Disturbing Weapons Used on The Masses
The Defense Advanced Research Projects Agency (DARPA), the research arm of the military, is continuing to develop implantable brain chips, according to documents newly posted as part of the agency’s increased “transparency” policy.
The agency is seeking to develop a portable, wireless device that “must incorporate implantable probes” to record and stimulate brain activity – in effect, a memory triggering ‘black box’ device.
The process would entail placing wires inside the brain, and under the scalp, with electrical impulses fired up through a transmitter placed under the skin of the chest area.
Bloomberg first picked up the story last week, and since then several tech blogs have jumped on board, describing the technological push as part of a project to help injured soldiers, and part an initiative set up by the Obama administration to find treatments for brain disorders, such as Alzheimer’s.
In reality, this project has been ongoing for years, decades in fact. And given that the Pentagon war machine is spear-heading it, with $70m of funding, one must seriously question why the DoD suddenly gives a damn about war wounded vets, never mind everyday Americans with brain disorders.
The documents state that rather than aid general memory loss, such a device would enable the ability to recover “task-based motor skills” like driving cars, operating machinery, tying shoe laces or even flying planes. It would also help recover memory loss surrounding traumatic events – according to the documents.
Memory loss surrounding trauma occurs for a reason, so the individual can, at some point, slowly work back toward living a normal life. One has to wonder, from this description, whether DARPA’s brain implant, would merely facilitate “patching up”, soldiers, and sending them back out to duty, as if they were defective robots.
Indeed, that is the kind of transhumanism project that DARPA revels in. Just last year it was revealed that a DARPA team has constructed a machine that functions like a human brain and would enable robots to think independently and act autonomously.
There have also long been reports of DARPA seeking to develop technology that enables military masters to literally control the brains of soldiers and make them want to fight. A 2008 report for the US military detailed this initiative, along with possible weaponry including “Pharmacological landmines” that release chemicals to incapacitate enemy soldiers and torture techniques that involve delivering electronic pulses into the brains of terror suspects.
The report, titled “Emerging Cognitive Neuroscience and Related Technologies”, detailed byWired and the London Guardian, was commissioned by the Defense Intelligence Agency, the intelligence wing of the Department of Defense. It contains scientific research into the workings of the human mind and suggestions for the development of new war fighting technologies based upon the findings.
In a section focusing on mind control, the report states
If we can alter the brain, why not control it? […] One potential use involves making soldiers want to fight. Conversely, how can we disrupt the enemy’s motivation to fight? […] How can we make people trust us more? What if we could help the brain to remove fear or pain? Is there a way to make the enemy obey our commands?
It concludes that “drugs can be utilized to achieve abnormal, diseased, or disordered psychology” and also suggests that scanners able to read the intentions or memories of soldiers could be developed.
The report clearly does not rule out the use of such mind scanning technology on civilians as it suggests that “In situations where it is important to win the hearts and minds of the local populace, it would be useful to know if they understand the information being given them.”
It also suggests that the technology will one day have applications in counter-terrorism and crime-fighting and “might be good enough to help identify people at a checkpoint or counter who are afraid or anxious.”
The notion of “recording” brain activity is also something that DARPA has long sought to master. The concept may seem completely outlandish, yet it has been the central focus of DARPA activities for some time with projects such as LifeLog, which seeks to gain a multimedia, digital record of everywhere a person goes and everything they see, hear, read, say and touch.
Wired Magazine has reported:
On the surface, the project seems like the latest in a long line of DARPA’s “blue sky” research efforts, most of which never make it out of the lab. But DARPA is currently asking businesses and universities for research proposals to begin moving LifeLog forward.
“What national security experts and civil libertarians want to know is, why would the Defense Department want to do such a thing?” the article asks. The answer lies in the stated goal of the US military – “Total Spectrum Dominance”.
Furthermore, assertions that the neuro technology would not be in any way dominant over a person’s capacity to think, does not tally with DARPA’s Brain Machine Interfaces enterprise, a $24 million project reported on in the August 5, 2003 Boston Globe.
The project is developing technology that “promises to directly read thoughts from a living brain – and even instill thoughts as well… It does not take much imagination to see in this the makings of a matrix-like cyberpunk dystopia: chips that impose false memories, machines that scan for wayward thoughts, cognitively augmented government security forces that impose a ruthless order on a recalcitrant population.” The Globe reported.
It is also well documented that the military and the federal government have been dabbling in mind control and manipulation experimentation for decades.
Brain implants are a very scary proposition, however, and selling such a thing to veterans, and especially to the wider American populace, may be a harder task than selling them a pill to pop. Which is why some, including one former DARPA director and now a Google executive, have also been developing devices such as edible chips and e-tattoos.
Transhumanism is trendy!
Steve Watson is the London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from Nottingham Trent University.
Is it coming to a home near you?
“Mind control” is a topic commonly perceived as “conspiracy theory” or “X-Files” fare. That is, it is seen as possibly not “real,” and certainly not something about which one should be “overly” concerned.
This attitude at least partially arises from the widespread belief or assumption that the human brain is so complicated—(“the most complex entity in the universe” is a common formulation)—that it has not, and perhaps cannot, be comprehended in any depth.
One writer, for example, describes the brain as of “perhaps infinite” complexity, while another, David Brooks of the New York Times, writes that it is “probably impossible” that “a map of brain activity” could reveal mental states such as emotions and desires.
Similarly, Andrew Sullivan, blogger and former editor of The New Republic, opines that neuroscience is still in its “infancy,” and that we have only begun “scratching the surface” of the human brain, and links to a New Yorker piece in support of that position.
And the cover story for the October 2004 issue of Discovery Magazine entitled “The Myth Of Mind Control” advises the reader that while mind control is a “familiar science-fiction” staple, there is little reason for real concern, because actually deciphering the “neural code” would be akin to figuring out other “great scientific mysteries” such as the “origin of the universe and of life on Earth,” and is therefore hardly likely.
According to the article, as the brain is “the most significant mystery in science” and quite possibly “the hardest to solve,” mind control remains at worst a distant concern.
The underlying idea seems to be that sophisticated mind control is unlikely without understanding the brain; and we do not understand the brain.
Understanding the “Neural Code”
Of course, one might question the notion that a full understanding of the “neural code” is a prerequisite for mind control since it is not always necessary to know how something works for it to be effective. Nonetheless, the assumption that the brain is so complex that little progress has been made in “solving” it is itself incorrect.
As neuroscientist Michael Persinger has said, the “great mythology” of the brain is that it is “beyond our understanding; no it’s not.” In fact, according to inventor and “futurist” Ray Kurzweil, “very detailed mathematical models of several dozen regions of the human brain and how they work….” had already been developed over a decade ago.
Kurzweil also said at that time that science is “further along in understanding the principles of operation of the human brain than most people realize….” While the brain may be complicated, “it’s not that complicated (emphasis added).”
Similarly, an Air Force report from 1995, in a section entitled “Biological Process Control,” predicts that before 2050 “… [w]e will have achieved a clear understanding of how the human brain works, how it really controls the various functions of the body, and how it can be manipulated…:”
One can envision the development of electromagnetic energy sources … that can couple with the human body in a fashion that will allow one to prevent voluntary muscular movements, control emotions (and thus actions), produce sleep, transmit suggestions, interfere with … memory, produce an experience set, and delete an experience set. 
As disturbing as such “predictions” may be, is it possible that technologies to prevent (or perhaps even impel) muscular movement, control emotions, transmit suggestions, delete memories, create false memories, and so on, have already been developed?
Certainly, even a cursory review of the “open literature” reveals that various sophisticated mind control technologies already exist. Indeed, it is rather shocking to realize how advanced mind control technology was, even several decades ago.
“Altering brain waves”
For example, there is the 1974 invention of Robert G. Malech for which a patent was granted in 1976 and assigned to defense contractor Dorne & Margolin, Inc.—for a method of “remotely monitoring and altering brain waves.”
Moreover, experiments conducted over thirty years ago at the Stanford Research Institute (SRI) showed that basic mind reading from EEG readouts was possible, revealing the existence of “a non-symbolic language” of “brain-wave patterns” which could be deciphered and translated.
Indeed, “…[b]y the late 1960s … ‘remote control’ of the human brain—accomplished without the implantation of electrodes—was well on its way to being realized.” A means of stimulating a brain “by creating an electrical field completely outside the head” was developed, and it was discovered that electric pulses could stimulate the brain using far less energy than previously “thought … effectual in the old implanting technique.”
Not surprisingly, with such developments arose legitimate fears of a future world where “human robots” would perform the bidding of the “military.”
And one source quotes a 1970s Pentagon agency report as saying that it will likely be possible in “several years” to induce sounds and words directly into the brain (bypassing the ears), as well as to use “combinations of frequencies and other signal characteristics to produce other neurological effects….,”
The report notes that the Soviets had observed “various changes in body chemistry” and “functioning” of the brain from the exposure of the brain to various frequencies. Also mentioned are studies at MIT showing that “magnetic brain waves can be picked up … and amplified as if the brain were a radio transmitter,” no implants or electrodes required.
Finally, an article from 1981 describes how “microwave generators” placed in appropriate locations and transmitting at low energy would create “interference patterns” out of the interaction with brainwaves (brain electricity).
These interference patterns “could then be built up by computer into a three-dimensional moving picture of mental processes”—in other words, a remote “thought scanner” (and tracking device) could be developed.
Subjected to outside influences
In light of these past developments, it is perhaps rather surprising to read modern articles describing supposedly recent innovations in “mind reading” and mind control technology – in which it is sometimes claimed, for example, that scanners, electrodes and proximity to the subject is required to read and “control” minds.
Such claims reflect an apparent failure of the science of “mind control” to progress as one might have expected considering the presumed interest, as well as the spectacular rate of advancement of science and technology in general in recent decades.
Of course, it would not be all that surprising if mind control technology has advanced considerably, but that research has been carried out in secret for reasons of “national security.”
CIA affiliated scientists have certainly conducted much research which they have been prohibited from sharing with their peers, and inventions that implicate “national security” are routinely suppressed under Pentagon secrecy orders. Also, it might seem desirable to hide research programs which sometimes “require” relaxation of ethical standards, such as that of informed consent.
That said, even ignoring the likely existence of a “secret science” of mind control, recent public advancements are quite troubling in their own right.
“New connections” are being made all the time.
1) In 2004, 25,000 rat neurons on a glass dish learned to fly an F-22 jet fighter simulator. After scientists placed the neurons on the dish, the neurons quickly began “to reconnect themselves, forming a living neural network—a brain.”
The lead scientist added that “one day,” though of course a “long way off,” disembodied brains might actually be used to fly drones, though the current experiment was merely to enhance knowledge of how the brain works, and possibly provide “clues to brain dysfunction.”
2) In August 2013, researchers revealed that “miniature” human brains had been grown in the laboratory. As is typical, any negative implications or reasons for worry were minimized, while possible “therapeutic” uses were highlighted. Thus, the breakthrough was hailed as a great opportunity to understand “developmental defects.” Though the writer does mention “the spectre of what the future might hold,” the reader is reassured that the research is “primitive territory”—though one researcher did comment on the “undesirability” of growing larger laboratory brains.
3) On July 1, 2013, a magazine reported a claim by neuroscientist Sergio Canavero that it was now feasible to transplant the head of one human to the body of another and reattach the spinal cord.
4) Scientists have reconstructed random images viewed by subjects, from fMRI brain scans, in research that “hints” that “one day” scientists might be able to “access dreams, memories and imagery….”
5) The brains of two rats have been linked, such that one, located in North Carolina, responded “telepathically” to the thoughts of the other, located in Brazil. The second rat’s brain processed signals from the first rat’s brain, delivered over the internet, as if they were its own. The scientist speculated about the “future possibility” of a “biological computer, in which numerous brains are connected….”
6) A brain-to-brain interface has been created, allowing humans to move a rat’s tail just by thinking about it. Readers are told that while it is not yet possible to “communicate brain to brain with our fellow humans … we may be on our way to … controlling” other species. But, since it is “still very early days” the writer “hope(s)” that any ethical concerns can be “iron(ed) out.” Of note, the study used focused ultrasound to deliver impulses to the rat’s brain.
7) Continuing the ultrasound “theme”: Focused pulses of low intensity low frequency ultrasound, transmitted noninvasively through the skull to the human brain, have been shown capable of producing, not only pain, but also sound, as well as evoking “sensory stimuli.” Accordingly, a lab with a “close working relationship” with DARPA, the Department of Defense, and U.S. Intelligence communities, has been looking into using pulsed ultrasound to encode “sensory data onto the cortex”; in other words, producing hallucinations through the remote and direct stimulation of brain circuits. Possibilities are the ability to “remotely control brain activity” and the “creation of artificial memories.” Even Sony has gotten in on the act, patenting a device for using ultrasound to produce hallucinations—again described as “transmitting sensory data directly into the human brain.” Most troublingly, one source recently alleged that the NSA is using this ultrasound technology to target individuals through their smartphones.
8) A researcher was able to make a fellow researcher in a different office move his finger just by thinking about it, in the “first” demonstration of a human brain-to-brain interface.
9) A low cost means of tracking people, even through walls, has been developed. While in the past individuals could be tracked anywhere by the “military” using radar technology, this technology might enable entities with fewer resources to track people as well.
10) Scientists have remote controlled a worm by implanting magnetic nanoparticles into it, and then exposing the animal to a “radiofrequency magnetic field” which stimulated its neurons. The scientists suggest that their research could lead to “innovative cancer treatments” and “improved diabetes therapies,” as well as
11) Americans can now be spied on in their homes through their internet-connected appliances, according to (former) CIA Director David Petraeus.
Petraeus made his statements at about the same time a huge microchip company, ARM, unveiled new processors which will connect home appliances such as refrigerators, washers and driers to the internet.
12) LED lights have been ostensibly pushed for their efficiency over traditional bulbs. However, LED lights are also semiconductors capable of inducing “biological and behavior effects.”
While the aforementioned public developments are quite concerning, the reality is they may not actually represent the true state of the art in “mind control” technology.
It would not be that surprising, after all, for a domain with national security implications to at some point in its development branch off onto separate “tracks,” one public and the other “hidden.”
If such a bifurcation were to occur, advancements made in secret would not necessarily be incorporated into the public sphere. Eventually perhaps, innovations and breakthroughs would result in the development of an essentially new, covert science.
An example of a domain in which this bifurcation process seems to have occurred is aviation. In the public sphere, the most advanced aircraft might well be the F-22 fighter jet, or perhaps the F-35. However, if insider testimony is credited, these aircraft seem almost primitive in comparison with flying machines developed in secret.
Perhaps the most compelling statements in this regard come from Ben Rich, former Director of Lockheed-Martin’s Advanced Development Projects, or “Skunk Works,” a Lockheed division notable for its super high-tech, top secret projects, among them the U2 spy plane and the SR-71 Blackbird.
As Joseph P. Farrell’s reports in his book Saucers, Swastikas, and Psyops, Rich made a number of peculiar and provocative comments at the end of his career, and following his retirement on December 31, 1990 (prior to his death five years later), comments strongly hinting at “the development of … an off-the-books physics and technology….”
For example, on September 7, 1988, in a presentation to the American Institute of Aeronautics and Astronautics in Atlanta, Georgia, Rich lamented that he was prohibited from discussing Skunkwork’s current projects, but he did say that they “call for technologies once only dreamed of by science fiction writers.”
In ensuing years, Rich elaborated slightly. For instance, while speaking to the UCLA School of Engineering Alumni Association in 1993, Rich said that “an error in the equations” had been discovered and corrected, making it possible “to travel to the stars.” He added, however, that “these technologies are so locked up in black programs, that it would take an act of God to ever get them out to benefit humanity.”
Ben Rich – Who saw it it…lived it all.
Farrell goes on to relay a statement from an unnamed Lockheed retired engineer who was quoted in a magazine article in 1988 as saying that “we have things flying in the Nevada desert that would make George Lucas drool.” In the same article an Air Force officer involved in the development of the SR-71 said “[w]e are testing vehicles that defy description.
To compare them conceptually to the SR-71 would be like comparing Leonardo da Vinci’s parachute design to the space shuttle.” And a retired Colonel chimed in: “We have things that are so far beyond the comprehension of the average aviation authority as to be really alien to our way of thinking.” 
Consider then for a moment the possibility that within the classified world, in 1993, a technology, to quote Ben Rich, “to take ET back home” had already been developed. The implications are enormous, not to mention rather frightening. One wonders where the technology must be in 2014, more than twenty years later.
And if the aforementioned statements are true, and this seems plausible (why would these individuals lie, or even exaggerate, especially to Engineering Associations and Aeronautics institutes), what might this imply about the current state of the art in domains other than aviation, such as neuroscience, which has itself been the subject of intense “weaponization” efforts.
Indeed, what does such a vast discrepancy between what people believe and what is actually true suggest about the nature of our perceived reality in general?
Steven DiBasio is a writer, attorney, and sometime musician. He lives in the Midwest. And more will be on the way. He can be reached at: firstname.lastname@example.org
Editing: Jim W. Dea
Former US National Security Agency contractor Edward Snowden appeared in a televised Christmas message released to the world public by TV station Channel 4 on Wednesday. (Dec. 25)
Investigative Journalists Targeted For An Ongoing FBI COINTELPRO STING OPERATION/SMEAR CAMPAIGN — been used as an unwitting target of (MKULTRA) non consensual human experimentation for decades via the NSA’s SIGNALS INTELLIGENCE EMF Scanning Network – a covert spy program which uses brain scanners deployed via NSA signals intelligence satellites to remotely scan the brainwaves of any citizen in the world. The NSA’s SIGNIT EMF Scanning Network is an outgrowth of the Pentagon and CIA’s MIND and TAMI (MKULTRA) “mind control” programs, which use EEG Heterodyning technology to synchronize AI computers with the unique brainwave print of each citizen. This technology enables the NSA to brand us like heads of cattle. Google: AKWEI VS NSA & The Matrix Deciphered by Dr. Robert Duncan to learn more about this Orwellian attack on the people’s Constitutional rights.
NSA Mind Control and Psyops
by Will Filer
Just click on post:
2. TECHNOLOGY TITLE
3. Behavior Modification and Accelerated Resocialization
4. DEFINITIONS AND ACRONYMS
1. Age Regression 2. Hypnoamnesia 3. NSA 4. ODO 5. Posthypnotic Command 6. Posthypnotic Suggestion 7. Posthypnotic Suggestibility Index 8. REM DEP 9. Script 10. Somnambulatory State
11. Subliminal Implant
12. Transceivers (NSA)
5. TECHNOLOGY OVERVIEW
2. Thought Labels (Response Labels)
3. Post-Hypnotic Delivery Method
4. Using the Post-Hypnotic Delivery Method with Thought Labels
6. OTHER REFERENCE MATERIAL
7. NSA CASE HISTORY EXAMPLE SUMMARIES
NSA Self-Initiated Execution (Suicide)
1. Bamford’s “The Puzzle Palace”
2. NSA Initiated Execution to Cover-up in the News
3. NSA Initiated Execution to Cover-up in Music Curt Cobain
4. NSA Initiated Executions in Overseas Defense Project
5. Musical references of NSA Technology
6. NSA Counterintelligence Experiments David Koresh Russell Eugene Weston
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
1. ABSTRACT, Behavioral Modification:
3. BEHAVIORAL MODIFICATION PROCESS:
1. Triggering Techniques:
2. Real-Time Subconscious Implant Delivery:
3. Prescheduled Subconscious Implant Delivery:
4. Event-Triggered (conditional) Implant Delivery:
5. Stage 1 (Prescreen Evaluation):
6. Stage 2 (Standard Process)
3. REM Sleep Deprivation:
4. Shame Factor Enhancement:
5. Religious Relevance and Convictions:
7. Stage 3 (Extreme Process):
2. Increasing Dependence on Drugs and Alcohol:
3. Poor Nutrition:
7. Journals and Diaries:
8. Degrading Spelling and Grammatical Performance:
9. Slowed Speech:
11. Poor Concentration:
12. Loose Association and Personality Disorders:
15. Audio Hallucinations:
16. Voices in the Subject’s Mind:
17. Tinnitus (Ear Ringing):
18. Complete Quiet Silence:
19. Quiet Wind:
20. Visual Hallucinations:
21. Tactile, Olfactory hallucinations and Muscle Spasms:
NSA mind control and psyops
The following was sent to me by Will Filer . It offers a new explanation for government mind control. Will has stated to me that he is a former consultant to the U.S. National Security Agency and asked me to post this information immediately. He also believes he is in immediate danger because of this information. This was possible Date: 20 Aug 1999 08:50:21 GMT
Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.
1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA’s Behavioral Modification Procedure Outline documented for the non-technical person.
2. TECHNOLOGY TITLE:
1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. “Computer Simulated Subconscious Speech Language”.
3. APPLICATIONS: 1. Intelligence: 1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen’s opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.
2. Counterintelligence: 1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).
3. Behavior Modification and Accelerated Resocialization: 1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.
2. The NSA uses this technology to resocialize (brainwash) the US civilian voting population into “Giving their lives to Christ” (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a “Personal Relationship with Jesus Christ” (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.
5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term “Command” is more commonly used when the hypnosis is forcibly given to the subject and when the subject’s will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the “Suggestion” any longer thereby making it a “Command”.
8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.
9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;
(1) an identifier (subject’s name, description, or other identifying factor), (2) trigger activation condition or conditions (when, what or how the suggestion will trigger), (3) the content (what the trigger will precipitate in the perception of the subject), (4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to “strengthen” or reinforce the central posthypnotic command.
12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject’s site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.
5. TECHNOLOGY OVERVIEW:
1. In addition to the ability to see and hear what is going on inside people’s homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.
2. Thought Labels (Response Labels): 1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or “read minds” so to speak.
2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation “thought labels”.
3. Post-Hypnotic Delivery Method: 1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. “How can hypnosis be used?” you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words “Drink Coca Cola” were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.
2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting “sped-up” script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions.
The empty space between words is minimized and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element’s acoustic wave train thus reducing the actual number of sine waves making up a word by 50% or more. This reduces the actual length of the time it takes the phoneme to be delivered prior to accelerating (speeding-up) the delivery (like fast forward). This helps the message to be played at higher speeds and reduces the subject’s ability to recognize it as accelerated speech. The technique of using optimized digitally sampled and edited phonemes appended together to for words and then sentences structured as hypnotic suggestions can be termed “computer simulated subconscious speech language”.
4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many “subliminal tapes” on the market to program your subconscious mind. These tapes have their “messages” recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won’t hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA’s high-speed audio subliminal message.
5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA’s message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the “posthypnotic” script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:
1. Professional state-of-the-art technology recording equipment. 2. Digital acoustic wave editing equipment. 3. Advanced engineering knowledge of acoustic wave science. 4. Phonetics and linguistics expertise. 5. Hypnosis theory and scripting. 6. Ideal environmental conditions for recording. 7. NSA ignorance of the subject’s intent and ability to capture a message.
6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can “program” or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.
4. Using the Post-Hypnotic Delivery Method with Thought Labels: 1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be “Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice.” From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever:
1) cheated on your taxes, and: 2) If the IRS could catch you in an audit.
2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book “1984”. As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.
3. The NSA’s goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a “voice print” from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.
If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person’s location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.
4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950’s and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.
Originally, after noting the behavioral effects in visual subliminal effects like the highly publicized event where stating “Drink Coca Cola” on a single movie frame “delivered a higher rates of speed than normal movie viewing raised the obvious question, “Does the human hearing work as good as eyesight accepting subliminal messages?”
Preliminary theory work was transferred to Fort Mead NSA who had expertise in characterizing language in analog domains where a sampled phoneme could be edited (shortened by removing excess sine waveforms from the “acoustic wavetrain”) and electronically reconstructed back into shortened words of language.
Some of the early experiments included “Remote Viewing at NSA where the Viewer would relax, open their mind and explain the clarity of images that were described by the NSA using this technology. These early experiments allowed the NSA to refine the specifications of the “Computer Simulated Subconscious Speech Language” and the scripting formats to maximize the ability to deliver an accurate “vision or picture” into the subject. Pictures already seen by the subject could simply be recalled using “Age regression” script variations.
6. OTHER REFERENCE MATERIAL:
1. Please refer to the book “Inside America’s Most Secret Agency, The Puzzle Palace” by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA’s history and the NSA’s first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.
7. NSA CASE HISTORY EXAMPLE SUMMARIES: NSA Self-Initiated Execution (Suicide): 1. Bamford’s “The Puzzle Palace” references one of the NSA’s first self-initiated execution (suicide) with this “Thought Control” technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.
2. NSA Initiated Execution to Cover-up in the News: 1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could “read minds” and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news “The gunman was demanding to talk with the Director of the CIA” etc. disappeared quickly (suppressed?) from later news accounts.
3. NSA Initiated Execution to Cover-up in Music: 1. Curt Cobain of the musical group “Nirvana” was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the “Friends inside his head”. Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.
4. NSA Initiated Executions in Overseas Defense Project: 1. Some years back several employees of the United Kingdom’s Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not “Staged” suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.
5. Musical references of NSA Technology: 1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA’s brainwashing technology in a song called “Wild Wild Life”. The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that “They (NSA) talk so fastà” and that the musical group had spent “All their time and money” unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.
6. NSA Counterintelligence Experiments: 1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.
2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA’s behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn’t figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.
3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject’s health degraded.
4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for “God” to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, “God spoke to them and said to commit suicide” and they did securing another one of the NSA’s great experiments in mind control and social pathology.
5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA’s technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.
7. The cases of NSA activities go on and on. With access to the FBI’s Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their “Thought Control” technology.
8. Currently, the NSA has many subjects in the field (our society) that need only a series of “triggers” (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them “Shooters on a Shelf”. A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that “someone” (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.
9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have “Friends inside their heads” also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.
8. NSA BEHAVIORAL MODIFICATION PROCEDURE: 1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency’s Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.
2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called “reborn” by the church, with the subject’s life-long goal of “a personal relationship with Jesus Christ”.
1. ABSTRACT, Behavioral Modification: 1. The NSA’s behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject’s net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject’s posthypnotic suggestibility index, the subject’s intelligence and reasoning ability, moral and superstitious beliefs, and the subject’s social status and the weakness of the subject’s primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.
2. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject’s will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.
3. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject’s neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of “Implants” in their body.
It is important for the subjects to understand that the NSA controls this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject’s experiences. Nobody has the time or inclination to follow a subject around with a microwave gun to tickle various parts of the body. We are saturated with microwaves all the time from television stations, communication satellites, etc and yet we do not have any symptoms because microwaves do not have the ability to trigger localized synaptic responses in our brains. Furthermore, when the subject is in a room surrounded by several people, and the subject is the only one experiencing the “thoughts”, tingling feelings, etc., then obviously a delivery method is being employed that affects only the subject; high-speed acoustic delivered hypnosis.
4. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow “God or Jesus to speak directly to the subject” and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA’s technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and “Gives their Life to Christ” and the NSA achieves total control of the subject.
5. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as “God and Jesus works in their life”. Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).
6. The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA’s electronic surveillance system captures and sorts the prayers by “Keywords”. The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to “God’s will”. If the subject resist’s the NSA’s instructions, additional punishments are inflicted on the subject.
7. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other “Christians” to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject’s problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).
8. A subject that has successfully completed the NSA’s behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject’s lives are relatively unproductive because their focus is on their “Life after death” and not what they accomplish while they are alive. They avoid “worldly activities”, and usually are confused and disjointed in rational thoughts and concepts. For instance, they don’t believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.
3. BEHAVIORAL MODIFICATION PROCESS: 1. Triggering Techniques: 1. The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.
2. Real-Time Subconscious Implant Delivery: 1. Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject’s response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a “voice” heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA’s activities.
3. Prescheduled Subconscious Implant Delivery: The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script’s transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can’t be associated with a commonly recurring situation like event-triggered scripts precipitate.
4. Event-Triggered (conditional) Implant Delivery: 1. Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.
2. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to “script” and use them.
3. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want’s to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject’s behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject’s mind.
Example: This script will always cause a girl or boy not to sleep with the opposite sex: “You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy or girl) friend’s house and you will feel a deep peace when you leave their house to go back home”. These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time.
4. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject’s decision uninfluenced by anyone else that the subject should avoid the person, place or thing.
5. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject’s decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.
5. Stage 1 (Prescreen Evaluation):
1. The subject’s Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject’s speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion “You will not be able to remember the name of “____” no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject’s ability to overcome it is evaluated.
2. A full study of the subject’s religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.
3. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are “Open-ended Questions” (similar to multiple choice with response labels pre-assigned to each choice) or “Reject if Disagreeable” (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.
4. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject’s overall social status, abilities, attitudes, and communication skills with primary support groups and friends.
5. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.
6. The NSA technology affords powerful control over the subject, the subject’s environment, and the subject’s ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject’s physical and mental condition is depleted. The subject’s ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject’s testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.
6. Stage 2 (Standard Process): 1. This stage is where most subjects are behaviorally modified to serve and follow “God” (AKA NSA management of the subject’s civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject’s relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.
2. Coincidence: 1. Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject’s life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that “God” or some other supernatural being is taken interest in their life.
2. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject’s church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject’s mind into concern and contemplation about the sermon’s topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God’s mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.
3. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject’s relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.
3. REM Sleep Deprivation: 1. The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject’s ability to heal after physical damage or after periods of extensive exercise. The result is that the subject’s general health degrades as does social bonds and work/school performance.
2. The NSA performs control of REM Sleep through various methods. Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be discussed later).
3. Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.
4. Dark rings’ surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem. When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject “will feel energetic and rested”, the subject will not recognize the REM Deprivation. Additional posthypnotic commands can be implanted that will make it difficult for the subject to “see or perceive” the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.
4. Shame Factor Enhancement:
1. Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject’s life.
5. Religious Relevance and Convictions: 1. The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the “Word of God”. When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God’s presence and force. “Thou shall not disobey God”.
6. Paranoia: 1. Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject’s distrust of other people including the subject’s primary group that could provide positive support during this time of distress in the subject’s life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject’s testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.
2. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a “schizophrenia” label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.
3. The subject is led to believe that the subject’s neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement personnel.
7. Stage 3 (Extreme Process): 1. This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.
2. Increasing Dependence on Drugs and Alcohol: 1. As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject’s index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject.
3. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from “God”. It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.
3. Poor Nutrition:
1. The poor nutrition reduces the energy the subject has and serves later as another justification of God’s punishment. The subject will be taught later that “the body is the temple” and that to abuse it is to violate God’s will.
4. Apathy: 1. After the subject’s self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of “not persevering through faith” which is later used on the subject later to increase a feeling of guilt.
1. Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.
6. Insecurity: 1. The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can’t be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject’s life.
7. Journals and Diaries: 1. Most of the subjects are directed to keep a “Journal” or diary by the NSA so that the subject can record and review feelings, events, observations, and “God’s directions” that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject’s Journals in a variety of ways.
1. Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress, have very poor grammar, spelling, and short attention spans.
9. Slowed Speech: 1. Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.
10. Confusion: 1. Confusion results from three primary sources; REM Deprivation, specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject’s life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA’s objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA’s security risk.
11. Poor Concentration: 1. Difficulty concentrating impairs the subject’s productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without “God”, thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.
12. Loose Association and Personality Disorders: 1. The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.
13. Anger: 1. The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial “communication intercept” channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.
1. Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.
15. Audio Hallucinations: 1. Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc.
2. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.
16. Voices in the Subject’s Mind:
1. The voices in the subject’s mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject’s internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, “I should go to church today”. With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, “You should go to church today!”
Notice that by implanting the posthypnotic command into the subject’s subconscious mind to think the pronoun “You” instead of “I” the subject will perceive that they are being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject’s perception of threat, fear, and therefore paranoia. It can be used with other posthypnotic suggestion implants that will give the subject the perception of either a “good” or “evil” voice or spirit is directing him/her.
This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject’s every thought. It provides a convincing proof that “God knows every thought of his children”. Subjects that don’t have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic.
17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.
18. Complete Quiet Silence:
1. Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has “The Lord’s Peace Restored”, and secondly, the subject has achieved a milestone toward being released by God (the NSA).
19. Quiet Wind: 1. The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin’s lyrics of a song that has the chorus “I can get so scared, Listen to the wind”.
20. Visual Hallucinations: 1. Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc.
2. The television show “Sightings” has had numerous reports of people seeing “Aliens” at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA’s technology secure (disinformation).
21. Tactile, Olfactory hallucinations and Muscle Spasms: 1. Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:
1. Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or “deception of Satan”).
3. Temporary sensation of pressure to the center of the right palm (symbolizing Jesus “Sitting at the right-hand of God”).
4. Temporary sensation of pressure to the ball of the right foot (symbolizing “Get on the Ball” or “hurry-up”).
5. Temporary sensation of pressure to the tip of the right foot big toe (symbolizing “Right Direction”).
6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing “Fucking-up Direction”).
7. Temporary sensation of pressure to the tip of the left foot big toe (symbolizing “Wrong Direction”).
8. Temporary sensation of pressure to the buttocks (symbolizing “Bad Attitude” or “subject is acting like an ass”).
9. Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).
10. Temporary sensation of pressure to the left ear drum (symbolizing “do not listen”).
11. Temporary sensation of pressure to the right ear drum (symbolizing “listen”).
12. An involuntary blink of the right or left eye (symbolizing: right eye = God’s agreement or left eye = Satan’s agreement).
13. Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or “Having no balls or strength”).
14. Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like “being attacked with microwaves” or being caressed by Angels.
15. Muscular spasm or perceived pressures near the jugular vein on right side of neck (symbolizing Satan having subject by Jugular or throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.
17. Perceived odor sensation of a thick, sweet smell (symbolizing Satan’s sweet victory over the subject’s soul).
9. This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA’s civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.
1. Reverse engineering of the NSA’s technology to prove it’s abuses against the American people is quite difficult. Consider the following.
2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers.
These perceptual effects can be confusion, lack of attention to important details, oversights, bad assumptions, incorrect interpretation of the test data. These same misperceptions will also be incorporated into the research test subjects. The technology cannot be developed and optimized if the NSA has any access to the test subjects. The test scripts given to the test subject delivered from the researcher can be neutralized by the NSA delivering a canceling script immediately after the researcher’s script. The NSA’s test script can also include a hypnoamnesia script at the end to cancel any residual perception in the subject so that the test subject would report no effects and the researcher would conclude the test script had no effect.
3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world.
The research personnel and their subjects must never leave the secured area of the facility so that they cannot be subliminally interrogated by the NSA. The NSA would take this opportunity to deliver disinformation scripts to the subject or researcher. Foodstuffs and supplies would be the logical choice of NSA intrusion if all other security measures were effective against the NSA.
4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it’s surrounding grounds. The minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.
3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.
6. Any facilities existing will have to be debugged before habitation and research begins.
7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.
8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA’s intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.
10. Conclusion: America’s greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population?
11. May God help us all in protecting the American public and preserving and managing this vital technology’s vital potential to serve America’s National Security.
Mass Mind Control in the Present-Day U.S. — The big picture
There are a number of interlocking systems, technologies and techniques which are currently being deployed against the citizens of the United States of America by certain segments of our national government.
First, there are literally COUNTLESS mind-control projects and sub-projects in operation at this time which target SPECIFIC subjects/victims in a variety of ways; using one or more of a number of technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply of different EM/RF mind control technologies, repetitive conditioning, hypnotic trance induction, and so on and on and on.
Reliable reports from MANY different sources indicate that as many as TEN MILLION individuals many be ACTIVE subjects/victims of these kinds of mind control activities, and huge quantities of hard documentation on a great many of these projects DOES exist.
However, in addition to these kinds of mind control operations, there are ALSO mind control and mind manipulation activities that target MASSES of people in large geographical regions at the same time. Indeed, there is VERY strong evidence that the operators of HAARP for example, have ever since HAARP’s earliest days intended that it be used for, among many other things, GLOBAL mind control.
There is in FACT much evidence to show that HAARP is NOW being used for just such utterly evil purposes by the United States federal government.
Of course, there are many other EM/RF technologies and systems which are, or may be, applied to mass-scale mind, mood, thought and consciousness control/manipulation operations: such as the nationwide “GWEN” (Ground Wave Emergency Network) system, certain ELF and ULF transmitter systems, and so on (such as your TV set, even IF it’s turned OFF!)
Another way to manipulate and “regulate” the minds and consciousness of a mass of people at a VERY basic, fundamental level is to CONTROL the population’s PRIMARY sources of INFORMATION. This is one of the MOST powerful ways shape the collective consciousness of the public, and it is CLEAR that many mass media outlets in the United States are both willingly and un-wittingly aiding and abetting the manipulation of our minds by the government, and are assisting the FedGov in carrying out many social-engineering agendas.
The mass media’s treatment of school shooting incidents, for instance, plays DIRECTLY and TOTALLY into the schemes of those who deployed the mind-controlled killers to carry out these shootings, in a grand plan to shut down our Constitution’s 2nd Amendment, among other things.
Moreover, very carefully designed CONDITIONING programs and tactics have been brought to bear against nearly EVERY segment of society; disseminated throughout the nation and the world by mass media and entertainment industries and corporations; and imbedded in ALL forms of so-called entertainment at this point, such as movies, TV shows, video and computer games ESPECIALLY, some pop music, and so on.
This condition of constant, relentless bombardment with grotesquely violent imagery, which the general population, ESPECIALLY its younger members, is inundated with by nearly ALL forms of popular contemporary entertainment and sources of “information”, is indeed directly derived from those mind-conditioning programs and systems developed at Fort Detrick (and other similar locations). San Diego shooter Charles Williams’ father worked at the Army’s Fort Detrick facility for THIRTEEN YEARS.
Specifically, indoctrination/conditioning programs were developed at Fort Detrick in which subjects were repeatedly, continually and continuously immersed in virtual reality-type video/computer “games” of extreme and GRAPHIC brutality, for long stretches of time and over an extended time frame.
This kind of psychological assault proved very effective in rapidly obliterating subjects’ ethical and moral values and cultural norms with regard to violence, brutality, killing and so on.
These systems were perfected, applied to the brainwashing and conditioning of members of the U.S. military and also turned over to the intelligence sectors for other applications. The intelligence sector, in turn, DELIBERATELY and successfully undertook to have this same kind of HIGHLY negative, destructive and effective conditioning applied to SOCIETY AS A WHOLE, via mass conditioning of our consciousness through the entertainment and information industries, as noted.
One OTHER method of mass mind control/manipulation/conditioning which is NOW being utilized MORE and MORE — ESPECIALLY against the most vulnerable members of our society, our CHILDREN — is the highly-reprehensible/questionable and increasingly common MANDATED DRUGGING of ever-growing numbers of children through hugely intrusive, invasive, ill-advised, psychologically unpredictable and often destructive programs mandated, usually for young males, by psychiatrists and social workers. More and more of our children are being dosed on a long-term basis with any of a number of psychotropic/psychiatric drugs like Prozac, Ritalin, Luvox, and so on.
These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT psychotic reactions among a significant percentage of subjects, but ALSO clearly and provably create a stupefied, dumbed-down, zombified mental state in targeted subjects which is a PERFECT “ground state” for the carrying out of yet OTHER mind control/manipulation/conditioning activities on these very same subjects. In general, this kind of psych-drugging makes the job of further mind control programming MUCH easier. And this kind of drugging is being done to ever-increasing numbers of our children, down to toddlers as young as TWO and THREE YEARS OLD!!
Now, there is ANOTHER way in which our present-day society is being literally and effectively mind-controlled en masse.
Most all of the individually-targeted mind control programs we noted above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT PERSONALITY in the victim/subject. In fact, one or more of these deliberately-induced split personalities formed as a result of psycho-sexual abuse or other conditioning are those facets of the subject’s psyche which ARE actually “programmed”; to kill, or whatever else. It’s been shown that forcing victims/subjects to witness, experience or participate in just about any highly-traumatic and shocking events on a repeated basis will induce the kind of psychotic break(down) that is a necessary prerequisite for intensive mind control programming/conditioning.
SO: WHEN our society as a whole is FORCED to confront and WITNESS over and over and over again something as FUNDAMENTALLY shocking as having our young people perpetrating inconceivably horrific mass murders of peers and others on A REGULAR BASIS, as is NOW THE CASE in the present-day United States, then the population as a whole AND on an individual basis to some extent develops an analogous, similar psychological break, and in FACT to some extent develops split personality/multiple personality disorder conditions… READY FOR FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarily disturbing events which impact society AS A WHOLE, such as these school shootings by young people that have just occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO social controllers who set these terrible mass killings off; and the incidents themselves serve to further condition, manipulate and “mind control” the population of the United States in the year 2001.
What are Artificial Neural Networks? The implementation of Neural Networks for brain-like computations like patterns recognition, decisions making, motory control and many others is made possible by the advent of large scale computers in the late 1950’s. http://www.rgsoftware.com/
Mind Control Info: www.mindcontrol.se
Secret US Human Biological Experimentation http://www.apfn.org/apfn/experiment.htm
In the early 1990s, the IT industry got very excited about virtual reality, the idea that you could use some sort of headset display to wander around in a 3d computer-generated world. We quickly realised there are zillions of variations on this idea, and after the one that became current computer gaming (3d worlds on a 2d monitor) the biggest of the rest was augmented reality, where data and images could be superimposed on the field of view.
Now, we are seeing apps on phones and pads that claim to be augmented reality, showing where the nearest tube station is for example. To a point I guess they are, but only in as far as they can let you hold up a display in front of you and see images relevant to the location and direction. They hardly amount to a head up display, and fall a long way short of the kind of superimposition we’re been used to on sci-fi since Robocop or Terminator. It is clear that we really need a proper head-up display, one that doesn’t require you to take a gadget out and hold it up in front of you.
There are some head-up displays out there. Some make overlay displays in a small area of your field of view, often using small projectors and mirrors. Some use visors. However the video visor based displays are opaque. They are fine for watching TV or playing games while seated, but not much use for wandering around.
This will change in the next 18 months – 2 years. Semi-transparent visors will begin to appear then. The few years after that will undoubtedly see rapid development of them, eventually bringing a full hi-res 3d overlay capability. And that will surely be a major disruptive technology. Just as we are getting used to various smart phones, pads, ebbook readers and 3d TVs, they could all be absorbed into a general purpose head up display that can be used for pretty much anything.
It is hard to overstate the potential of this kind of interface once it reaches good enough quality. It allows anything from TV, games, or the web, to be blended with any real world scene or activity. This will transform how we shop, work and socialise, how we design and use buildings, and even how we use art or display ourselves. Each of these examples could easily fill a book. The whole of the world wide web was enabled by the convergence of just the computing and telecoms industries. The high quality video visor will enable convergence of the real world with the whole of the web, media, and virtual worlds, not just two industry sectors. Augmented reality will be a huge part of that, but even virtual reality and the zillions of variants can then start to be explored too.
In short, the semi-transparent video visor is the missing link. It is the biggest bottleneck now stopping the future arriving. Everything till we get that is a sideshow.
Politically planned violations of human rights goes on in all EU-nations, directed to increase state power and reduce human influence. In Sweden, the FOI (Swedish Defense Research Institution) has for decades been developing remote control systems for our neurological functions, via bio-chips injected at health care. In FOI:s annual report, they describe the project as monitoring and changing the cognitive functions of people throughout their life span, i.e. thoughts, perception and common sense.
Sweden’s most dangerous criminal organization. The FOI ruins both democracy and human rights by connecting the human brain to supercomputers.
The EU-Commission’s Ethical Council chaired by the Swedish Professor Goran Hermerén, in 2005 delivered a 30-page document in protest to the EU-Commission. They declared that this technology was a threat to both democracy and human autonomy in all EU-nations:
“Brain-computer interface, or direct brain control:the technologies involved are communication technologies: they take information from the brain and externalize it…Freedom of researchers may conflict with the obligation to safeguard the health of research subjects…the freedom to use implants in ones body, might collide with potential negative social effects…How far can such implants be a threat to human autonomy when they are implanted in our brains?…How far should we be subject to the control of such devices by other people using these devices?…The use of implants in order to have a remote control over the will of people should be strictly prohibited…To what extent will this technology be misused by the military?”
FOI Director Jan-Olof Lind,cheif of the institution founded on the raping of humans. He should be held legally responsible for crimes against human rights.
This planned population project, does not only remove human rights, but transforms us via behavioral manipulation with invasive brain technology. FOI wrote in its program: “We have unique tools and methodologies for the modeling of human behavior…The goal is to design systems able to exploit human cognitive potential (i.e. the ability to perceive, understand and organize information) throughout the course of a person’s life time…Regardless that the consequences of this for people are strong physical burden to bear, it includes as well a risk of serious injury”.
The systems function via two-way radio communication, implants and supercomputers. The EU-board wrote: “How far should we let implants get ’under our skins’?…Indeed, individuals are dispossessed of their own bodies and thereby of their own autonomy. The body ends up being under others’ control. Individuals are being modified, via various electronic devices, under skin chips and smart tags, to such an extent that they are increasingly turned into networked individuals…Does a human being cease to be such a ’being’ in cases where some parts of his or her body – particularly the brain – are substituted and/or supplemented by implants?”
Prime Minister Fredrik Reinfeldt has accepted the use of humans in experimental reserach and behavioral manipulation. He has also supported FOI´s declaration of abuse of humans in the name of science.
This is a cause of both madness, and anti-social trends in our societies. The brain project has been developed in secrecy for decades; the mentally ill have been put to sleep and implanted with electrodes in their brains and hospitals are injecting brain chips into unwitting patients on a large scale.
Another view of the military conquest of the brain. The Department of Defense has taken over the Karolinska Institute´s neuroscience, and FOI-managers direct the operations. A similar relationship exists for other parts of Karolinska Institute, which is controll
The threat to human rights, freedom and a civilized society could not be more serious or totalitarian. It does not only place a person behind an iron curtain, but create a brain barrier for one’s own thoughts and personality. The project utilizes many forms of research; biological experiments, neuroscience, social engineering, personality modification etc. This is a techno-political agenda for the future that goes a step further than any traditional dictatorships ever has done. It intends to transform us into biological machinery and exploited guinea pigs. 40 years ago, the Swedish state report Choosing Future by Alva Myrdal quoted that people would have small chances of protecting their rights, regarding to the behavior technology. Said quote is from the official state report,SOU 1972:59:
“Research into brain function and behavior is designed primarily to clarify the nature and extent of the changes that can be achieved with the different methods and thus provide information on new opportunities to alleviate human suffering, and new risks of control and modification of behavior against peoples will.”
Several leading professors have suggested that antisocial trends have been spread through these military brain systems. TheEU-Ethical Council asked what danger the military constituted. In fact, they are the central factor in the game of the human brain. Fredrik Reinfeldt had even before he became Prime Minister, made up his mind to stand for the FOI’s abuse. He did the same 2007, after forming the new government; he reaffirmed his opinion concerning this matter.
I, Eric R Naeslund has written this paper and formed the accuse. Also supported a network including journalists, organizations and brain activists in a joint project to bring the issue to media attention and everybody´s knowledge.
For the last 40 years and without practically any media attention, there has been an ongoing debate within the state regarding the brain technology. A former Director General of Data Inspection, Stina Wahlstrom, took up the subject in relation to human rights in the annual book 1989-1990. She wrote:“Obviously, research must include the same ethical values that are generally the basis of law in our society…It is necessary to limit the research and this restriction is needed in a democratic society… People’s integrity has been violated which often means, unwittingly or unwillingly being forced to participate in a research project. Legislation for such coercion does not belong in a democratic society.”It was written 20 years ago, yet it has been developed as far that the 12 members of the European Ethical Council stated: “…when these implants are within our own brains.”This is a threat intended to include all of us in experimental research and behavioral manipulation.
A Prime Minister who accepts the secret brain project, has also launched a battle against people’s fundamental freedom and human rights. In Fredrik Reinfeldt’s state, it is important to repeat terms like ‘justice’ and ‘the open society’ as indoctrinated concepts, to hide the reality of building even higher walls of coercion and censorships, than any previous despot has done. Metaphorical impenetrable barbed wire fences that are – to replace freedom with control – being steadily created in more people’s brains, to replace freedom, with control. The State’s ravaging has FOI as its spearhead. Several times they declare, not only to accept destruction of humans, but also that certain research is actually based on causing harm, suffering and trauma in people. FOI’s takeover of key components of the Karolinska Institute has facilitated the professors and researchers’ projects. A neuro-professor stated in a speech, they couldn’t avoid creating diseases and death amongst those they misused. A scary reality that is not uncommon.
In order to describe the subject from an international perspective, New York Times have had the courage to challenge the U.S. government’s covert brain project. Accusing the Pentagon and the CIA of perpetrating the same systems of persecution as the Defence Departments within the EU, they published three political editorials, 50 articles and demanded better knowledge and a public debate. The first editorial was published in 1967 under the heading Push Button People. They warned of the possibility of enslaving the brain and wrote that it was likely; some nations had plans to suppress its citizens by brain technology. The second came in 1970 under the newly formed term Brain Wave. They indicated that we had to update the word ‘brain washing’ to ‘brain waving’, and assumed that Orwell’s 1984had expired and a new and worse danger was at hand. That every newborn child’s first experience of life would be neuro surgery, to be implanted with a transmitter and for their lifetime get emotions and reasons controlled by the state. The third editorial was published in August 1977 after that the New York Times during the summer published 30 revealing articles on the CIA’s brain projects. Under the heading Control CIA Not Behavior they stated that no one knows how many were injured or killed, and they demanded legal action against those involved and financial compensation for victims.
It’s a bigger nightmare here and now, since the experimental program has developed into a permanent state operation. Senator John Glenn spent his final three years in the Senate (1994-1997) trying to regulate the abuses. In his closing speech in January 1997 he called the question for one of the most important of our time. Here we stand at one of mankind’s crucial crossroads in relation to individual freedom – vs. unlimited state power to reduce man to Governmental components. Who wants to live his life with chips and manipulated perceptions? None of course! The EU Council wrote that they wanted to give people the power against the introduction of systems to reduce freedom and autonomy. This topic, more so than any other issue, is reshaping the future, the human brain and life. It must obviously come up for debate in both parliament and the media. We all have a responsibility to contribute; journalists, social activists and of course those parliamentary members whom are opposed to brain chips, behavior control, human experimentation and undemocratic ideas, must of course make themselves heard too.
or anyone who wants more information concerning the issue – there are an extensive information material both in English and Swedish – contact
Scientists are getting closer to the dream of creating computer systems that can replicate the brain.
Researchers at the Massachusetts Institute of Technology have designed a computer chip that mimics how the brain’s neurons adapt in response to new information.
Such chips could eventually enable communication between artificially created body parts and the brain.
It could also pave the way for artificial intelligence devices.
There are about 100 billion neurons in the brain, each of which forms synapses – the connections between neurons that allow information to flow – with many other neurons.
This process is known as plasticity and is believed to underpin many brain functions, such as learning and memory.
The MIT team, led by research scientist Chi-Sang Poon, has been able to design a computer chip that can simulate the activity of a single brain synapse.
Activity in the synapses relies on so-called ion channels which control the flow of charged atoms such as sodium, potassium and calcium.
The ‘brain chip’ has about 400 transistors and is wired up to replicate the circuitry of the brain.
Current flows through the transistors in the same way as ions flow through ion channels in a brain cell.
“We can tweak the parameters of the circuit to match specific ions channels… We now have a way to capture each and every ionic process that’s going on in a neuron,” said Mr Poon.
Neurobiologists seem to be impressed.
It represents “a significant advance in the efforts to incorporate what we know about the biology of neurons and synaptic plasticity onto …chips,” said Dean Buonomano, a professor of neurobiology at the University of California.
“The level of biological realism is impressive,” he added.
The team plans to use their chip to build systems to model specific neural functions, such as visual processing.
Such systems could be much faster than computers which take hours or even days to simulate a brain circuit. The chip could ultimately prove to be even faster than the biological process.
Tuesday, 11 March 2008, 10:32 GMT
Chemical brain controls nanobots
A tiny chemical “brain” which could one day act as a remote control for swarms of nano-machines has been invented.
The molecular device – just two billionths of a metre across – was able to control eight of the microscopic machines simultaneously in a test.
Writing in Proceedings of the National Academy of Sciences, scientists say it could also be used to boost the processing power of future computers.
Many experts have high hopes for nano-machines in treating disease.
“If [in the future] you want to remotely operate on a tumour you might want to send some molecular machines there,” explained Dr Anirban Bandyopadhyay of the International Center for Young Scientists, Tsukuba, Japan.
“But you cannot just put them into the blood and [expect them] to go to the right place.”
Dr Bandyopadhyay believes his device may offer a solution. One day they may be able to guide the nanobots through the body and control their functions, he said.
“That kind of device simply did not exist; this is the first time we have created a nano-brain,” he told BBC News.
The machine is made from 17 molecules of the chemical duroquinone. Each one is known as a “logic device”.
How nanotechnology is building the future from the bottom up
They each resemble a ring with four protruding spokes that can be independently rotated to represent four different states.
One duroquinone molecule sits at the centre of a ring formed by the remaining 16. All are connected by chemical bonds, known as hydrogen bonds.
The state of the control molecule at the centre is switched by a scanning tunnelling microscope (STM).
These large machines are a standard part of the nanotechnologist’s tool kit, and allow the viewing and manipulation of atomic surfaces.
Using the STM, the researchers showed they could change the central molecule’s state and simultaneously switch the states of the surrounding 16.
“We instruct only one molecule and it simultaneously and logically instructs 16 others at a time,” said Dr Bandyopadhyay.
The configuration allows four billion different possible combinations of outcome.
The two nanometre diameter structure was inspired by the parallel communication of glial cells inside a human brain, according to the team.
To test the control unit, the researchers simulated docking eight existing nano-machines to the structure, creating a “nano-factory” or a kind of “chemical swiss army knife”.
Scientists believe nano-machines could have medical applications
The attached devices, created by other research groups, included the “world’s tiniest elevator”, a molecular platform that can be raised or lowered on command.
The device is about two and a half nanometres (billionths of a metre) high, and the lift moves less than one nanometre up and down.
All eight machines simultaneously responded to a single instruction in the simulation.
“We have clear cut evidence that we can control those machines,” said Dr Bandyopadhyay.
This “one-to-many” communication and the device’s ability to act as a central control unit also raises the possibility of using the device in future computers, he said.
Machines built using devices such as this would be able to process 16 bits of information simultaneously.
Current silicon Central Processing Units (CPUs) can only carry out one instruction at a time, albeit millions of times per second.
The researchers say they have already built faster machines, capable of 256 simultaneous operations, and have designed one capable of 1024.
However, according to Professor Andrew Adamatzky of the University of the West England (UWE), making a workable computer would be very difficult at the moment.
“As with other implementations of unconventional computers the application is very limited, because they operate [it] using scanning tunnel microscopy,” he said.
But, he said, the work is promising.
“I am sure with time such molecular CPUs can be integrated in molecular robots, so they will simply interact with other molecular parts autonomously.”
ScienceDaily (Apr. 2, 2012) — As computer scientists this year celebrate the 100th anniversary of the birth of the mathematical genius Alan Turing, who set out the basis for digital computing in the 1930s to anticipate the electronic age, they still quest after a machine as adaptable and intelligent as the human brain.
Now, computer scientist Hava Siegelmann of the University of Massachusetts Amherst, an expert in neural networks, has taken Turing’s work to its next logical step. She is translating her 1993 discovery of what she has dubbed “Super-Turing” computation into an adaptable computational system that learns and evolves, using input from the environment in a way much more like our brains do than classic Turing-type computers. She and her post-doctoral research colleague Jeremie Cabessa report on the advance in the current issue ofNeural Computation.
“This model is inspired by the brain,” she says. “It is a mathematical formulation of the brain’s neural networks with their adaptive abilities.” The authors show that when the model is installed in an environment offering constant sensory stimuli like the real world, and when all stimulus-response pairs are considered over the machine’s lifetime, the Super Turing model yields an exponentially greater repertoire of behaviors than the classical computer or Turing model. They demonstrate that the Super-Turing model is superior for human-like tasks and learning.
“Each time a Super-Turing machine gets input it literally becomes a different machine,” Siegelmann says. “You don’t want this for your PC. They are fine and fast calculators and we need them to do that. But if you want a robot to accompany a blind person to the grocery store, you’d like one that can navigate in a dynamic environment. If you want a machine to interact successfully with a human partner, you’d like one that can adapt to idiosyncratic speech, recognize facial patterns and allow interactions between partners to evolve just like we do. That’s what this model can offer.”
Classical computers work sequentially and can only operate in the very orchestrated, specific environments for which they were programmed. They can look intelligent if they’ve been told what to expect and how to respond, Siegelmann says. But they can’t take in new information or use it to improve problem-solving, provide richer alternatives or perform other higher-intelligence tasks.
In 1948, Turing himself predicted another kind of computation that would mimic life itself, but he died without developing his concept of a machine that could use what he called “adaptive inference.” In 1993, Siegelmann, then at Rutgers, showed independently in her doctoral thesis that a very different kind of computation, vastly different from the “calculating computer” model and more like Turing’s prediction of life-like intelligence, was possible. She published her findings in Science and in a book shortly after.
“I was young enough to be curious, wanting to understand why the Turing model looked really strong,” she recalls. “I tried to prove the conjecture that neural networks are very weak and instead found that some of the early work was faulty. I was surprised to find out via mathematical analysis that the neural models had some capabilities that surpass the Turing model. So I re-read Turing and found that he believed there would be an adaptive model that was stronger based on continuous calculations.”
Each step in Siegelmann’s model starts with a new Turing machine that computes once and then adapts. The size of the set of natural numbers is represented by the notation aleph-zero, ℵ0, representing also the number of different infinite calculations possible by classical Turing machines in a real-world environment on continuously arriving inputs. By contrast, Siegelmann’s most recent analysis demonstrates that Super-Turing computation has 2ℵ0, possible behaviors. “If the Turing machine had 300 behaviors, the Super-Turing would have 2300, more than the number of atoms in the observable universe,” she explains.
The new Super-Turing machine will not only be flexible and adaptable but economical. This means that when presented with a visual problem, for example, it will act more like our human brains and choose salient features in the environment on which to focus, rather than using its power to visually sample the entire scene as a camera does. This economy of effort, using only as much attention as needed, is another hallmark of high artificial intelligence, Siegelmann says.
“If a Turing machine is like a train on a fixed track, a Super-Turing machine is like an airplane. It can haul a heavy load, but also move in endless directions and vary its destination as needed. The Super-Turing framework allows a stimulus to actually change the computer at each computational step, behaving in a way much closer to that of the constantly adapting and evolving brain,” she adds.
Siegelmann and two colleagues recently were notified that they will receive a grant to make the first ever Super-Turing computer, based on Analog Recurrent Neural Networks. The device is expected to introduce a level of intelligence not seen before in artificial computation.