Sprinkling of neural dust opens door to electroceuticals

UC Berkeley engineers have built the first dust-sized, wireless sensors that can be implanted in the body, bringing closer the day when a Fitbit-like device could monitor internal nerves, muscles or organs in real time.

Wireless, batteryless implantable sensors could improve brain control of prosthetics, avoiding wires that go through the skull. (UC Berkeley video by Roxanne Makasdjian and Stephen McNally)

Because these batteryless sensors could also be used to stimulate nerves and muscles, the technology also opens the door to “electroceuticals” to treat disorders such as epilepsy or to stimulate the immune system or tamp down inflammation.

The so-called neural dust, which the team implanted in the muscles and peripheral nerves of rats, is unique in that ultrasound is used both to power and read out the measurements. Ultrasound technology is already well-developed for hospital use, and ultrasound vibrations can penetrate nearly anywhere in the body, unlike radio waves, the researchers say.

“I think the long-term prospects for neural dust are not only within nerves and the brain, but much broader,“ said Michel Maharbiz, an associate professor of electrical engineering and computer sciences and one of the study’s two main authors. “Having access to in-body telemetry has never been possible because there has been no way to put something supertiny superdeep. But now I can take a speck of nothing and park it next to a nerve or organ, your GI tract or a muscle, and read out the data.“

sensor on a rat nerve fiber

The sensor, 3 millimeters long and 1×1 millimeters in cross section, attached to a nerve fiber in a rat. Once implanted, the batteryless sensor is powered and the data read out by ultrasound. (Ryan Neely photo)

Maharbiz, neuroscientist Jose Carmena, a professor of electrical engineering and computer sciences and a member of the Helen Wills Neuroscience Institute, and their colleagues will report their findings in the August 3 issue of the journal Neuron.

The sensors, which the researchers have already shrunk to a 1 millimeter cube – about the size of a large grain of sand – contain a piezoelectric crystal that converts ultrasound vibrations from outside the body into electricity to power a tiny, on-board transistor that is in contact with a nerve or muscle fiber. A voltage spike in the fiber alters the circuit and the vibration of the crystal, which changes the echo detected by the ultrasound receiver, typically the same device that generates the vibrations. The slight change, called backscatter, allows them to determine the voltage.

Motes sprinkled thoughout the body

In their experiment, the UC Berkeley team powered up the passive sensors every 100 microseconds with six 540-nanosecond ultrasound pulses, which gave them a continual, real-time readout. They coated the first-generation motes – 3 millimeters long, 1 millimeter high and 4/5 millimeter thick – with surgical-grade epoxy, but they are currently building motes from biocompatible thin films which would potentially last in the body without degradation for a decade or more.

sensor showing piezoelectric crystal.

The sensor mote contains a piezoelectric crystal (silver cube) plus a simple electronic circuit that responds to the voltage across two electrodes to alter the backscatter from ultrasound pulses produced by a transducer outside the body. The voltage across the electrodes can be determined by analyzing the ultrasound backscatter. (Ryan Neely photo)

While the experiments so far have involved the peripheral nervous system and muscles, the neural dust motes could work equally well in the central nervous system and brain to control prosthetics, the researchers say. Today’s implantable electrodes degrade within 1 to 2 years, and all connect to wires that pass through holes in the skull. Wireless sensors – dozens to a hundred – could be sealed in, avoiding infection and unwanted movement of the electrodes.

“The original goal of the neural dust project was to imagine the next generation of brain-machine interfaces, and to make it a viable clinical technology,” said neuroscience graduate student Ryan Neely. “If a paraplegic wants to control a computer or a robotic arm, you would just implant this electrode in the brain and it would last essentially a lifetime.”

In a paper published online in 2013, the researchers estimated that they could shrink the sensors down to a cube 50 microns on a side – about 2 thousandths of an inch, or half the width of a human hair. At that size, the motes could nestle up to just a few nerve axons and continually record their electrical activity.

“The beauty is that now, the sensors are small enough to have a good application in the peripheral nervous system, for bladder control or appetite suppression, for example,“ Carmena said. “The technology is not really there yet to get to the 50-micron target size, which we would need for the brain and central nervous system. Once it’s clinically proven, however, neural dust will just replace wire electrodes. This time, once you close up the brain, you’re done.“

The team is working now to miniaturize the device further, find more biocompatible materials and improve the surface transceiver that sends and receives the ultrasounds, ideally using beam-steering technology to focus the sounds waves on individual motes. They are now building little backpacks for rats to hold the ultrasound transceiver that will record data from implanted motes.

Diagram showing the components of the sensor.

Diagram showing the components of the sensor. The entire device is covered in a biocompatible gel.

They’re also working to expand the motes’ ability to detect non-electrical signals, such as oxygen or hormone levels.

“The vision is to implant these neural dust motes anywhere in the body, and have a patch over the implanted site send ultrasonic waves to wake up and receive necessary information from the motes for the desired therapy you want,” said Dongjin Seo, a graduate student in electrical engineering and computer sciences. “Eventually you would use multiple implants and one patch that would ping each implant individually, or all simultaneously.”

Ultrasound vs radio

Maharbiz and Carmena conceived of the idea of neural dust about five years ago, but attempts to power an implantable device and read out the data using radio waves were disappointing. Radio attenuates very quickly with distance in tissue, so communicating with devices deep in the body would be difficult without using potentially damaging high-intensity radiation.

A sensor implanted on a peripheral nerve is powered and interrogated by an ultrasound transducer. The backscatter signal carries information about the voltage across the two electrodes. The 'dust' mote was pinged every 100 microseconds with six 540-nanosecond ultrasound pulses.

A sensor implanted on a peripheral nerve is powered and interrogated by an ultrasound transducer. The backscatter signal carries information about the voltage across the sensor’s two electrodes. The ‘dust’ mote was pinged every 100 microseconds with six 540-nanosecond ultrasound pulses.

Marharbiz hit on the idea of ultrasound, and in 2013 published a paper with Carmena, Seo and their colleagues describing how such a system might work. “Our first study demonstrated that the fundamental physics of ultrasound allowed for very, very small implants that could record and communicate neural data,” said Maharbiz. He and his students have now created that system.

“Ultrasound is much more efficient when you are targeting devices that are on the millimeter scale or smaller and that are embedded deep in the body,” Seo said. “You can get a lot of power into it and a lot more efficient transfer of energy and communication when using ultrasound as opposed to electromagnetic waves, which has been the go-to method for wirelessly transmitting power to miniature implants”

“Now that you have a reliable, minimally invasive neural pickup in your body, the technology could become the driver for a whole gamut of applications, things that today don’t even exist,“ Carmena said.

Other co-authors of the Neuron paper are graduate student Konlin Shen, undergraduate Utkarsh Singhal and UC Berkeley professors Elad Alon and Jan Rabaey. The work was supported by the Defense Advanced Research Projects Agency of the Department of Defense.


Assassination is the murder of a person, often (but not or ruler, usually for political reasons or paymen. Or the common man.

Assassination is the murder of a person, often (but not always) or ruler, usually for political reasons or paymen. Or the common man.

brain control

An assassination may be prompted by, political, or military motives; it is an act that may be done for financial gain, to avenge a grievance, from a desire to acquire fame or notoriety, or because of a military, security or insurgent group’s command to carry out the homicide.

The World Coalition against Covert Harassment is committed to raising awareness to the legal systems as well as to the medical and scientific community to the crime of illegal biomedical and weaponry research committed on citizens in the European Union and beyond. As a European network, EUCACH acts as a lobbying and advocacy platform towards the EU. Using our international network of scientific and technology experts, partner civil and human rights organisations as well as important stakeholders in civil society, we provide consultancy services to the EU Institutions based on our expertise. EUCACH’s organisational goal is to influence EU legislation and the decision-making process in calling for a worldwide ban on weapons that might enable any form of manipulation of human beings.

Online-connected brains and neural networks.

“ICT” = Information and Communication Technologies

“BMI” = Brain Machine Interface, brain-computer interconnection

“FET” = Future and Emerging Technologies

“S.T.” = Synthetic Telepathy

“A.I.” = Artificial Intelligence.

On the road to mind control: DARPA’s new program will use a chip to connect brains.For additional background to the latest press release from DARPA posted in full below, I encourage you to read the following selection of linked articles
where I discuss the scope and chronology of what is being studied. Therein, you will find that the U.S. BRAIN Initiative and its European counterpart, the Human Brain Project, are not spending multi-billions of dollars on neuroscience research
simply to help people with Post Traumatic Stress Disorder and organic brain dysfunction. It is, perhaps first and foremost, a military endeavor that has wide ramifications if even 1/10th of what is being studied comes to fruition. In short, it’s more about mind control than it is about brain restoration and improvement. Please keep this in mind when you read DARPA’s emphasis on “new therapies.” •Obama Doubles Down on BRAIN Project and Military Mind Control

•Mind Control Scientists Find New Memory Manipulation Technology
•Secret DARPA Mind Control Project Revealed: Leaked Document
•The 9 Goals of Mind Control: Interim Report
•New Mind Reading Research Aims to Synchronize Humans
•Nanoparticles Enable Remote Control Brains Via Magnetic Field: New Study

DARPA Press Release:

Darpa mind

A new DARPA program aims to develop an implantable neural interface able to provide unprecedented signal resolution and data-transfer bandwidth between the human brain and the digital world. The interface would serve as a translator, converting between the electrochemical language used by neurons in the brain and the ones and zeros that constitute the language of information technology. The goal is to achieve this communications link in a biocompatible device no larger than one cubic centimeter in size, roughly the volume of two nickels stacked back to back.

The program, Neural Engineering System Design (NESD), stands to dramatically enhance research capabilities in neurotechnology and provide a foundation for new therapies.

“Today’s best brain-computer interface systems are like two supercomputers trying to talk to each other using an old 300-baud modem,” said Phillip Alvelda, the NESD program manager. “Imagine what will become possible when we upgrade our tools to really open the channel between the human brain and modern electronics.”

Among the program’s potential applications are devices that could compensate for deficits in sight or hearing by feeding digital auditory or visual information into the brain at a resolution and experiential quality far higher than is possible with current technology.

Neural interfaces currently approved for human use squeeze a tremendous amount of information through just 100 channels, with each channel aggregating signals from tens of thousands of neurons at a time. The result is noisy and imprecise. In contrast, the NESD program aims to develop systems that can communicate clearly and individually with any of up to one million neurons in a given region of the brain.

Achieving the program’s ambitious goals and ensuring that the envisioned devices will have the potential to be practical outside of a research setting will require integrated breakthroughs across numerous disciplines including neuroscience, synthetic biology, low-power electronics, photonics, medical device packaging and manufacturing, systems engineering, and clinical testing. In addition to the program’s hardware challenges, NESD researchers will be required to develop advanced mathematical and neuro-computation techniques to first transcode high-definition sensory information between electronic and cortical neuron representations and then compress and represent those data with minimal loss of fidelity and functionality.

To accelerate that integrative process, the NESD program aims to recruit a diverse roster of leading industry stakeholders willing to offer state-of-the-art prototyping and manufacturing services and intellectual property to NESD researchers on a pre-competitive basis. In later phases of the program, these partners could help transition the resulting technologies into research and commercial application spaces.

To familiarize potential participants with the technical objectives of NESD, DARPA will host a Proposers Day meeting that runs Tuesday and Wednesday, February 2-3, 2016, in Arlington, Va. The Special Notice announcing the Proposers Day meeting is available athttps://www.fbo.gov/spg/ODA/DARPA/CMO/DARPA-SN-16-16/listing.html. More details about the Industry Group that will support NESD is available athttps://www.fbo.gov/spg/ODA/DARPA/CMO/DARPA-SN-16-17/listing.html. A Broad Agency Announcement describing the specific capabilities sought is available at: http://go.usa.gov/cP474.

DARPA anticipates investing up to $60 million in the NESD program over four years.

NESD is part of a broader portfolio of programs within DARPA that support President Obama’s brain initiative. For more information about DARPA’s work in that domain, please visit:http://www.darpa.mil/…/our-r…/darpa-and-the-brain-initiative.

FET and ICT research and development (of the new “computer – brain language”) allows computers to read and learn human thought patterns by using injectable brain – machine – interface.

About the same brain-machine interface has has been used to cure Parkinson’s disease , Alzheimer’s and depression can also be used for accessing the brain’s memory.

brain mind

Digital Mind


Link to document

The new software for the brain-machine interface in nano electronics combined with “Europe’s new information technology” provides the researchers with the possibillities for reading and taking “software images” of the brain’s neuron network.

A method that provides high-resolution copies of the brains cognitive behavior and human perception.

Tomorrow’s high-speed computers and related research has evolved into a sophisticated “computer game” with “mind reading” on real people….

These research methods are unknown to our society’s legal system!

So how can research on the brain by “serious” (criminal) organizations in ICT-FET be stopped?

SYNTHETIC TELEPATHY for medicine or mind reading is a direct communication with nanoelectronics between computer and human brain.

Synthetic telepathy is a communication system based on thought, not speech.

It can be used to control for example a prosthesis and cure diseases such as Parkinson’s disease but can also decode the patterns used to study cognitive behavior such as memory, learning and emotion. With nano technology, the digital information can be recorded using the new quantum-inspired computers.

Simulation of behavior can be identified and provide diagnostic data for identifying the precursors to diseases such as dementia, stroke and myocardial infarction

This letter is intended to demonstrate a paradox in the Swedish so-called “protection of human rights” and thus the entire Swedish justice system. Synthetic telepathy could, as practiced in Sweden, lie behind an unknown number of violent crimes and suicides due to research deliberately kept hidden from regulators.

Doctors and psychiatrics diagnose people with “voices in his head” following their “manuals”. DSM-IV (Diagnostic and Statistical Manual of Mental Disorders) published by the American Psychiatric Association and the ICD-10 (International Statistical Classification of Disorders and Related Health Problems).

This is an old-fashioned black and white and diagnose when the EU priority FET ICT research and develop new information technologies adapted to nano-electronics.


Ulf Gorman writes in the book that with nano technology, we open the doors to an unknown area where we do not know how to apply ethics. What should be and what should not be allowed when you implant a chip that can both read and influence the brain? He takes the example of studying learning and memory.

Micro Implants can provide unprecedented opportunities to understand how we learn and remember things, and hence why we forget and find it difficult to learn. And it can be understood as a form of abuse to look like that into our most private mental world.

Lund University writes about the development of nano-electrodes that can both listen and communicate with neuronal synapses and their cell membranes.

EU priority ICT and FET research are talking about a “A whole new communication technology in Europe” “It will help us understand and exploit the ways in which social and biological systems, organization and evolution, will pave the way for the development of new opportunities for next-generation software and network technologies “.
To understand how the human brain works not only leads to innovations in medicine but also provides new models for energy, fault-tolerant and adaptive computing technologies “.
An initiative of the Virtual Human Physiology that are individually tailored and virtual simulations of the human body where you would expect enormous progress in disease prevention and health care.
The pioneering work carried out also on new ideas such as artificial living cells, synthetic biology, chemical communication, collective intelligence and two-way interface between brain and machine.

New Brain

Brain reading

Other sources, e.g The UCI (University of California Irvin. Department of Cognitive Science) describes the development of Synthetic Telepathy:

Collaboration between cognitive science, neuro-science, specialists in speech recognition and brain imaging will develop a brain-machine interface. This device could help paralyzed and soldiers would be able to send messages directly from the brain to a computer.

Researcher Michael D’Zmura, President of the UCI describes that the system begins with “the little voice in your head“.

How can a medical diagnosis unequivocally describe people’s perception of voices in their head and that no alternative can exist except mental disease.

Why? -because it is a prerequisite to be able to “hear” voices for the use of new information technology?

This is why these researchers must be forced to go public and announce this new scientific communication technology.

This paradox must be investigated immediately.With the exclusion of the development of a Swedish and European military force with superior two-way “radio” communication with the brain.


A number of past court cases are more or less directly caused by S.T. This “voice to skull” technology must immediately be taken into consideration as an alternative for triggering a number of previously committed violent crimes and suicides.

During the development of BMI, software and network technologies are also computerized and long distance imaging of peoples cognitive behavior and perception. Material that is recorded in the computer that runs the real time simulation and creation of artificial intelligence (for initializing A.I. and computerized decision making.)

The image of the brain’s “machine-code” is probably the most comprehensive and advanced ever made. Cognitive behavior depicted and simulated, language and meaning of the words for the subjects are identified. Human perception and mapping how the brain handles information, the image of mathematics reached its perfection.

neuron wave A new research scandal and the fatal consequences for the wider community.

Around the clock the computerized study goes on using collective, artificial intelligence and self-learning systems. The victims testimonies tells us that you can sadly conclude unequivocally that the studies will not be completed until the victim in one way or another has been broken down and / or otherwise inactivated.

This provides power to simulate decomposition for the digital copy thus the fact that the criminal research will not end and is never disclosed.

Descriptions to the vulnerable people who eat psychotropic drugs due to their experiences the experiments and testing goes on, various medicines can affect the “test objects” (or guinea pigs) everything is recorded and compared with previous values (from the multi-annual copy of their real-time neural network and thus the registration of their behavior.)

Obviously this is a disgusting and illegal way to meet the advanced development of tomorrow’s medicine.

The “studies” have resulted in enormous damage to many subjects.The number of unrecorded victims/subjects is probably very high.Families are fragmented, the children of these families are suffering tremendously. One of the subjects have recently been hospitalized with a cracked skull, caused by disconnecting the balance system remotely. The accident occurred in public settings.

A new research scandal and the fatal consequences for the wider community.

To influence the balance system is another typical example of how technology is used against the victim to incapacitate them for society. Direct assassination attempts on several previous occasions orchestrated by the brain control deliberately strikes out the human balance system, Why this happens is likely as an alternative to the mentally ill to be treated (as “possessed”) or having a neurological disease.

brain world

Brain – copying with BMI and broadband access is definitely no longer a marginal research.Employers have over the years lost millions of dollars and cut-downs is to be expected due to excluded employees. Broken families, children who, years later can not study or work is now forced to seek psychiatric care.

Siblings, grandparents and their closest friends are suffering tremendously. Advanced Medical and hospital care due to study design is a mockery of health-care and doctors who are not familiar with this research. Insurance in the multi-million figures was raised through direct damage caused by brain control. Property for millions of dollars are lost.

Injuries and privacy intrusion of thousands of people is done through “volunteers” that serve as multimedia machines i.e node for the recording of all contacts they have, such as politicians, scientists, lawyers, friends, acquaintances, relatives, international business relations, etc..

Security codes, access codes, etc. is with the new technology no longer private.How can we know that people are not equipped with the new brain-machine interface which makes the person a multimedia application with a function as a live missile is already deployed as nodes in the political and financial world of illegal recording of their conversations with the world?

A sinister JOY seems to embrace the researchers and perpetrators over this superior and powerful tool for mind control and copying brainwave patterns. The tool is, without a doubt, a weapon of offense and stealth.

Implant technology in these forms should immediately be classified as a lethal weapon! It communicates directly with the brain’s neurons and can bring the entire neural nervous system to a halt.(Exclusion of balance can be immediately implied on a victim.)

The technology is now used for purposes of breaking down the persons psyche, with serious accusations, threats, mock execution, incitement to suicide, physical violence, e.g, decrease and increase heart rate, pain in and around the heart, severe chest pains, sudden and painful headaches, difficulty to breathe, tampering with rectum, prostate and muscles to name a few.

The macabre in the use of this technology is that subjects are exposed to these atrocities while the society is not legally able to influence the situation. Sweden is in this matter a lawless country where the researchers grossly exploit the situation.

brain war

Face mind

This ultimate humiliation has reached a whole new level. The researchers tries with the enforced communication and slow decomposition enslave people with exhortations to try to see the individual results of the brain control. One can calculate due to the nature and perennial perspective that there are naturally a unrecorded number of people who have been driven to madness and death with this technology.

There is nowhere the victims can hide or escape the access signals to their thoughts. Scientists simulate with computers, 24/7 365 days a year to break down the subjects and stop them from trying to understand what’s happening to them…

A series of grotesque roles played in order to manipulate the brain, threats and statements that are mixed with modern technology. It is also in the researchers’ strategy to make the picture unclear for the subjects if they attempt to get an overall picture of who the perpetrator is and the real goals of the research, a military strategy conducted by veterans and experts in the matters.

The disrespectful research performed and visualized in a 3D virtual game world in the researchers’ computers, with no ethical boundaries and human rights but with real living human beings as “avatars”. It is quite similar to the popular interactive game “The Sims‘, But this game delivers human reality-based measurement data for research.

Cover-up of brain monitoring technologies means that the crime is waterproof, human rights laws and manipulated by a hidden militant regime researcher with expertise in information technology. In addition, the researchers say they in the dialogue to be the police power which in itself is an extremely serious offense.

For the victims– former high-performance hard-working people with families, children, an orderly life and social contacts. People who all his life been performing taxpayers. Because of a work-related mental fatigue and time on medical therapy sessions with the scientists the opportunity to take advantage of the situation of persons for investigation and contemporary development of the new BMI and brain monitoring technologies.

As these technologies and opportunities are not announced, but several instances re-written, must be able to use knowledge and skills which are available. Sweden is a small country and the people engaged in this activity may not be so difficult to identify and stop.

The researchers in these studies have assumed the right that during the permanent reproduction of human neurotransmitters in the long term also destroy them and their life’s work. The issue is called for; How affected society to know that the violent crime and suicide has been performed in the Stockholm area and Europe in recent years and clearly diagnosed as being caused by mental illness with the voices in heads is an expression of pure brain research!

By: Magnus Olsson



Awareness-raising campaigns to disseminate information and mobilise public opinion on the issue of covert technologies and techniques that enable the manipulation of human beings

Providing expert consultancy to key decision-makers on the creation of appropriate EU legislation to protect citizens from this kind of covert crimes.

Organising networking events (workshops, seminars, conferences) involving all actors concerned to exchange experiences and best practices for the establishment of clear ethical boundaries to strictly regulate the use of systems enabling the manipulation and control of human beings.

It is our philosophy that all men are equal before the law. Everybody’s right to life shall be protected. Nobody shall be subjected to torture or held in slavery. Any technologies and techniques capable of endangering the human physical and/or psychological health, to modify the individuals’ autonomy and affect their dignity should be strictly prohibited.

Read more about ICT – implants at the European Group on Ethics and New Technologies:


Terminology used in the document:

Cybernetics,,,,,, // Magnus Olsson

By: Magnus Olsson  (Sweden)

Disturbing Weapons NOW Being Used on The Masses

Disturbing Weapons Used on The Masses

Darpa mind

DARPA along with many other technologically advanced government run companies are developing disturbing psychotropic and neurological weaponry that can manipulate the minds of millions. These highly advanced technologies include mind-reading binoculars, mind-controlling helmets, satellite mind reading, chip implants, remote control brain manipulation, and more.


The topic of mind control is elaborate, multifaceted, and multi layered. For the everyday reader, it can easily become mind-numbing, but avoiding the subject is the most foolish thing you could possibly do since your only chance of surviving this menacing enslavement agenda, which today threatens virtually all of humanity, is to understand how it functions and take steps to education yourself. I highly suggest you watch the video below in its entirety, as it is a real eye-opener for what’s coming.



Mind Control Programs Include:

Project Chatter was a US Navy drug testing program that began in the fall of 1947. The program focused on the identification and testing of drugs for use in interrogations and in the recruitment of agents. The research included laboratory experiments on BOTH animals and human subjects involving Anabasis aphylla, LSD, scopolamine, and mescaline drugs in order to determine their speech-inducing qualities. Human test subjects were rounded-up from mental health institutions and forced to take part in experimentation –regardless of their will. Project Chatter is not a conspiracy theory. The government has openly admitted to this programming and although they “supposedly” closed the projects doors in 1953, Project Blue Bird reared its ugly head. (Click Here To Read Government Document on Project Chatter)

Project BlueBird began in 1949. It deliberately created multiple personalities in patients. Experimentation was conducted by psychiatrists to create amnesia, new identities, hypnotic access codes and new memories in the minds of experimental subjects. This project was funded by the CIA, Army, Navy, and Air Force. There was extensive political abuse of psychiatry that was not only perpetrated by a few renegade doctors, but also by leading psychiatrists, psychologists, pharmacologists, neurosurgeons and medical schools. They also rounded up mental patients in hospitals as their test subjects. Again, Project BlueBird is not a conspiracy theory, it is a fact and has been openly admitted by the government. (Click Here to Read Government Document on Project BlueBird)

Project Artichoke was a CIA project that research the interrogation methods that arose from Project BlueBird in 1951. It was run by the CIA’s Office of Scientific Intelligence. This project studied hypnosis, forced morphine addiction, and the use of other chemicals to produce amnesia and other vulnerable states in subjects. Artichoke was a mind control program. Moreover, the scope of the project was outlined in a memo dated January 1952 that stated, “Can we get control of an individual to the point where he will do our bidding against his will and even against fundamental laws of nature, such as self-preservation?”  Project Artichoke eventually morphed into MKULTRA in a memorandum by Richard Helms to CIA director Allen Welsh Dulles on April 13, 1953.

MK Ultra was birthed in 1953. The program was a human research operation experimenting in the behavioral engineering of humans through the CIA’s Scientific Intelligence Division. It used numerous methodologies to manipulate people’s mental states and alter brain functions, including: radiation, electroshock, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, the administration of LSD and other drugs, as well as various other forms of torture. It was known to have engaged in many illegal activities, including, using unwilling test subjects in both the U.S. and Canada. The program is still alive and active today. There is no conspiracy theory, again this is a fact. (Click Here to Read Government Documentation on Project MKULTRA)

The Monarch Program is a “sub” program on MKULTRA. It is a form of mind control which creates a mind control slave by utilizing the human brain’s trauma response of disassociation to create a form of Multiple Personality Disorder (MPD) wherein various triggers can cause the slave personality to surface and respond to commands given by the master.

There are various “stages” of programming (Below information taken from StrangerDimensions.com):

ALPHA: Regarded as “general” or regular programming within the base control personality; characterized by extremely pronounced memory retention, along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of L and R through neuron pathway stimulation.”

BETA: Referred to as “sexual” programming. This programming eliminates all learned moral convictions and stimulates the primitive sexual instinct, devoid of inhibitions. “Cat” alters may come out at this level.

DELTA: This is known as “killer” programming, originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear; very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.

THETA: Considered to the “psychic” programming. Bloodliners (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems.

OMEGA: A “self-destruct” form of programming, also known as “Code Green.” The corresponding behaviors include suicidal tendencies and/or self-mutilation. This program is generally activated when the victim/survivor begins therapy or interrogation and too much memory is being recovered.

GAMMA: Another form of system protection is through “deception” programming, which elicits misinformation and misdirection. This level is intertwined with demonology and tends to regenerate itself at a later time if inappropriately deactivated.”

Programmed individuals include: lone gun men, serial killers, celebrities, journalist, news investigators, military personal, lawmen, and government officials.

Part I

Part II

For More Information See:




Neuro-Technology: Pentagon’s DARPA Continues To Push “Black Box” Brain Chip Implant

Neuro-Technology: Pentagon’s DARPA Continues To Push “Black Box” Brain Chip Implant


Pentagon wants to “help” soldiers and seniors by implanting devices to trigger memories

The Defense Advanced Research Projects Agency (DARPA), the research arm of the military, is continuing to develop implantable brain chips, according to documents newly posted as part of the agency’s increased “transparency” policy.

The agency is seeking to develop a portable, wireless device that “must incorporate implantable probes” to record and stimulate brain activity – in effect, a memory triggering ‘black box’ device.


The process would entail placing wires inside the brain, and under the scalp, with electrical impulses fired up through a transmitter placed under the skin of the chest area.

Bloomberg first picked up the story last week, and since then several tech blogs have jumped on board, describing the technological push as part of a project to help injured soldiers, and part an initiative set up by the Obama administration to find treatments for brain disorders, such as Alzheimer’s.

In reality, this project has been ongoing for years, decades in fact. And given that the Pentagon war machine is spear-heading it, with $70m of funding, one must seriously question why the DoD suddenly gives a damn about war wounded vets, never mind everyday Americans with brain disorders.

The documents state that rather than aid general memory loss, such a device would enable the ability to recover “task-based motor skills” like driving cars, operating machinery, tying shoe laces or even flying planes. It would also help recover memory loss surrounding traumatic events – according to the documents.


Memory loss surrounding trauma occurs for a reason, so the individual can, at some point, slowly work back toward living a normal life. One has to wonder, from this description, whether DARPA’s brain implant, would merely facilitate “patching up”, soldiers, and sending them back out to duty, as if they were defective robots.

Indeed, that is the kind of transhumanism project that DARPA revels in. Just last year it was revealed that a DARPA team has constructed a machine that functions like a human brain and would enable robots to think independently and act autonomously.

There have also long been reports of DARPA seeking to develop technology that enables military masters to literally control the brains of soldiers and make them want to fight. A 2008 report for the US military detailed this initiative, along with possible weaponry including “Pharmacological landmines” that release chemicals to incapacitate enemy soldiers and torture techniques that involve delivering electronic pulses into the brains of terror suspects.

The report, titled “Emerging Cognitive Neuroscience and Related Technologies”, detailed byWired and the London Guardian, was commissioned by the Defense Intelligence Agency, the intelligence wing of the Department of Defense. It contains scientific research into the workings of the human mind and suggestions for the development of new war fighting technologies based upon the findings.

In a section focusing on mind control, the report states

If we can alter the brain, why not control it? […] One potential use involves making soldiers want to fight. Conversely, how can we disrupt the enemy’s motivation to fight? […] How can we make people trust us more? What if we could help the brain to remove fear or pain? Is there a way to make the enemy obey our commands?

It concludes that “drugs can be utilized to achieve abnormal, diseased, or disordered psychology” and also suggests that scanners able to read the intentions or memories of soldiers could be developed.

The report clearly does not rule out the use of such mind scanning technology on civilians as it suggests that “In situations where it is important to win the hearts and minds of the local populace, it would be useful to know if they understand the information being given them.”


It also suggests that the technology will one day have applications in counter-terrorism and crime-fighting and “might be good enough to help identify people at a checkpoint or counter who are afraid or anxious.”

The notion of “recording” brain activity is also something that DARPA has long sought to master. The concept may seem completely outlandish, yet it has been the central focus of DARPA activities for some time with projects such as LifeLog, which seeks to gain a multimedia, digital record of everywhere a person goes and everything they see, hear, read, say and touch.

Wired Magazine has reported:

On the surface, the project seems like the latest in a long line of DARPA’s “blue sky” research efforts, most of which never make it out of the lab. But DARPA is currently asking businesses and universities for research proposals to begin moving LifeLog forward.

“What national security experts and civil libertarians want to know is, why would the Defense Department want to do such a thing?” the article asks. The answer lies in the stated goal of the US military – “Total Spectrum Dominance”.

Furthermore, assertions that the neuro technology would not be in any way dominant over a person’s capacity to think, does not tally with DARPA’s Brain Machine Interfaces enterprise, a $24 million project reported on in the August 5, 2003 Boston Globe.

The project is developing technology that “promises to directly read thoughts from a living brain – and even instill thoughts as well… It does not take much imagination to see in this the makings of a matrix-like cyberpunk dystopia: chips that impose false memories, machines that scan for wayward thoughts, cognitively augmented government security forces that impose a ruthless order on a recalcitrant population.” The Globe reported.

Government funded advances in neurotechnology which also focus on developing the ability to essentially read people’s minds should also set alarm bells ringing.

It is also well documented that the military and the federal government have been dabbling in mind control and manipulation experimentation for decades.

Brain implants are a very scary proposition, however, and selling such a thing to veterans, and especially to the wider American populace, may be a harder task than selling them a pill to pop. Which is why some, including one former DARPA director and now a Google executive, have also been developing devices such as edible chips and e-tattoos.

Transhumanism is trendy!

Steve Watson is the London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from Nottingham Trent University.

Articles by: Steve Watson

Related content:

To Build a Supercomputer Replica of a Human Brain

The $1.3B Quest to Build a Supercomputer Replica of a Human Brain

  • By Jonathon Keats
  • 05.14.13
  • See all  Pages: 1 2 3

Even by the standards of the TED conference, Henry Markram’s 2009 TEDGlobal talk was a mind-bender. He took the stage of the Oxford Playhouse, clad in the requisite dress shirt and blue jeans, and announced a plan that—if it panned out—would deliver a fully sentient hologram within a decade. He dedicated himself to wiping out all mental disorders and creating a self-aware artificial intelligence. And the South African–born neuroscientist pronounced that he would accomplish all this through an insanely ambitious attempt to build a complete model of a human brain—from synapses to hemispheres—and simulate it on a supercomputer. Markram was proposing a project that has bedeviled AI researchers for decades, that most had presumed was impossible. He wanted to build a working mind from the ground up.

In the four years since Markram’s speech, he hasn’t backed off a nanometer. The self-assured scientist claims that the only thing preventing scientists from understanding the human brain in its entirety—from the molecular level all the way to the mystery of consciousness—is a lack of ambition. If only neuroscience would follow his lead, he insists, his Human Brain Project could simulate the functions of all 86 billion neurons in the human brain, and the 100 trillion connections that link them. And once that’s done, once you’ve built a plug-and-play brain, anything is possible. You could take it apart to figure out the causes of brain diseases. You could rig it to robotics and develop a whole new range of intelligent technologies. You could strap on a pair of virtual reality glasses and experience a brain other than your own.

The way Markram sees it, technology has finally caught up with the dream of AI: Computers are finally growing sophisticated enough to tackle the massive data problem that is the human brain. But not everyone is so optimistic. “There are too many things we don’t yet know,” says Caltech professor Christof Koch, chief scientific officer at one of neuroscience’s biggest data producers, the Allen Institute for Brain Science in Seattle. “The roundworm has exactly 302 neurons, and we still have no frigging idea how this animal works.” Yet over the past couple of decades, Markram’s sheer persistence has garnered the respect of people like Nobel Prize–winning neuroscientist Torsten Wiesel and Sun Microsystems cofounder Andy Bechtolsheim. He has impressed leading figures in biology, neuroscience, and computing, who believe his initiative is important even if they consider some of his ultimate goals unrealistic.

Markram has earned that support on the strength of his work at the Swiss Federal Institute of Technology in Lausanne, where he and a group of 15 postdocs have been taking a first stab at realizing his grand vision—simulating the behavior of a million-neuron portion of the rat neocortex. They’ve broken new ground on everything from the expression of individual rat genes to the organizing principles of the animal’s brain. And the team has not only published some of that data in peer-reviewed journals but also integrated it into a cohesive model so it can be simulated on an IBM Blue Gene supercomputer.

The big question is whether these methods can scale. There’s no guarantee that Markram will be able to build out the rest of the rat brain, let alone the vastly more complex human brain. And if he can, nobody knows whether even the most faithful model will behave like a real brain—that if you build it, it will think. For all his bravado, Markram can’t answer that question. “But the only way you can find out is by building it,” he says, “and just building a brain is an incredible biological discovery process.” This is too big a job for just one lab, so Markram envisions an estimated 6,000 researchers around the world funneling data into his model. His role will be that of prophet, the sort of futurist who presents worthy goals too speculative for most scientists to countenance and then backs them up with a master plan that makes the nearly impossible appear perfectly plausible. Neuroscientists can spend a whole career on a single cell or molecule. Markram will grant them the opportunity and encouragement to band together and pursue the big questions.

And now Markram has funding almost as outsized as his ideas. On January 28, 2013, the European Commission—the governing body of the European Union—awarded him 1 billion euros ($1.3 billion). For decades, neuroscientists and computer scientists have debated whether a computer brain could ever be endowed with the intelligence of a human. It’s not a hypothetical debate anymore. Markram is building it. Will he replicate consciousness? The EU has bet $1.3 billion on it.

Ancient Egyptian surgeons believed that the brain was the “marrow of the skull” (in the graphic wording of a 3,500-year-old papyrus). About 1,500 years later, Aristotle decreed that the brain was a radiator to cool the heart’s “heat and seething.” While neuroscience has come a long way since then, the amount that we know about the brain is still minuscule compared to what we don’t know.

Over the past century, brain research has made tremendous strides, but it’s all atomized and highly specific—there’s still no unified theory that explains the whole. We know that the brain is electric, an intricately connected network, and that electrical signals are modulated by chemicals. In sufficient quantity, certain combinations of chemicals (called neurotransmitters) cause a neuron to fire an electrical signal down a long pathway called an axon. At the end of the axon is a synapse, a meeting point with another neuron. The electrical spike causes neurotransmitters to be released at the synapse, where they attach to receptors in the neighboring neuron, altering its voltage by opening or closing ion channels. At the simplest level, comparisons to a computer are helpful. The synapses are roughly equivalent to the logic gates in a circuit, and axons are the wires. The combination of inputs determines an output. Memories are stored by altering the wiring. Behavior is correlated with the pattern of firing.

Yet when scientists study these systems more closely, such reductionism looks nearly as rudimentary as the Egyptian notions about skull marrow. There are dozens of different neurotransmitters (dopamine and serotonin, to name two) plus as many neuroreceptors to receive them. There are more than 350 types of ion channel, the synaptic plumbing that determines whether a neuron will fire. At its most fine-grained, at the level of molecular biology, neuroscience attempts to describe and predict the effect of neurotransmitters one ion channel at a time. At the opposite end of the scale is functional magnetic resonance imaging, the favorite tool of behavioral neuroscience. Scans can roughly track which parts of the brain are active while watching a ball game or having an orgasm, albeit only by monitoring blood flow through the gray matter: the brain again viewed as a radiator.

Two large efforts—the Allen Brain Atlas and the National Institutes of Health-funded Human Connectome Project—are working at levels in between these two extremes, attempting to get closer to that unified theory that explains the whole. The Allen Brain Atlas is mapping the correlation between specific genes and specific structures and regions in both human and mouse brains. The Human Connectome Project is using noninvasive imaging techniques that show where wires are bundled and how those bundles are connected in human brains.

To add to the brain-mapping mix, President Obama in April announced the launch of an initiative called Brain (commonly referred to as the Brain Activity Map), which he hopes Congress will make possible with a $3 billion NIH budget. (To start, Obama is pledging $100 million of his 2014 budget.) Unlike the static Human Connectome Project, the proposed Brain Activity Map would show circuits firing in real time. At present this is feasible, writes Brain Activity Map participant Ralph Greenspan, “in the little fruit fly Drosophila.”

Even scaled up to human dimensions, such a map would chart only a web of activity, leaving out much of what is known of brain function at a molecular and functional level. For Markram, the American plan is just grist for his billion-euro mill. “The Brain Activity Map and other projects are focused on generating more data,” he writes. “The Human Brain Project is about data integration.” In other words, from his exalted perspective, the NIH and President Obama are just a bunch of postdocs ready to work for him.

Mind Control Technology Correlates with Victim Allegations

Mind Control Technology Correlates with Victim Allegations

Brain Thechnology

By breaking the problem down to manageable size, mind control technology used in mind control nonconsensual experimentation can be described. SQUID can read minute magnetic signals from the brain and with mathematic computations correlate this to processing of light stimuli by the brain, for example. In the development of MRI in the early 1970s, fourier transforms and pulse techniques were described as a way to decipher the very minute brain signals among all the electromagnetic background noise. And in 1980, Dr. Mackay described cross-correlation as one of the most powerful computational techniques for extracting significant information from brain signals. And now Tennenbaum and many articles describe the future use of HTSC for reading minute biological signals in the late 1980s. The theory behind detecting thought processes is passing the test of time.

MEG was used to pick up the magnetic signals which are oscillating millisecond fluxes of the brain in real time. If there were electromagnetic codes and programs for the brains processes that have already been discovered, (as in the gene mapping project), then the signals would have meaning.

foi mind control

Victims report that their thoughts can be read instantly and replied to, that pictures and dreams, memories and feelings can be remotely manipulated and controlled. Every nerve and muscle of the body can now be controlled. Again, breaking the problem down to manageable amounts is very helpful in describing the technology available that could account for victim’s allegations. One previous example was the artificial retina chip, a copy of the neural organization of the retina and visual processing as the human brain does. This and the visual processing of the brain by frequencies mentioned previously could have been discovered and would account for dreams, pictures and implanted visualizations reported by victims.

The hearing of voices has been described elsewhere via microwave effects by the military to be used against terrorists (see CAHRA, Intelligence tools). The manipulation of memory could be accounted for with Wiener’s theory of the storage via nucleic acid complexes. Others have made the hypothesis of a molecular code that may be searched out and finally mastered, according to discussions at the American Association for the Advancement of Science(Lessing,1967, DNA Pg. 56.). Long and short term memory may use different mechanisms and Pribram’s theory of holography may be a key process. Pribram has suggested that sensory information is relayed and reconstructed by neuron interaction and also the sensory cells can interact to form a type of hologram[which is made up of electromagnetic waves]. This information combined with previously described techniques demonstrate how in principle, this could be done without a chip or implant. From the many facts, it can be concluded that the functioning of the brain has been discovered and applied to military applications. The underlying principles have been discovered.

Manipulation of feelings could be done via electromagnetic signals. Penfield described the experiments in the 1930s of stimulating areas of the cortex while surgically treating epileptic patients and patients would describe reliving of a previous memory, a flash-back, smelling certain smells and feeling physical sensations. The process for targeting areas of the brain for rage, happiness, and many other feelings most likely have been located.

brain control

Manipulation of every nerve in the body can be explained via electromagnetic signals to specific locations of the brain. The process of sensations and movement may be catalogued in the atlas of signals which Wiener predicted. And the underlying brain mechanism for processing sensations have been determined. This does not seem so farfetched now that very weak signals can be detected and correlated to specific stimulus. The location of the electromagnetic source is possible with MEGs, magnetoencephalography, as stated in a previous article,(pg. 40) and therefore could be targeted by remote means. Recording the signals and then playing them back has been described as the means for direct communication with the brain. Any sensation could be created if a specifically tailored electromagnetic signal were known or mimicked and transmitted. The military interest in solving very complicated brain processes has created the funding needed for scientific projects such as this.

The robotic effects or street theatre that many victims describe is worth mentioning. Behavior of people can now be engineered as if they were puppets. Delgado’s research with implants which stopped a charging bull and then with remote electromagnetic signals is one part of this puzzle. The military has done extensive research on hypnosis(see Operation Mind Control, Walter Bowart1978). The electromagnetic signal or command is directed to the subconscious, and as in hypnosis the target will do whatever the command states. This has been demonstrated by J.F. Schapitz in government experiments(See The Controller, Martin Cannon). The brain is a complex system and there are no easy explanations. This was meant to be the beginning of a solid foundation of proof of government mind control technology that would overcome the lack of government documents that are classified under the National Security Act.


The capability to read and communicate remotely with the brain is a technology that governments would go to great lengths to develop, especially to surpass an enemy that is developing mind control technology also. Over 25 articles on Russian mind control are available (see also CAHRA UN Report) and a few of the many examples were presented here. The Soviets have had a documented history and interest in mind control weapons from the 1940s to the 1990s. The emerging technologies of quantum physics, brain biology and electromagnetic technology combined with cold war military funding and mind control technology was developed because of an arms race to control man.

The history of the Vietnam sensors technology and targeting of populations firmly established that the military has a bureaucracy for conducting classified research that would be similar for mind control technology. It is clear that remote surveillance is very sophisticated. DARPA and IDA, both active in sensors research, are two organizations to research further and would be likely conduits for mind control technology. Here is an absolutely classic summary of the science and government atmosphere in the early 60s in which mind control would proliferate. Charles Townes, who won the Nobel prize for invention of the laser in 1964 along with two Russian researchers, discussed DARPA in his book Making Waves, 1995. “The proposed position for me was Vice President and Director of Research for the Institute for Defense Analysis. The Institute was a non-profit “think-tank with a very important role, run by five or six prominent universities on the East Coast, Columbia University being one of them. It managed what was known as the Weapons Systems Evaluation Group. We had to pick the right people who would be responsible for analyzing how and whether a weapon worked and its effectiveness. We also advised a new organization, the Advanced Research Projects Agency, whose aim was to consider what could be done in space, and to help initiate new ideas and technologies of importance to national security. We also advised the State Department on arms control problems. …I met with Allen Dulles, then head of the CIA… It was a lengthy presentation of all the highly classified evidence we had. Finally he{Dullles} asked me, “What do you think?” (Townes, Pg. 199).

Tennenbaum felt that SDI, the Strategic Defense Initiative was a cover for electromagnetic weapons as the same technology is involved. He stated that in 1983, the beginning of SDI, Russian biophysics research went underground. This is when the strategic expert, Dr. Possony published his article on direct communication with the brain. So much more research is needed.

It is difficult to describe scientific technology while it is classified and has not officially been used. Several independent sources support claims of the existence of government mind control and many scientists worldwide have stated that mind control technology is possible. The bureaucracy is in place and the victims are alleging serious human rights abuse. This is a serious issue worthy of further investigation.

This is more than enough evidence to establish the need for an investigation. The burden of proof of obtaining the classified documents and/or tying the electromagnetic signals used on victims to the government or corporations involved, is too high and victims are suffering and dying. It is cruel to make alleged victims of mind control experimentation and use, meet this burden of proof in order to get help. The government has been and is developing a weapon used against the brain and mind. This fact alone deserves special attention. The claims made by victims may sound crazy, but not in light of the facts. Knowing past government motive and behavior, victims deserve a compensating government mechanism for an investigation into alleged abuses. Please share your thoughts, ideas, suggestions and conclusions with CAHRA.

Wireless optogenetic control of the brain

Wireless optogenetic control of the brain

brain neurons

Optogenetics, a recently developed technique that uses light to map and control brain activity, requires the genetic modification of an animal’s brain cells and the insertion of optical fibers and electrical wire into its brain. The bulky wires and fibers emerge from the skull, hampering the animal’s movement and making it difficult to perform certain experiments that could lead to breakthroughs for Parkinson’s disease, addiction, depression, and spinal cord injuries.

But now, a new ultrathin, flexible device laden with light-emitting diodes and sensors, both the size of individual brain cells, promises to make optogenetics completely wireless. The 20-micrometer-thick device can be safely injected deep into the brain and controlled and powered using radio-frequency signals. Its developers say the technology could also be used in other parts of the body, with broad implications for medical diagnosis and therapy.

In optogenetics, scientists genetically modify neurons to make them sensitive to particular wavelengths of light. Shining light on the altered neurons turns them on or off, allowing scientists to control specific brain circuits and change animal behavior.

Science – Injectable, Cellular-Scale Optoelectronics with Applications for Wireless Optogenetics


The implant is a stack of four different optoelectronics devices that the researchers create separately on flexible polymer substrates and then glue on top of one another. The topmost layer is a platinum microelectrode for stimulating and recording from neurons. Below that is a silicon photodetector, followed by a group of four microscale LEDs that are each just 50 by 50 micrometers. Last comes a platinum-based temperature sensor. The filament carrying the stack is glued onto a microneedle with a silk-based glue that dissolves once the device has been injected into the targeted spot, allowing the researchers to retract the microneedle.

The technique for making the membranous devices is not new. Developed a few years ago in Rogers’s lab, it involves growing stacks of thin semiconductor films, peeling them off one at a time with a rubber stamp, and transferring them to plastic substrates.

Scientists could use the multifunctional system to stimulate and sense the brain in a variety of ways, Bruchas explains. The microelectrode can measure the electrical signals produced by neurons, and it can also be used to stimulate them. The photodiodes ensure that the LEDs are working, but they can also be used to detect light signals generated by neurons that have been genetically modified to make certain fluorescent proteins.

brain control

The micro-LEDs, which have dimensions comparable to individual neurons, could trigger individual neurons, unlike the fiber-optic implants typically used in optogenetics, which are four times as wide. The researchers could also combine different-colored LEDs on the same device and use them to simultaneously control neurons that have been engineered to react to different colors. Such multiplexing would allow neuroscientists to analyze brain circuits more precisely, Bruchas says. Finally, the temperature sensor monitors the heat generated by the LEDs to prevent the tissue from overheating.

When the researchers placed the device—which connects to an RF power module mounted on the animal’s head—inside the brains of living mice, it caused no inflammation or infection. To test the system’s ability to alter animal behavior, the researchers embedded it near a particular group of neurons that they had genetically altered to release dopamine when cued with light. The neurochemical dopamine is involved in the body’s “rewards” system, such as with food or sex, and it plays a part in several addictive drugs.

ABSTRACT – Successful integration of advanced semiconductor devices with biological systems will accelerate basic scientific discoveries and their translation into clinical technologies. In neuroscience generally, and in optogenetics in particular, the ability to insert light sources, detectors, sensors, and other components into precise locations of the deep brain yields versatile and important capabilities. Here, we introduce an injectable class of cellular-scale optoelectronics that offers such features, with examples of unmatched operational modes in optogenetics, including completely wireless and programmed complex behavioral control over freely moving animals. The ability of these ultrathin, mechanically compliant, biocompatible devices to afford minimally invasive operation in the soft tissues of the mammalian brain foreshadow applications in other organ systems, with potential for broad utility in biomedical science and engineering.

Moore: http://spectrum.ieee.org/biomedical/devices/injectable-optoelectronics-for-brain-control/

NSA Mind Control and Psyops

NSA Mind Control and Psyops 

by Will Filer


Just click on post:

    1. Intelligence
   2. Counterintelligence
   3. Behavior Modification and Accelerated Resocialization
    1. Age Regression     2. Hypnoamnesia    3. NSA      4. ODO    5. Posthypnotic  Command      6. Posthypnotic  Suggestion    7. Posthypnotic Suggestibility  Index    8. REM DEP      9. Script    10. Somnambulatory  State
    11.   Subliminal Implant
    12. Transceivers (NSA)
    2. Thought Labels (Response  Labels)
    3. Post-Hypnotic Delivery  Method
    4.   Using the Post-Hypnotic Delivery Method with Thought Labels

   NSA Self-Initiated Execution  (Suicide)
         1.   Bamford’s “The Puzzle Palace”
         2. NSA Initiated   Execution to Cover-up in the News
         3. NSA Initiated Execution to Cover-up in  Music  Curt Cobain
         4. NSA Initiated Executions in Overseas   Defense Project
         5. Musical references of NSA  Technology
         6. NSA Counterintelligence  Experiments  David Koresh   Russell Eugene  Weston
   1.   ABSTRACT, Behavioral Modification:
        1. Triggering Techniques:
        2. Real-Time Subconscious Implant Delivery:
        3. Prescheduled   Subconscious Implant Delivery:
          4. Event-Triggered (conditional) Implant Delivery:
          5. Stage 1 (Prescreen Evaluation):
         6. Stage 2 (Standard  Process)
             2.  Coincidence
             3. REM Sleep  Deprivation:
4. Shame Factor   Enhancement:
             5. Religious Relevance and Convictions:
               6. Paranoia:
7. Stage 3   (Extreme Process):
    2.   Increasing Dependence on Drugs and Alcohol:
   3. Poor Nutrition:
    4. Apathy:
    5. Depression:
   6. Insecurity:
   7. Journals and   Diaries:
   8. Degrading Spelling and Grammatical Performance: 
   9. Slowed Speech:
10. Confusion:
   11. Poor Concentration:
   12. Loose Association and Personality Disorders:
   13. Anger:
   14. Delusions:
   15. Audio Hallucinations:
   16. Voices in the Subject’s Mind:
   17. Tinnitus (Ear Ringing):
   18. Complete Quiet Silence:
    19. Quiet Wind:
    20. Visual Hallucinations:
   21. Tactile, Olfactory hallucinations and Muscle   Spasms:

NSA mind control and psyops
The following was sent to me by Will Filer . It offers a new explanation for government mind control. Will has stated to me that he is a former consultant to the U.S. National Security Agency and asked me to post this information immediately. He also believes he is in immediate danger because of this information.  This was possible Date: 20 Aug 1999 08:50:21 GMT

Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.

1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA’s Behavioral Modification Procedure Outline documented for the non-technical person.


1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. “Computer Simulated Subconscious Speech Language”.

3. APPLICATIONS: 1. Intelligence: 1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen’s opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.

2. Counterintelligence: 1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).

brain nsa

3. Behavior Modification and Accelerated Resocialization: 1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.
2. The NSA uses this technology to resocialize (brainwash) the US civilian voting population into “Giving their lives to Christ” (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a “Personal Relationship with Jesus Christ” (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.


1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.

2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic suggestion.

nsa hq
3. NSA: United States National Security Agency, Fort Mead, Maryland.

4. ODO: On-Duty Officer, or officer-on-duty.

5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term “Command” is more commonly used when the hypnosis is forcibly given to the subject and when the subject’s will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the “Suggestion” any longer thereby making it a “Command”.

6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.

7. Posthypnotic Suggestibility Index: An index or rating of a subject’s susceptibility and sensitivity to hypnosis.

8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.

operator nsa
9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;
(1) an identifier (subject’s name, description, or other identifying factor), (2) trigger activation condition or conditions (when, what or how the suggestion will trigger), (3) the content (what the trigger will precipitate in the perception of the subject), (4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to “strengthen” or reinforce the central posthypnotic command.

10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.

11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject’s subconscious mind.

12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject’s site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.

1. In addition to the ability to see and hear what is going on inside people’s homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.

2. Thought Labels (Response Labels): 1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or “read minds” so to speak.
2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation “thought labels”.

3. Post-Hypnotic Delivery Method: 1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. “How can hypnosis be used?” you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words “Drink Coca Cola” were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.
2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting “sped-up” script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions.

The empty space between words is minimized and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element’s acoustic wave train thus reducing the actual number of sine waves making up a word by 50% or more. This reduces the actual length of the time it takes the phoneme to be delivered prior to accelerating (speeding-up) the delivery (like fast forward). This helps the message to be played at higher speeds and reduces the subject’s ability to recognize it as accelerated speech. The technique of using optimized digitally sampled and edited phonemes appended together to for words and then sentences structured as hypnotic suggestions can be termed “computer simulated subconscious speech language”.
4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many “subliminal tapes” on the market to program your subconscious mind. These tapes have their “messages” recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won’t hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA’s high-speed audio subliminal message.
5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA’s message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the “posthypnotic” script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:
1. Professional state-of-the-art technology recording equipment. 2. Digital acoustic wave editing equipment. 3. Advanced engineering knowledge of acoustic wave science. 4. Phonetics and linguistics expertise. 5. Hypnosis theory and scripting. 6. Ideal environmental conditions for recording. 7. NSA ignorance of the subject’s intent and ability to capture a message.
6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can “program” or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.

4. Using the Post-Hypnotic Delivery Method with Thought Labels: 1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be “Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice.” From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever:
1) cheated on your taxes, and: 2) If the IRS could catch you in an audit.
2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book “1984”. As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.
3. The NSA’s goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a “voice print” from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.

If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person’s location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.

4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950’s and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.

Originally, after noting the behavioral effects in visual subliminal effects like the highly publicized event where stating “Drink Coca Cola” on a single movie frame “delivered a higher rates of speed than normal movie viewing raised the obvious question, “Does the human hearing work as good as eyesight accepting subliminal messages?”

Preliminary theory work was transferred to Fort Mead NSA who had expertise in characterizing language in analog domains where a sampled phoneme could be edited (shortened by removing excess sine waveforms from the “acoustic wavetrain”) and electronically reconstructed back into shortened words of language. 

Some of the early experiments included “Remote Viewing at NSA where the Viewer would relax, open their mind and explain the clarity of images that were described by the NSA using this technology. These early experiments allowed the NSA to refine the specifications of the “Computer Simulated Subconscious Speech Language” and the scripting formats to maximize the ability to deliver an accurate “vision or picture” into the subject. Pictures already seen by the subject could simply be recalled using “Age regression” script variations.

1. Please refer to the book “Inside America’s Most Secret Agency, The Puzzle Palace” by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA’s history and the NSA’s first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.

7. NSA CASE HISTORY EXAMPLE SUMMARIES: NSA Self-Initiated Execution (Suicide): 1. Bamford’s “The Puzzle Palace” references one of the NSA’s first self-initiated execution (suicide) with this “Thought Control” technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.

2. NSA Initiated Execution to Cover-up in the News: 1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could “read minds” and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news “The gunman was demanding to talk with the Director of the CIA” etc. disappeared quickly (suppressed?) from later news accounts.
3. NSA Initiated Execution to Cover-up in Music: 1. Curt Cobain of the musical group “Nirvana” was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the “Friends inside his head”. Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.
4. NSA Initiated Executions in Overseas Defense Project: 1. Some years back several employees of the United Kingdom’s Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not “Staged” suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.
5. Musical references of NSA Technology: 1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA’s brainwashing technology in a song called “Wild Wild Life”. The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that “They (NSA) talk so fastà” and that the musical group had spent “All their time and money” unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.
6. NSA Counterintelligence Experiments: 1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.
2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA’s behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn’t figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.
3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject’s health degraded.
4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for “God” to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, “God spoke to them and said to commit suicide” and they did securing another one of the NSA’s great experiments in mind control and social pathology.
5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA’s technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.
7. The cases of NSA activities go on and on. With access to the FBI’s Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their “Thought Control” technology.
8. Currently, the NSA has many subjects in the field (our society) that need only a series of “triggers” (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them “Shooters on a Shelf”. A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that “someone” (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.
9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have “Friends inside their heads” also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.

8. NSA BEHAVIORAL MODIFICATION PROCEDURE: 1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency’s Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.
2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called “reborn” by the church, with the subject’s life-long goal of “a personal relationship with Jesus Christ”.

1. ABSTRACT, Behavioral Modification: 1. The NSA’s behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject’s net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject’s posthypnotic suggestibility index, the subject’s intelligence and reasoning ability, moral and superstitious beliefs, and the subject’s social status and the weakness of the subject’s primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.
2. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject’s will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.
3. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject’s neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of “Implants” in their body.

It is important for the subjects to understand that the NSA controls this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject’s experiences. Nobody has the time or inclination to follow a subject around with a microwave gun to tickle various parts of the body. We are saturated with microwaves all the time from television stations, communication satellites, etc and yet we do not have any symptoms because microwaves do not have the ability to trigger localized synaptic responses in our brains. Furthermore, when the subject is in a room surrounded by several people, and the subject is the only one experiencing the “thoughts”, tingling feelings, etc., then obviously a delivery method is being employed that affects only the subject; high-speed acoustic delivered hypnosis.
4. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow “God or Jesus to speak directly to the subject” and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA’s technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and “Gives their Life to Christ” and the NSA achieves total control of the subject.
5. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as “God and Jesus works in their life”. Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).
6. The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA’s electronic surveillance system captures and sorts the prayers by “Keywords”. The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to “God’s will”. If the subject resist’s the NSA’s instructions, additional punishments are inflicted on the subject.
7. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other “Christians” to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject’s problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).
8. A subject that has successfully completed the NSA’s behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject’s lives are relatively unproductive because their focus is on their “Life after death” and not what they accomplish while they are alive. They avoid “worldly activities”, and usually are confused and disjointed in rational thoughts and concepts. For instance, they don’t believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.

3. BEHAVIORAL MODIFICATION PROCESS: 1. Triggering Techniques: 1. The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.

2. Real-Time Subconscious Implant Delivery: 1. Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject’s response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a “voice” heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA’s activities.

3. Prescheduled Subconscious Implant Delivery: The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script’s transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can’t be associated with a commonly recurring situation like event-triggered scripts precipitate.

4. Event-Triggered (conditional) Implant Delivery: 1. Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.
2. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to “script” and use them.
3. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want’s to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject’s behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject’s mind.

Example: This script will always cause a girl or boy not to sleep with the opposite sex: “You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy or girl) friend’s house and you will feel a deep peace when you leave their house to go back home”. These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time.
4. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject’s decision uninfluenced by anyone else that the subject should avoid the person, place or thing.
5. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject’s decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.

5. Stage 1 (Prescreen Evaluation):
1. The subject’s Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject’s speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion “You will not be able to remember the name of “____” no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject’s ability to overcome it is evaluated.
2. A full study of the subject’s religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.
3. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are “Open-ended Questions” (similar to multiple choice with response labels pre-assigned to each choice) or “Reject if Disagreeable” (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.
4. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject’s overall social status, abilities, attitudes, and communication skills with primary support groups and friends.
5. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.
6. The NSA technology affords powerful control over the subject, the subject’s environment, and the subject’s ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject’s physical and mental condition is depleted. The subject’s ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject’s testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.
6. Stage 2 (Standard Process): 1. This stage is where most subjects are behaviorally modified to serve and follow “God” (AKA NSA management of the subject’s civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject’s relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.

2. Coincidence: 1. Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject’s life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that “God” or some other supernatural being is taken interest in their life.
2. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject’s church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject’s mind into concern and contemplation about the sermon’s topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God’s mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.
3. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject’s relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.

3. REM Sleep Deprivation: 1. The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject’s ability to heal after physical damage or after periods of extensive exercise. The result is that the subject’s general health degrades as does social bonds and work/school performance.
2. The NSA performs control of REM Sleep through various methods.  Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be discussed later).
3. Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.
4. Dark rings’ surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem.  When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject “will feel energetic and rested”, the subject will not recognize the REM Deprivation.  Additional posthypnotic commands can be implanted that will make it difficult for the subject to “see or perceive” the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.

4. Shame Factor Enhancement:
1. Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject’s life.

5. Religious Relevance and Convictions: 1. The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the “Word of God”. When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God’s presence and force. “Thou shall not disobey God”.

6. Paranoia: 1. Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject’s distrust of other people including the subject’s primary group that could provide positive support during this time of distress in the subject’s life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject’s testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.
2. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a “schizophrenia” label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.
3. The subject is led to believe that the subject’s neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement personnel.

7. Stage 3 (Extreme Process): 1. This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.

2. Increasing Dependence on Drugs and Alcohol: 1. As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject’s index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject.
3. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from “God”. It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.

3. Poor Nutrition:
1. The poor nutrition reduces the energy the subject has and serves later as another justification of God’s punishment. The subject will be taught later that “the body is the temple” and that to abuse it is to violate God’s will.

4. Apathy: 1. After the subject’s self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of “not persevering through faith” which is later used on the subject later to increase a feeling of guilt.

5. Depression:
1. Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.

6. Insecurity: 1. The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can’t be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject’s life.

7. Journals and Diaries: 1. Most of the subjects are directed to keep a “Journal” or diary by the NSA so that the subject can record and review feelings, events, observations, and “God’s directions” that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject’s Journals in a variety of ways.

8. Degrading Spelling and Grammatical Performance: 

1. Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress, have very poor grammar, spelling, and short attention spans.

9. Slowed Speech: 1. Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.

10. Confusion: 1. Confusion results from three primary sources; REM Deprivation,  specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject’s life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA’s objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA’s security risk.

11. Poor Concentration: 1. Difficulty concentrating impairs the subject’s productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without “God”, thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.

12. Loose Association and Personality Disorders: 1. The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.

13. Anger: 1. The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial “communication intercept” channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.

14. Delusions:
1. Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.

15. Audio Hallucinations: 1. Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc.
2. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.

16. Voices in the Subject’s Mind:
1. The voices in the subject’s mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject’s internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, “I should go to church today”. With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, “You should go to church today!”

Notice that by implanting the posthypnotic command into the subject’s subconscious mind to think the pronoun “You” instead of “I” the subject will perceive that they are being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject’s perception of threat, fear, and therefore paranoia. It can be used with other posthypnotic suggestion implants that will give the subject the perception of either a “good” or “evil” voice or spirit is directing him/her. 

This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject’s every thought. It provides a convincing proof that “God knows every thought of his children”. Subjects that don’t have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic.

17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.

18. Complete Quiet Silence:
1. Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has “The Lord’s Peace Restored”, and secondly, the subject has achieved a milestone toward being released by God (the NSA).

19. Quiet Wind: 1. The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin’s lyrics of a song that has the chorus “I can get so scared, Listen to the wind”.

20. Visual Hallucinations: 1. Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc.
2. The television show “Sightings” has had numerous reports of people seeing “Aliens” at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA’s technology secure (disinformation).

21. Tactile, Olfactory hallucinations and Muscle Spasms: 1. Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:
1. Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or “deception of Satan”).
3. Temporary sensation of pressure to the center of the right palm (symbolizing Jesus “Sitting at the right-hand of God”).
4. Temporary sensation of pressure to the ball of the right foot (symbolizing “Get on the Ball” or “hurry-up”).
5. Temporary sensation of pressure to the tip of the right foot big toe (symbolizing “Right Direction”).
6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing “Fucking-up Direction”).
7. Temporary sensation of pressure to the tip of the left foot big toe (symbolizing “Wrong Direction”).
8. Temporary sensation of pressure to the buttocks (symbolizing “Bad Attitude” or “subject is acting like an ass”).
9. Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).
10. Temporary sensation of pressure to the left ear drum (symbolizing “do not listen”).
11. Temporary sensation of pressure to the right ear drum (symbolizing “listen”).
12. An involuntary blink of the right or left eye (symbolizing: right eye = God’s agreement or left eye = Satan’s agreement).
13. Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or “Having no balls or strength”).
14. Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like “being attacked with microwaves” or being caressed by Angels.
15. Muscular spasm or perceived pressures near the jugular vein on right side of neck (symbolizing Satan having subject by Jugular or throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.
17. Perceived odor sensation of a thick, sweet smell (symbolizing Satan’s sweet victory over the subject’s soul).
9. This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA’s civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.
1. Reverse engineering of the NSA’s technology to prove it’s abuses against the American people is quite difficult. Consider the following.
2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers. 

These perceptual effects can be confusion, lack of attention to important details, oversights, bad assumptions, incorrect interpretation of the test data. These same misperceptions will also be incorporated into the research test subjects. The technology cannot be developed and optimized if the NSA has any access to the test subjects. The test scripts given to the test subject delivered from the researcher can be neutralized by the NSA delivering a canceling script immediately after the researcher’s script. The NSA’s test script can also include a hypnoamnesia script at the end to cancel any residual perception in the subject so that the test subject would report no effects and the researcher would conclude the test script had no effect.
3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world.

The research personnel and their subjects must never leave the secured area of the facility so that they cannot be subliminally interrogated by the NSA. The NSA would take this opportunity to deliver disinformation scripts to the subject or researcher. Foodstuffs and supplies would be the logical choice of NSA intrusion if all other security measures were effective against the NSA.
4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it’s surrounding grounds. The minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.
3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.
6. Any facilities existing will have to be debugged before habitation and research begins.
7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.
8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA’s intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.
10. Conclusion: America’s greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population?
11. May God help us all in protecting the American public and preserving and managing this vital technology’s vital potential to serve America’s National Security.


From Newshawk:
Mass Mind Control in the Present-Day U.S. — The big picture
There are a number of interlocking systems, technologies and techniques which are currently being deployed against the citizens of the United States of America by certain segments of our national government.
First, there are literally COUNTLESS mind-control projects and sub-projects in operation at this time which target SPECIFIC subjects/victims in a variety of ways; using one or more of a number of technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply of different EM/RF mind control technologies, repetitive conditioning, hypnotic trance induction, and so on and on and on.
Reliable reports from MANY different sources indicate that as many as TEN MILLION individuals many be ACTIVE subjects/victims of these kinds of mind control activities, and huge quantities of hard documentation on a great many of these projects DOES exist.
However, in addition to these kinds of mind control operations, there are ALSO mind control and mind manipulation activities that target MASSES of people in large geographical regions at the same time. Indeed, there is VERY strong evidence that the operators of HAARP for example, have ever since HAARP’s earliest days intended that it be used for, among many other things, GLOBAL mind control.
There is in FACT much evidence to show that HAARP is NOW being used for just such utterly evil purposes by the United States federal government.
Of course, there are many other EM/RF technologies and systems which are, or may be, applied to mass-scale mind, mood, thought and consciousness control/manipulation operations: such as the nationwide “GWEN” (Ground Wave Emergency Network) system, certain ELF and ULF transmitter systems, and so on (such as your TV set, even IF it’s turned OFF!)
Another way to manipulate and “regulate” the minds and consciousness of a mass of people at a VERY basic, fundamental level is to CONTROL the population’s PRIMARY sources of INFORMATION. This is one of the MOST powerful ways shape the collective consciousness of the public, and it is CLEAR that many mass media outlets in the United States are both willingly and un-wittingly aiding and abetting the manipulation of our minds by the government, and are assisting the FedGov in carrying out many social-engineering agendas.
The mass media’s treatment of school shooting incidents, for instance, plays DIRECTLY and TOTALLY into the schemes of those who deployed the mind-controlled killers to carry out these shootings, in a grand plan to shut down our Constitution’s 2nd Amendment, among other things.
Moreover, very carefully designed CONDITIONING programs and tactics have been brought to bear against nearly EVERY segment of society; disseminated throughout the nation and the world by mass media and entertainment industries and corporations; and imbedded in ALL forms of so-called entertainment at this point, such as movies, TV shows, video and computer games ESPECIALLY, some pop music, and so on.
This condition of constant, relentless bombardment with grotesquely violent imagery, which the general population, ESPECIALLY its younger members, is inundated with by nearly ALL forms of popular contemporary entertainment and sources of “information”, is indeed directly derived from those mind-conditioning programs and systems developed at Fort Detrick (and other similar locations). San Diego shooter Charles Williams’ father worked at the Army’s Fort Detrick facility for THIRTEEN YEARS.

Specifically, indoctrination/conditioning programs were developed at Fort Detrick in which subjects were repeatedly, continually and continuously immersed in virtual reality-type video/computer “games” of extreme and GRAPHIC brutality, for long stretches of time and over an extended time frame.
This kind of psychological assault proved very effective in rapidly obliterating subjects’ ethical and moral values and cultural norms with regard to violence, brutality, killing and so on.
These systems were perfected, applied to the brainwashing and conditioning of members of the U.S. military and also turned over to the intelligence sectors for other applications. The intelligence sector, in turn, DELIBERATELY and successfully undertook to have this same kind of HIGHLY negative, destructive and effective conditioning applied to SOCIETY AS A WHOLE, via mass conditioning of our consciousness through the entertainment and information industries, as noted.
One OTHER method of mass mind control/manipulation/conditioning which is NOW being utilized MORE and MORE — ESPECIALLY against the most vulnerable members of our society, our CHILDREN — is the highly-reprehensible/questionable and increasingly common MANDATED DRUGGING of ever-growing numbers of children through hugely intrusive, invasive, ill-advised, psychologically unpredictable and often destructive programs mandated, usually for young males, by psychiatrists and social workers. More and more of our children are being dosed on a long-term basis with any of a number of psychotropic/psychiatric drugs like Prozac, Ritalin, Luvox, and so on.
These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT psychotic reactions among a significant percentage of subjects, but ALSO clearly and provably create a stupefied, dumbed-down, zombified mental state in targeted subjects which is a PERFECT “ground state” for the carrying out of yet OTHER mind control/manipulation/conditioning activities on these very same subjects. In general, this kind of psych-drugging makes the job of further mind control programming MUCH easier. And this kind of drugging is being done to ever-increasing numbers of our children, down to toddlers as young as TWO and THREE YEARS OLD!!
Now, there is ANOTHER way in which our present-day society is being literally and effectively mind-controlled en masse.
Most all of the individually-targeted mind control programs we noted above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT PERSONALITY in the victim/subject. In fact, one or more of these deliberately-induced split personalities formed as a result of psycho-sexual abuse or other conditioning are those facets of the subject’s psyche which ARE actually “programmed”; to kill, or whatever else. It’s been shown that forcing victims/subjects to witness, experience or participate in just about any highly-traumatic and shocking events on a repeated basis will induce the kind of psychotic break(down) that is a necessary prerequisite for intensive mind control programming/conditioning.
SO: WHEN our society as a whole is FORCED to confront and WITNESS over and over and over again something as FUNDAMENTALLY shocking as having our young people perpetrating inconceivably horrific mass murders of peers and others on A REGULAR BASIS, as is NOW THE CASE in the present-day United States, then the population as a whole AND on an individual basis to some extent develops an analogous, similar psychological break, and in FACT to some extent develops split personality/multiple personality disorder conditions… READY FOR FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarily disturbing events which impact society AS A WHOLE, such as these school shootings by young people that have just occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO social controllers who set these terrible mass killings off; and the incidents themselves serve to further condition, manipulate and “mind control” the population of the United States in the year 2001.


What are Artificial Neural Networks? The implementation of Neural Networks for brain-like computations like patterns recognition, decisions making, motory control and many others is made possible by the advent of large scale computers in the late 1950’s. http://www.rgsoftware.com/


 Mind Control Info:  www.mindcontrol.se

Secret US Human Biological Experimentation http://www.apfn.org/apfn/experiment.htm

[mind control]

Psychotronic and Electromagnetic Weapons: Remote Control of the Human Nervous System

   Psychotronic and Electromagnetic Weapons: Remote Control of the Human Nervous System

In March 2012 the Russian defense minister Anatoli Serdjukov said:

“The development of weaponry based on new physics principles; direct-energy weapons, geophysical weapons, wave-energy weapons, genetic weapons, psychotronic weapons, etc., is part of the state arms procurement program for 2011-2020,”Voice of Russia

The world media reacted to this hint on the open use of psychotronic weapons by the publication of scientific experiments from the 1960‘s where electromagnetic waves were used to transmit sounds into the human brain. However, most of them avoided saying that since then extensive scientific research has been carried out in this area throughout the world. Only a Colombian newspaper, El Spectador, published an article covering the whole scale of the achievements of this (computerized English translation).

military brain

Britain’s Daily Mail, as another exception, wrote that research in electromagnetic weapons has been secretly carried out in the USA and Russia since the 1950’s and that „previous research has shown that low-frequency waves or beams can affect brain cells, alter psychological states and make it possible to transmit suggestions and commands directly into someone’s thought processes. High doses of microwaves can damage the functioning of internal organs, control behaviour or even drive victims to suicide.”

In 1975, a neuropsychologist Don R. Justesen, the director of  Laboratories of Experimental Neuropsychology at Veterans Administration Hospital in Kansas City, unwittingly leaked National Security Information. He published an article in “American Psychologist” on the influence of microwaves on living creatures’ behavior.

In the article he quoted the results of an experiment described to him by his colleague, Joseph C. Sharp, who was working on Pandora, a secret project of the American Navy.

Don R. Justesen wrote in his article:

“By radiating themselves with these ‘voice modulated’ microwaves, Sharp and Grove were readily able to hear, identify, and distinguish among the 9 words. The sounds heard were not unlike those emitted by persons with artificial larynxes”  (pg. 396).

That this system was later brought to perfection is proved by the document which appeared on the website of the U.S. Environmental Protection Agency in 1997, where its Office of Research and Development presented the Department of Defense’s project:“Communicating Via the Microwave Auditory Effect”.In the description it said:

“An innovative and revolutionary technology is described that offers a low-probability-of-intercept radiofrequency (RF) communications. The feasibility of the concept has been established using both a low intensity laboratory system and a high power RF transmitter. Numerous military applications exist in areas of search and rescue, security and special operations” (See web.iol.cz)

In January 2007 the Washington Post wrote on the same subject:

“In 2002, the Air Force Research Laboratory patented precisely such a technology: using microwaves to send words into someone’s head… Rich Garcia, a spokesman for the research laboratory’s directed energy directorate, declined to discuss that patent or current or related research in the field, citing the lab’s policy not to comment on its microwave work. In response to a Freedom of Information Act request filed for this article, the Air Force released unclassified documents surrounding that 2002 patent — records that note that the patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects, albeit with marginal intelligibility. Research appeared to continue at least through 2002. Where this work has gone since is unclear — the research laboratory, citing classification, refused to discuss it or release other materials“

We can only stress again that the world media avoid publishing the full scale of the progress in the research of the remote control of human nervous system. Dr. Robert Becker, who was twice nominated for Nobel Prize for his share in the discovery of the effects of pulsed fields at the healing of broken bones, wrote in his book “Body Electric” about the experiment from 1974 by J. F. Schapitz, released due to the Freedom of Information Act request.

brain control

J.F. Schapitz stated:

“In this investigation it will be shown that the spoken word of hypnotist may also be conveyed by modulated electromagnetic energy directly into the subconscious parts of the human brain – i. e. without employing any technical devices for receiving or transcoding the messages and without the person exposed to such influence having a chance to control the information input consciously.”

In one of the four experiments subjects were given a test of hundred questions, ranging from easy to technical ones. Later, not knowing they were being irradiated, they would be subjected to information beams suggesting the answers to the questions they had left blank, amnesia for some of their correct answers, and memory falsification for other correct answers. After 2 weeks they had to pass the test again (Dr. Robert Becker: Body Electric: Electromagnetism and the Foundation of Life, William Morrow and comp., New York, 1985,. The results of the second test were never published. It is rather evident that in those experiments the messages were sent into human brain in ultrasound frequencies which the human brain perceives, but of which the subject is unaware. Dr. Robert Becker, due to those publications and his refusal to support the building of the antennae for the communication with submarines in brain frequencies, lost financial support for his research which meant an end to his scientific career.

Transmitting human speech into the human brain by means of electromagnetic waves is apparently, for the researchers, one of the most difficult tasks. It must be much easier to control human emotions which motivate human thinking, decision making and actions. People who claim to be victims of experiments with those devices complain, aside of hearing voices, of false feelings (including orgasms) as well of aches of internal organs which the physicians are unable to diagnose.

In November 2000 the Committee on Security of the Russian State Duma stated that capabilities enabling remote control of the human nervous system or the remote infliction of health impairment are available to many modern governments .See web.iol.cz

It is rather evident that those technologies are used, in conflict with the Nuremberg code, for experiments on unwitting human subjects. In 2001 the newspaper of the U.S. army, Defense News, wrote that Israel was experimenting with those weapons on Palestinians. Ibid 

As well ousted Honduran president Manuel Zelaya, while under siege in Brazilian embassy in Honduras, complained that he had been subjected to an “electron bombardment with microwaves” which produces “headache and organic destabilization” The Guardian, October 2008

When asked by Amy Goodman from Democracy Now: „

As president, do you know about this in the Honduran arsenal?” He replied: „Yes, of course“

The use of those weapons is time and again reemerging in times of political crisis. According to Russian daily newspapers, during the failed putsch against Mikhail Gorbachov in 1991, general Kobets warned the defenders of the Russian White House that mind control technology could be used against them (Komsomolskaya Pravda, September 7,1991, O. Volkov, „Sluchi o tom chto nam davili na psychiku nepotverzdalis. Poka“).


After the putsch, the vice president of the League of Independent Scientists of the USSR, Victor Sedlecki, published a declaration in the Russian daily Komsomolskaya Pravda where he stated:

As an expert and a legal entity I declare that mass production … of psychotronic biogenerators was launched in Kiev (this is indeed a very serious issue). I cannot assert for sure that that were exactly Kiev generators that were used during the putsch… However, the fact that they were used is obvious to me. What are psychotronic generators? It is an electronic equipment producing the effect of guided control in human organism. It especially affects the left and right hemisphere of the cortex. This is also the technology of the U.S. Project Zombie 5“. He further stated that due to the inexperience of the personnel who operated them the attempt to use the generators failed

(Komsomolskaya Pravda, August 27,1991, “Avtory programy Zombi obnaruzheny v Kieve”,

See also http://web.iol.cz/mhzzrz/img/Authors_of_project_zombie.gif).

In the USA, at present several hundred people complaining of the remote manipulation of their nervous system are preparing a class action lawsuit against the FBI, Department of Defense and other agencies, requesting them to release files pertaining to their persons, detect the harmful radiations aimed at their bodies and sources of those radiations. As well perhaps over 2000 people are complaining in Russia, over 200 in Europe, over 300 in Japan and tens of people in China and India. Russian politician, Vladimir Lopatin, who was working on Committee on Security of the Russian State Duma and introduced there a bill banning the use of those technologies, admitted in his book „Psychotronic Weapon and Security of Russia“ (publishing house Sinteg, Moscow, 1999) that in Russia experiments on unwitting citizens are carried out, when he wrote: „

Compensation of damages and losses connected with social rehabilitation of persons suffering from destructive informational influence must be realized in legal trial“ (excerpts from the book in English

(http://mojmir.webuda.com/Psychotronic_Weapon_and_the_Security_of_Russia, pg. 113).

It should be understood that most of those people pass through mental hospitals. Vladimir Lopatin visited the USA in 1999 as a chairman of the Military Reform Subcommittee of the USSR Supreme Soviet Committee for Issues of Defense and State Security and met with Richard Cheney. At that time he was described as the “leader of a new breed of Soviet dissidents”. Then he disappeared from top ranks of Russian politicians.

brain control

Why has this research remained classified until present time? There are two explanations for this: First there is a secret arms race in progress in the world where the superpowers compete to gain decisive supremacy in this area and in this way master the control of the whole world. Second the governments keep those technologies in store for the case that they would not be able to control, by democratic means, the crisis that may arise as a result of their poor decisions. In both cases the era of democracy and human freedom in history will come to an end. According to the declaration of the former Russian Defense minister Serdjukov, there are maximally eight years left within which those weapons will officially become a part of the Russian military arsenal. For democracy this would mean a beginning of the end.

Anyway, in the past Russians were not resolved to put those means to work. When the construction of the American system HAARP was launched, with the system supposedly being able to target large regions of the planet by vibrating the ionosphere in brain frequencies (in this experiment the brain frequencies were not used, but the HAARP system can transmit in brain frequencies as well), Russia declared its willingness to ban mind control technologies. The Russian State Duma and consequently , the Interparliamentary Assembly of the Union of Independent States addressed the United Nations, OBSE and the European Council with a proposal for an international convention banning the development and use of informational weapons. According to the Russian newspaper Segodnya in March 1998, the matter was discussed with U.N. secretary general Kofi Anan, and included on the agenda of the General Assembly of the U.N. web.iol,cz, op cit

It is most likely the USA refused to negotiate this convention and in consequence the ban of informational weapons was not discussed by the United Nations General Assembly. Even in the U.S. congress appeared a bill proposing the ban of mind control technologies http://thomas.loc.gov/cgi-bin/query/r?c107:chemtrails.

But this was only for a very short period of time. The bill was then changed and in the new bill the ban of those technologies was left out of the Space Preservation Bill. Neither the U.S. congress nor the U.S. president made ever an effort to ban mind control weapons. The European Parliament reacted as well to the launch of the HAARP system construction, when it called in 1999 for the ban of manipulation of human beings.

The resolution was passed after the testimony of the American author of the book “Angels Don’t Play this HAARP”, Nick Begich, which apparently convinced the European Parliament of the possible use of this system to manipulate minds of whole populations. In the report by the European Parliament’s STOA (Science and Technological Options Assessment) panel “Crowd Control Technologies” the originally proposed text of the European Parliament’s resolution is quoted. There the European Parliament calls “for an international convention and global ban on all research and development , whether civilian or military , which seeks to apply knowledge of the chemical, electrical, sound vibration or other functioning of the human brain to the development of weapons which might enable any form of manipulation of human beings, including a ban on any actual or possible deployment (stressed by the author of the article) of such systems“. (40, pg CII, ref. 369). But apparently at the same time the European countries resigned on this intention when accepting the NATO politics of non-lethal weapons.

reading brain

The same STOA report claims that the USA is a major promoter of the use of those arms and that:

“In October 1999 NATO announced a new policy on non-lethal weapons and their place in allied arsenals” (pg. xlv) and it goes on:

“In 1996 non-lethal tools identified by the U.S. Army included… directed energy systems” and “radio frequency weapons”European Parliament

(at the bottom of the page, second reference pg. Xlvi).

Directed energy system is further defined by the STOA document: „

Directed energy weapon system designed to match radio frequency source to interfere with human brain activity at synapse level“  (at the bottom of the page, first reference, Appendix 6-67). Since 1999 those weapons have been upgraded for another 13 years. European Parliament

In 1976 the future National Security advisor to president Carter, Zbygniew Brzezinski, wrote a book “Between Two Ages, America’s Role in the Technetronic Era” (Penguin Books, 1976, Massachusets). In the book he predicted “more controlled and directed society” based on the development of technology, where an elite group will play a leading role, which will take advantage of persisting social crises to use “the latest modern techniques for influencing public behavior and keeping society under close surveillance and control”.

The use of mind control technologies was predicted as well in the publication of Strategic Studies Institute of the U.S. Army War College, published in 1994


The scenario for the year 2000 expected the growth of terrorism, drug trafficking and criminality and drew a conclusion:

“The president was thus amenable to the use of the sort of psychotechnology which formed the core of the RMA (revolution in military affairs)… it was necessary to rethink our ethical prohibitions on manipulating the minds of enemies (and potential enemies) both international and domestic… Through persistent efforts and very sophisticated domestic ”consciousness raising”, old-fashioned notions of personal privacy and national sovereignty changed. As technology changed the way force was applied, things such as personal courage, face-to-face leadership, and the ‘warfighter’ mentality became irrelevant.”…

“Potential or possible supporters of the insurgency around the world were identified using the comprehensive Interagency Integrated Database. These were categorized as ‘potential’ or ‘active’, with sophisticated personality simulations used to develop, tailor and focus psychological campaigns for each“. So the Institute of Strategic Studies supposed that in the year 2000 those technologies would be that advanced that it will be possible to deprive human being of his freedom and adjust his personality to the needs of ruling elite. Most probably those technologies were at this level already in 1994.

mind implant

The attempts to make the general public acquainted with the existence of those weapons are, with respect to the fact that it is evident that democratic public would require immediate ban of those technologies, systematically suppressed. Vladimir Lopatin wrote:

„The arms race is speeding up as a consequence of classification. Secrecy – this is in the first place the way to secure cruel control over the people… the way how to curtail their creativity, turn them into biorobots…”, and that psychotronic war “is already taking place without declaration of war, secretly… Only if the work on mind control problem is no more covered by the screen of secrecy, extraordinariness, mysteriousness, if complex, open scientific research with international participation, is carried out, the psychotronic war including the use of psychotronic weapon can be prevented”.

The article “Informacni zbrane ohrozuji demokracii a lidstvo” was deleted from the website of the Czech internet newspaper Britske Listy (www.blisty.cz). The sharing of the original web address of the English version of the same article – Means of Information War Threaten Democracy and Mankind – is blocked on Facebook and a similar article was deleted from the webpage of the Australian magazine “New Dawn”.

There exist no legislations punishing the use of those technologies by governments. Only in Russia and some of the states in the USA there are legislations punishing the ownership or trading with those technologies by non governmental entities. For example in the state of Michigan the sentence for this crime is equal to the sentence for ownership or trading with weapons of mass destruction.

The readers who will be reached by this article and prefer democratic political system would help its preservation if they forwarded the article to their friends.

Original: http://www.globalresearch.ca/psychotronic-and-electromagnetic-weapons-remote-control-of-the-human-nervous-system/5319111

Brain Invaders (Jesse Ventura)

Jesse Ventura Brain Invaders

Ventura interviews a group of so-called “targeted individuals” (or “TIs”) – people who claim that they are being manipulated and tortured by mind-control signals after they have spoken out against the government.

He further looks into the technology that could be behind these attacks, such as microwave transmitting GWEN towers, and meets with insiders who claim to have worked on and developed the technology for the government that began with Project MKUltra.

military brain