizens from even presenting the truth
in any but the most marginalized fashion (such as in this magazine). It’s as if false labels
are placed on the most vital pieces of information about technology, public
accountability/integrity and more. Lies are labeled truth (and vice versa) and tyranny is
labeled freedom etc while they tell us (deceptively) “Hear what we say, see how we act,
think as we do, be as we are” (or else). Those of us who see through this nonsense must
endure harassment that tests our resolve, our courage and our endurance whilst they gloat
over every pain, every reaction and more. Simply put the tyrant loves his money and so
treats God (and his people) with disdain. Little wonder that those opposing evil in this
world are put through a great persecution courtesy of those running certain government
“black operations”, funded by criminals and their illegal practices (drugs etc) and hidden
by those same criminals, their media connections and government secrecy provisions.
What’s needed is peaceful, genuine protest and an increased public awareness of
the problems at hand, in particular the methods used to suppress information through the
oppression of individuals who have some sort of insight. And I’m not talking about
intelligence but integrity/truth. If there was nothing wrong the powers that be would
discuss all matters/technologies publicly but they can’t/won’t do that because there’d be a
public outcry against their crimes and they’d have to stop. They’d rather keep us in a
dream state looking at the world the way they want us to.
In keeping with my own beliefs regarding integrity, sincerity and loyalty I offer
the following quotes for your consideration...
1. “You can chain me, you can torture me, you can destroy this body, but you will
never imprison my mind” – Mahatma Gandhi
2. “The world is a dangerous place to live; not because of the people who are evil,
but because of the people who don’t do anything about it” – Albert Einstein
3. “Our lives begin to end the day we become silent about things that matter” –
Martin Luther King
4. “Resistance to tyrants is obedience to God” – Thomas Jefferson.
Perhaps those who also love peace, truth and their fellow man yet just stand by and
watch the world go by would do well to think on such quotes. There are still many good
men and women around us who share our ethics and beliefs. The only hope for our real
democratic rights is for everyone to be fully informed maybe then true democracy can be
resurrected along with the truths which the powers that be so corruptly bury. Having
been mushroomed and dumbed down we must push aside the pride, arrogance and lazy
thinking that can block out this truth even when we hear it. Again, on vital matters we
must both want the truth and demand it whether it’s comfortable and convenient for us or
not. Also while the truth never changes our perception of it can change if we’re not given
all the facts and again what we don’t know can hurt us. Only respect for the dignity of
the individual can save us from the worst that the oppressors can deliver. If we don’t act
now it will be farewell to many of our basic human rights: the right to free speech, the
right to personal privacy, even the right to freedom of thought/expression. In fact…
R.I.P. democracy itself.