I have come across a few very well maintained professional looking sites that describe very accurately what a TI (targeted individual) may experience. These sites are extremely articulate and seem to describe almost too perfectly what a TI may have experienced. These sites only offer a man made description of who may be behind the gang stalking. They claim that the methods used such as directed energy weapons or mind reading implants are solely advanced man made technologies and one site even suggested these stalkers were using alien technologies. These sites also would never suggest the possibility that the methods used my be demonic or paranormal in nature. I contacted a couple of these sites and asked about the possibility that this phenomenon is an end of days event. There reaction was to skirt the suggestion and would neither confirm or deny the possibility. There reaction seemed strange I would have expected a more definitive answer one way or an other. I believe the authors of some of these sites are actually locus and are designed to steer people away from the truth. These Locus are of divine providence they are under the direction of Abbadon and I believe they are not allowed to out and out deny that these are in fact end of days phenomenon and are also forbidden to offer any guidance regarding this end time event.
I believe the great one expects TI to figure this out on there own. I suspect most TIs suffering directed energy weapons and mind reading implants were agnostic prior to being targeted. Also some TIs were never targeted by Locus they were in fact targeted by an unscrupulous organization this organization does have access to mind reading and advanced tracking and communication technologies.
Some TIs are being gang stalked by locus also the gang stalkers that were not locus and were working for the unscrupulous organization are now also being targeted by Locus the targeting are now the targeted. Because these Locus are being coordinated by Abbadon they are way more terrifying and effective.
Just to clarify not all TIs are being stalked by Locus Locus only target openly atheist targets. Many TIs may have seen the Locus and detected there presence but are not being targeted by them as they have the seal of God. I must admit when I first detected the Locus they frightened me however I believe they were only trying to let me know they exist and are on the good guys team. If yo consider yorself relitively good natured and believe in a higher power and are not openly critical of other religions yo were not likely targeted by locus
The following page below I found on line in a few sites I believe was authored by a locus
______________________________________________________________________
From: abemarf@aol.com (Abemarf)
Newsgroups: alt.mindcontrol
Subject: The NSA and Mind
Control
Date: 20 Aug 1999 08:50:21 GMT
NSA mind control
and psyops
The following was sent to me by Will Filer
on July 27, 1999. It offers a new explanation for
government mind control. Will has stated to me that he is a former
consultant to the U.S. National Security Agency and asked me to post this
information immediately. He also believes he is in immediate danger because
of this information.
If you have comments on this document, feel free
to post them to the MINDCONTROL-L list.
- Wes Thomas, moderator,
MINDCONTROL-L list
Subliminal Implanted Posthypnotic Suggestions and
Scripts Using Acoustically Delivered and Phonetically Accelerated
Posthypnotic Commands without Somnambulistic Preparation in the Subject for
Intelligence and Counterintelligence Applications by the United States
National Security Agency.
1. INTRODUCTION:
1. The following information is an overview of one
area of NSA
Intelligence Technology and Applications. A Technology Title,
Applications, Technology Description, case history summaries and the
NSA's Behavioral Modification Procedure Outline documented for the
non-technical person.
2. TECHNOLOGY TITLE:
1. Subliminal
Implanted Posthypnotic Suggestions and Scripts Using Acoustically
Delivered and Phonetically Accelerated Posthypnotic Commands without
Somnambulistic Preparation in the Subject for Intelligence and
Counterintelligence Applications by the United States National Security
Agency. "Computer Simulated Subconscious Speech Language".
3.
APPLICATIONS:
1. Intelligence:
1. Used on foreign and domestic
diplomats, spies, and citizens to gather intelligence, steal advanced
technology for US Defense applications. Surveys of citizen's opinions to
government events and propaganda. Heavy survey use during times of war,
economic strife and political elections. War against drugs. Used to
identify investments that have high yield to support clandestine
operations. Used to direct field agents without the agents having to carry
communications hardware and encryption devices.
2.
Counterintelligence:
1. Used on foreign and domestic
diplomats, spies,
and citizens to identify intelligence operations; scope, participants,
communication methods, and weaknesses in individuals, systems,
equipment,
or signals that can be exploited. Additional applications include
misinformation dissemination, confusing and confounding leaders
during
critical decision moments, distorting significance of various facts to
sway decisions and actions in US favor, behavioral modification of
foreign
spies to betray their loyalties, self initiated executions (suicides).
3. Behavior Modification and Accelerated Resocialization:
1.
This technology is used to develop and control spies, political candidates, and other public figures through psychological
intimidation, fear and extortion.
2. The NSA uses this
technology
to resocialize (brainwash) the US civilian voting population into
"Giving
their lives to Christ" (giving up their personal will and civil rights
to
the NSA). Each subject is required to maintain a "Personal
Relationship
with Jesus Christ" (following the precepts of the Bible and doing what
is ordered by the NSA). The technology is also used to monitor and
optimize NSA employee performance and loyalty.
4. DEFINITIONS AND
ACRONYMS:
1. Age Regression: The act of bringing back past memories in
a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.
2. Hypnoamnesia: Temporary
loss of memory due to a posthypnotic suggestion.
3. NSA: United
States National Security Agency, Fort Mead, Maryland.
4. ODO: On-Duty
Officer, or officer-on-duty.
5. Posthypnotic
Command: Same as
Posthypnotic Suggestion. This term "Command" is more commonly used when
the hypnosis is forcibly given to the subject and when the subject's will
has been broken down though the use of REM Sleep Deprivation and
Suggestibility Index
increasing drugs like CNS and Cardiovascular
Stimulants. The exposure to extreme REM deprivation and select chemical
stimulants cause the subject to have no ability to resist the "Suggestion"
any longer thereby making it a "Command".
6. Posthypnotic
Suggestion: A subconscious suggestion or command resident and potentially
active in the subject following a hypnotic trance or period of direct
access to the subconscious mind.
7. Posthypnotic Suggestibility
Index:
An index or rating of a subject's susceptibility and sensitivity to
hypnosis.
8. REM DEP:
Abbreviation for REM Sleep Deprivation or REM
Deprivation. A subject deprived from REM Sleep has multiple symptoms
i.e. reduced protein synthesis, black circles around eyes, loss of
short term memory, confusion, impulsiveness, anger, frustration,
diminished self-esteem, increased suggestibility, reduced
productivity, apathy, and depression. Long term REM Deprivation
results in death.
9.
Script: A carefully constructed series of
words arranged in the form of a posthypnotic suggestion. The script will
generally consist of four separate parts;
(1) an identifier
(subject's name, description, or other identifying factor),
(2) trigger
activation condition or conditions (when, what or how the suggestion will
trigger),
(3) the content (what the trigger will precipitate in the
perception of the subject),
(4) and a duration (when or under what
conditions will it stop or finish). Additional reinforcing scripts are
usually added to "strengthen" or reinforce the central posthypnotic
command.
10. Somnambulatory
State: An abnormal condition of sleep in
which motor acts (like walking, running) are performed. This state is
typically achieved and a prerequisite to traditional hypnosis.
11.
Subliminal Implant: A posthypnotic suggestion successfully delivered to
the subject's subconscious mind.
12. Transceivers (NSA): Nearly
microscopic electronic surveillance devices that collect and transmit
encrypted audio, color video, and location coordinates collected at the
subject site to NSA Satellites that in turn forward it to NSA central
intelligence operations. The devices also receive encrypted audio scripts
from NSA central intelligence operations through the satellites and
deliver it to the subject's site in the form of a subliminal posthypnotic
suggestion. These devices are approximately the size of the head of a
straight pin and can be concealed in houses, offices, automobiles, planes,
and street corners.
5. TECHNOLOGY OVERVIEW:
1. In addition
to the ability to see and hear what is going on inside people's homes,
vehicles, and businesses through the use of nearly microscopic digital
surveillance technology, the NSA is able to interrogate and influence a
person subconsciously without the knowledge or consent of the subject.
2. Thought Labels (Response Labels):
1. Have you ever watched
a baseball game? Did you see the catcher and pitcher communicate using a
series of itches, baseball cap rearrangement, and clothing tugs? An
elaboration of this communication technique is used by the NSA to detect a
fleeting thought in a subject or "read minds" so to speak.
2. Lets
discuss how an itch, clothing tug or even an innocent sneeze can be used
to label a thought. For simplicity, we will call itches, clothing tugs,
sneezes, coughs, or involuntary muscle spasms that are performed during
subconscious interrogation "thought labels".
3. Post-Hypnotic Delivery
Method:
1. The NSA combines hypnosis and thought
labels to interrogate
people without the subject being aware of it. "How can hypnosis be
used?" you might ask. The subconscious mind operates at a speed of about
1200
to 1400 words per minute. This is many times faster than the conscious
mind that operates at 250 to 450 WPM (words per minute). The
posthypnotic
script can be spoken at fast conversational speed approximately 250
WPM
and a recorder or a computer speeds up the message up to approximately
1200 to 1400 WPM. Remember what happens when you play a 33 rpm record
at
78 rpm? The resulting voice sound like the old American cartoon
characters
the Chipmunks. This is only slightly past doubling (2X) the delivery
speed. At speeds as high as 1400 WPM, the voices would sound like a
high
pitched chattering whine. Remember when the words "Drink Coca Cola"
were
written on one frame of a movie in a theatre back in the 1960s? The
frame
rate in movies is played at 30 frames/second. At 1/30th of a second
the conscious mind could not recognize the message but the subconscious
mind could read it clearly. The audience increased their Coca-Cola
consumption by 65% that night resulting in the Federal Government
prohibiting subliminal advertising. The following probable reasons for
not achieving a higher percentage of subliminal delivery effectiveness
(> 65%) are described as follows. In that 1/30th of a second some
people were blinking, some people were looking around the theatre,
looking
at spouses, children, candy, popcorn, etc. or they had sufficiently
poor
eyesight that they could watch the movie but could not distinguish the
small writing clearly.
2. In the early years of this
technology, the
NSA originally recorded a spoken posthypnotic suggestion message into a
tape deck and sped it up by speeding up the tape. This process was
labor
intensive, required each officer to have excellent diction and mastery
of
the language and dialect required, and was of poor quality due to
background noise and the delay in timing during recording and
processing. It also required extensive training to assure that each
officer spoke at the same rate of speed so that the resulting
"sped-up" script was delivered at the correct speed. Now computers are
used to append digitized samples of optimized, ideal phonemes together
to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the
variety of languages on the planet, phonetic elements from each language
and
distinct dialect are sampled, digitally edited to optimize them, and
appended during delivery to form words and words arranged to make
sentences in the from of scripts that resemble hypnotic suggestions.
The empty space between words is
minimized and pitch rise is
compressed and filtered. Repetitive sine waves are also removed from
the phonetic element's acoustic wave train thus reducing the actual
number of sine waves making up a word by 50% or more. This reduces the
actual length of the time it takes the phoneme to be delivered prior
to
accelerating (speeding-up) the delivery (like fast forward). This
helps
the message to be played at higher speeds and reduces the subject's
ability to recognize it as accelerated speech. The technique of using
optimized digitally sampled and edited phonemes appended together to
for
words and then sentences structured as hypnotic suggestions can be
termed
"computer simulated subconscious speech language".
4. The
subconscious mind is also very sensitive. It can hear things that the
conscious mind ignores. If you have watched television, you have probably
noticed that there are many "subliminal tapes" on the market to program
your subconscious mind. These tapes have their "messages" recorded/hidden
in the sounds of ocean waves, music, or other sounds but they are not
sped-up to subconscious delivery speeds and are therefore not very
effective. The subconscious mind can hear and discern the message even
when there is background noise like waves, cars, planes, or even when
someone else is speaking to you in normal conversation. Your conscious
mind won't hear anything unless it is very quite in the house. If you are
very attentive you may hear what sounds like a low-pitched tape on fast
forward, and played at low volume. This is the sound of the NSA's
high-speed audio subliminal message.
5. This modification of
the
phonetic elements, played at low volume, combined with the
environmental
background noise makes it very difficult for a subject to record the
NSA
message. Even if the subject were to effectively record the message,
it is
very difficult to filter (separate) the NSA's message from background
noise. Then, reconstructing the missing sine waves from the acoustic
wave
train and slowing the message down to discern the actual content of
the "posthypnotic" script with the conscious mind would be nearly
impossible for the average citizen. To briefly summarize, the subject
would have no chance in analyzing a NSA message without the following
items:
1. Professional state-of-the-art technology recording
equipment.
2. Digital acoustic wave editing equipment.
3. Advanced
engineering knowledge of acoustic wave science.
4. Phonetics and
linguistics expertise.
5. Hypnosis theory and scripting.
6. Ideal
environmental conditions for recording.
7. NSA ignorance of the subject's
intent and ability to capture a message.
6. This technology is the
perfect intelligence tool. It is nearly impossible to detect or measure,
difficult to trace back to the NSA. The symptoms that the NSA can
"program" or inflict into the subject can cause fear that they might be
thought to be insane if they were to report the NSA activities. The
subject does not know the source of the technology or the technology
itself, the subject has no proof or evidence, only their perception,
suffering, and isolation. Additionally, potential recourses that are
available to the subject can be interrogated out and preventative actions
taken by the NSA to further isolate or disable the subject.
4.
Using the Post-Hypnotic Delivery Method with Thought Labels:
1.
The
NSA technique is simple; they transmit their human programming message
through the audio-visual electronic surveillance equipment installed
in
your home, car, or office to you. The subliminal message delivered to
you
could be "Mr. Jones, imagine that the IRS were auditing your taxes.
Think
back to a time you have cheated on your taxes and that you are worried
that the IRS might find out in an audit. If you have never cheated on
your
taxes and have nothing to fear you will feel an itch on your
right-hand
ear lobe that will go away when you scratch it. If you can be caught
by an
IRS audit, you will feel an itch in the left nostril of your nose that
will disappear after you itch it twice." From your perspective, you
have just had a fleeting thought about your past tax returns and had an
innocent itch (thought label). To the NSA Officer On Duty (ODO), you
have just communicated to him whether you have ever:
1) cheated on
your taxes, and:
2) If the IRS could catch you in an audit.
2. This
is a very oversimplified example of a typical NSA interrogation. Actual
interrogation messages may consist of several hundred words and be very
complex and sophisticated. Most messages consist of several dozen words.
Yes indeed, the NSA has exceeded the wildest expectations of the book
"1984". As you can imagine, the spy world has reached a new plateau that
directly affects every person in the USA and abroad. This electronic
surveillance system extends down through Mexico, Central America, and deep
into populated regions of South America. It also has been installed in
Australia, Africa, and the free-world countries in Europe.
3. The
NSA's goal is to have the whole world under its electronic eye by the year
2000. They are almost there now, but are having difficulties with
high-tech countries that have the counterintelligence resources to
identify the high frequency bursts of microwave transmission from the
transceivers. The system also has the ability to take a "voice print" from
any person and place it on file. This file can be used to locate the
subject later by comparing it to real-time surveillance audio samples
received from the field as long as the subject is speaking in close
proximity to a transceiver.
If the person is aware that the NSA has
this
capability and remains silent, the NSA can transmit a periodic
worldwide
subliminal message that addresses the person by name and causes them
to
dream and talk in their sleep. After the person talks, the voiceprint
would be eventually identified and the person's location can be
identified nearly anywhere in the world. Yes, it is a small world, and
getting
smaller all the time.
4. This technology was originally
conceived
under CIA studies and fascination with the power of hypnosis in the
late
1950's and perfected by very early 1960s and implemented with
unlimited resources to all areas of vital national security interest
first.
Originally, after noting the behavioral
effects in visual subliminal
effects like the highly publicized event where stating "Drink Coca
Cola" on a single movie frame "delivered a higher rates of speed than
normal movie viewing raised the obvious question, "Does the human
hearing work as good as eyesight accepting subliminal messages?"
Preliminary theory work was transferred to Fort Mead NSA who had
expertise in characterizing language in analog domains where a sampled
phoneme could be edited (shortened by removing excess sine waveforms from
the "acoustic wavetrain") and electronically reconstructed back into
shortened words of language.
Some of the early experiments included
"Remote Viewing at NSA where the Viewer would relax, open their mind and
explain the clarity of images that were described by the NSA using this
technology. These early experiments allowed the NSA to refine the
specifications of the "Computer Simulated Subconscious Speech Language"
and the scripting formats to maximize the ability to deliver an accurate
"vision or picture" into the subject. Pictures already seen by the subject
could simply be recalled using "Age regression" script variations.
6. OTHER REFERENCE MATERIAL:
1. Please refer to the book
"Inside America's Most Secret Agency, The Puzzle Palace" by James Bamford,
Published by Houghton Mifflin Company, 1982. This book contains extensive
information and references on the NSA's history and the NSA's first
surveillance system that originally only eavesdropped on telephones and is
now expanded to audio-visual.
7. NSA CASE HISTORY EXAMPLE
SUMMARIES:
NSA Self-Initiated Execution (Suicide):
1.
Bamford's "The Puzzle Palace" references one of the NSA's first self-initiated execution (suicide) with this "Thought Control"
technology they developed. The NSA employee reportedly ran off NSA property
saying demons were in his mind and he killed himself.
2. NSA Initiated
Execution to Cover-up in the News:
1. A University of
California at
Berkley student that went into a bar on or around November 27, 1990
took
hostages and insisted to the police that the CIA Director talk with
him so
that he could get relief from the suffering. The young man had sent
letters to the president and the CIA but the requests had fallen on
deaf
ears. After the young man panicked and shot a customer in the bar, a
SWAT
team fatally shot him, the San Jose police found copies of the letters
written to the President referring to people that could "read minds"
and that he had learned how they do it. The NSA had been
unsuccessfully brainwashing him and had no alternative but to
terminate him to assure their security. It is interesting that what
was originally broadcast on the news "The gunman was demanding to
talk
with the Director of the CIA" etc. disappeared quickly (suppressed?)
from
later news accounts.
3. NSA Initiated Execution to Cover-up in Music:
1. Curt Cobain of the musical group "Nirvana" was another victim of
NSA brainwashing and was terminated by NSA. Cobain had started writing
clues to the NSA activities into his music to communicate it to his music
followers. He referred in music to the NSA as the "Friends inside his
head". Once the NSA puts on the highest level of brainwashing pain, the
subject expires quickly. Cobain used heroin to numb and otherwise slow the
effect of the brainwashing.
4. NSA Initiated Executions in Overseas
Defense Project:
1. Some years back several employees
of the United
Kingdom's Government working on a top secret Radar Project committed
suicide with no apparent penetration by a hostile government, drug
abuse
or any other commonality other than working in a secured government
project. They were not "Staged" suicides (murders) because some of
them happened behind doors that could not be opened from the outside.
These men were subjected to the same technology and processes that
the
U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of
others have experienced.
5. Musical references of NSA Technology:
1. Talking Heads; a music group popular in the eighties, wrote a song
explaining the scientific process of the NSA's brainwashing technology
in a song called "Wild Wild Life". The song gave an example of what the
audible transmission sounded like at the end of the song (like a tape on
fast forward). They mentioned in the song that "They (NSA) talk so fastà "
and that the musical group had spent "All their time and money"
unsuccessfully trying to find a place that the NSA would not be able to
harass them. The Talking Heads exposed the technology, gave an example of
what it sounds like, scenarios of how the NSA might select you or the
brainwashing, and the scope of the electronic surveillance system.
6. NSA Counterintelligence Experiments:
1. Many experiments
were performed by the NSA to determine the conditions and procedures that
would be required to turn spies that were trusted by US enemies into
assassins that we could invisibly manage. In early experiments, the
resulting NSA experimental subjects would get extensive attention in the
news because of the horror and unusual nature of the atrocity.
2.
One example that comes to mind happened several years ago and created much
news. A man became obsessed with his son, poured gasoline on him and
ignited it. He had planned to do the same to himself but his desire for
survival overpowered the NSA's behavioral conditioning. After he was
imprisoned, he spoke about how all of a sudden his mind became clear and
he couldn't figure out how he could do this crime. The hypnosis was simply
removed and the subject was allowed to sleep so that experts studying the
file would not find out anything if the subject would have been subjected
to traditional hypnotherapy or other psychoanalytical techniques. Another
successful counterintelligence experiment completed with no liability or traceability to the NSA.
3.
Perhaps ten years ago I read of
several elderly people died of sleep deprivation in Florida. The
doctors
tried everything they could do but could not stop the sleep
deprivation
that resulted in a 100% effective termination yield. The NSA had
developed
the right combination of delivered anxiety scripts combined with
muscular tension and delivery schedules optimized according to
decreasing post
hypnotic durability over time as the subject's health degraded.
4.
David Koresh of the Branch Davidians spent many hours talking with FBI
negotiators about God and the Bible and finally waited for "God" to tell
him what to do in the final hours of the siege. The compound probably had
numbers of Personal Journals (required for subjects by the NSA during
brainwashing) that could lead to questions about how this cult came to
this level. Additionally, just like other loose ends the NSA had to
secure, "God spoke to them and said to commit suicide" and they did
securing another one of the NSA's great experiments in mind control and
social pathology.
5. A friend of mine, David Sautter and I
worked at
Singer, Kearfott Division, producing government weapons where we
worked
under a multitier security system; Company Security, FBI, DIA, and at
the
top of the ladder watching the watchers; the NSA. I discussed the
NSA's technology with Dave and a few months later, I heard he had
committed
suicide inside of a locked room. This theme should familiar by now and
the details of the case will be destroyed or rewritten by NSA
influences
to preserve national security.
7. The cases of NSA activities go on
and on. With access to the FBI's Crime Information Center (CIC), we could
find several thousand files having the characteristic patterns where the
NSA had experimented on the individuals with their "Thought Control"
technology.
8. Currently, the NSA has many subjects in the
field (our
society) that need only a series of "triggers" (carefully constructed
posthypnotic scripts) to send them over the edge and on a mission to
kill. The NSA calls them "Shooters on a Shelf". A recent example was Russell Eugene
Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia,
had
delusions that he had an affiliation with the CIA or FBI and thought a
radio-tracking device was planted in his tooth. He was a product of NSA
brainwashing. He did not have the ability to recognize the advanced
technology even though he knew that "someone" (CIA, FBI, etc.) was
communicating with him and that this communication ability spanned across
the USA leading him to believe that he had a tracking device planted on
him. Because of the real effects of the NSA hypnosis treatments, he
therefore reasoned that the schizophrenia medication would not help and so
he quit taking it. This was a man desperately trying to alleviate the
suffering the NSA inflicted on him.
9. Through the years, I have
met thousands of people that have been brainwashed into Christianity to a
level where God tells them what to do in their minds (described as a
gentle voice by victims) and they mindlessly obey. Yes, they have "Friends
inside their heads" also. It appears the Biblical Anti-Christ in the Book
of Revelations has arrived and is convincing many subjects that Jesus is
back on earth and directing them.
8. NSA BEHAVIORAL MODIFICATION
PROCEDURE:
1. The following procedural outline documents typical
techniques, processes, explanations, and definitions of the National
Security Agency's Behavioral Modification Procedure using Subliminal
Implanted Posthypnotic Suggestions through acoustically delivered
phonetically edited language elements combined into scripts without
somnambulistic preparation in the subject.
2. In simpler terms,
the subject is unknowingly given hypnosis while the subject is completely
awake and is tortured and punished with this hypnosis into a predetermined
behavior by the National Security Agency. The behavior is usually
extremely religious, is called "reborn" by the church, with the subject's
life-long goal of "a personal relationship with Jesus Christ".
1.
ABSTRACT, Behavioral Modification:
1. The NSA's
behavioral
modification process starts with identification and qualification of
the
subject. The NSA used to choose subjects based on the subject's net
present value to the agency in public visibility, financial resources,
political clout, or other intelligence and counter-intelligence
reasons.
Additional considerations are given to minimizing security risks of
exposure, the subject's posthypnotic suggestibility index, the
subject's intelligence and reasoning ability, moral and superstitious
beliefs,
and the subject's social status and the weakness of the subject's
primary support groups (family). Now a recent report referenced in
the
March 26th Business section of the Orange County Register from the
National Sleep Foundation reports that 40% of Americans are
experiencing
sleeping problems. This news could indicate that the NSA is broadening
its
influence to the greater public. As explained below in this document,
the
NSA always starts its behavioral modification process with REM
Deprivation.
2. After selection, the subject is subjected to long
periods of REM Sleep Deprivation and reinforced torturing posthypnotic
suggestions that will breakdown the subject's will, confidence,
self-reliance, and moral values. Meanwhile, the subject is increasingly
isolated from their familiar and trusted peer groups causing the subject
to experience depression, apathy, and ultimately social and financial failure.
3.
Typical post-hypnotic induced delusions reported by
subjects are tingling in various areas of the body, which are thought
to
be resulting from microwave beams. Hearing ticks thumps or cracks from
walls, ceilings, clocks, lights, etc. Beliefs that the subject's
neighbors are conspiring against them, or that the subject is being
followed. Sometimes subjects believe that the various perceptions,
feelings and experiences are the result of "Implants" in their body.
It is important for the subjects to understand that the NSA controls
this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject's
experiences.
Nobody has the time or inclination to follow a subject around with a
microwave gun to tickle various parts of the body. We are saturated with
microwaves all the time from television stations, communication
satellites, etc and yet we do not have any symptoms because microwaves do
not have the ability to trigger localized synaptic responses in our
brains. Furthermore, when the subject is in a room surrounded by several
people, and the subject is the only one experiencing the "thoughts",
tingling feelings, etc., then obviously a delivery method is being
employed that affects only the subject; high-speed acoustic delivered
hypnosis.
4. After a while, the subject has an
emotional breakdown and
a new support group is built around the subject. The new support group
is typically a church with doctrines centered in the Bible but the NSA
also uses cults and other social groups. The NSA prefers Christian
churches because the doctrines allow "God or Jesus to speak directly
to the subject" and the negative reinforcement can be attributed with
Satan and the positive rewards can be considered to be blessings from
God thereby masking the NSA's technology and processes. When the NSA
uses other relationships without in which the subject experiences a
religious awakening and "Gives their Life to Christ" and the NSA
achieves total control of the subject.
5. The subject is slowly
released from the damaging uncomfortable hypnosis and it is replaced with
positive rewarding hypnosis as "God and Jesus works in their life". Soon,
the subject has complete loyalty to Jesus (AKA: NSA) and will do anything
on command from Jesus (NSA).
6. The subject is required to give
daily status reports in the form of prayers in the privacy of their home,
office, or car where the NSA's electronic surveillance system captures and
sorts the prayers by "Keywords". The NSA then delivers additional hypnosis
in the form of punishments or rewards or directs the subject accordingly
to "God's will". If the subject resist's the NSA's instructions, additional punishments are inflicted on the subject.
7. The
subject is institutionalized in this system where any nonconformances
committed by the subject are watched, critiqued, and reported on through
prayer by other "Christians" to the NSA. Thus, the new church peer group
acts as a behavioral reinforcing mechanism that will bring any of the
subject's problems to the NSA as they have been trained themselves (this
is similar to the Nazi Gestapo of World War 2 and other communist
approaches).
8. A subject that has successfully
completed the NSA's
behavioral modification program lives out the rest of their mediocre
life
in service to Jesus (NSA) and never causes any waves in the church or
news media for fear of reprisal from the NSA. The subject's lives are
relatively unproductive because their focus is on their "Life after
death" and not what they accomplish while they are alive. They avoid
"worldly activities", and usually are confused and disjointed in
rational thoughts and concepts. For instance, they don't believe in
anything that is not in the Bible, i.e. dinosaurs, evolution, space
travel, even though they ride on airplanes and watch television both
of which are not referenced in the Bible.
3. BEHAVIORAL
MODIFICATION PROCESS:
1. Triggering Techniques:
1. The NSA
minimizes security subject might recognize when the NSA was not actively
watching causing a security concern and it would be cost prohibitive to
baby-sit the subject 24 hours a day.
2. Behavioral modification
generally occurs fastest when using negative reinforcement continuously.
It is not practical or economical to watch a subject continuously to apply
real time deliveries. Additionally, using all three script delivery
patterns confuses the subject, causes the subject to believe they are
always being watched, and maximizes behavioral change over time though continuous pressure.
2. Real-Time Subconscious Implant Delivery:
1. Real-time means that the NSA ODO is transmitting
the posthypnotic
command script to the subject and observing the subject's response.
This technique is required for subliminal interrogations. All NSA
standard posthypnotic command scripts can be delivered real-time. This
form of delivery can precipitate the perception of a "voice" heard in
the
mind of a subject to give them information (true or false) or orders
depending on the purpose of the NSA's activities.
3. Prescheduled
Subconscious Implant Delivery:
The NSA central switching computer can
transmit a script to a specified subject at a pre-specified time. The
transmitted script's transmission range can be limited to a single
building, a city, or a large geographical area (i.e. North America or
Europe). By having prescheduled scripts, the subject has seemingly
randomly occurring thoughts and feelings that can't be associated with a
commonly recurring situation like event-triggered scripts precipitate.
4. Event-Triggered (conditional) Implant Delivery:
1.
Posthypnotic subconscious implants that are triggered (activated) with an
event, thought, or code word (event-triggered or conditional) are strongly
experienced by the subject and are powerful tools for reinforcing a
predetermined desired behavior and inflicting delusions.
2. This
type of posthypnotic commands are the ones most commonly used by
hypnotherapists to help people quit smoking, study better, or in general,
change behavior (behavioral modification). There is extensive information
on the Internet and college libraries about this form of posthypnotic
command delivery and how to "script" and use them.
3. The NSA
can
reinforce a predetermined desired behavior by associating a
subconscious
implant (negative or positive reinforcement) with an event. An example
is
that when the NSA want's to isolate the subject from the company of a
specific person place or thing, the subject will be implanted with a
feeling of increased anxiety, hostility, tension, simple discomfort,
or a
feeling of a lack of peace. When the subject leaves the person, place,
or
thing, another posthypnotic implant is triggered that rewards the
subject's behavior with a feeling of relief from the anxiety,
hostility, tension, discomfort, and peace is restored in the subject's
mind.
Example: This script will always cause a girl or boy not to sleep
with
the opposite sex: "You will feel very tense and not be able to relax if
you kiss, sleep with, or stay long at your (boy or girl) friend's house
and you will feel a deep peace when you leave their house to go back
home". These types of scripts left unmanaged and not removed can cause
great harm as the subject develops and social conditions and behaviors
change over time.
4. It should be noted that the NSA precisely
tailors
the type of negative and/or positive reinforcement, the degree of the
reinforcement, the duration of the reinforcing effect and the
conditions of the trigger. This posthypnotic event-triggered
reinforcement can be initiated gradually and can remain so subtle
that
the subject believes that the discomfort is naturally occurring and
that
it is the subject's decision uninfluenced by anyone else that the
subject
should avoid the person, place or thing.
5. This subconscious
implant
can be combined with other implants like a posthypnotic-triggered
thought
to enhance the subject's decision toward the situation. For example
the
subject can be subconsciously implanted with a command to be very
sensitive to the changes in their feelings and to feel great about
making
strong decisions to take charge of their lives. This can be reinforced
with another posthypnotic suggestion to avoid all the situations that
cause the subject discomfort and that each time the subject commits
himself/herself to removing a situation of this kind in their lives,
they will feel an increasing control over their lives. Note that as
the subject perceives an increasing control over their lives they are
actually losing control to the NSA proportionately. Numerous other
examples exist and it is beyond the scope of this document to
document
every possibility.
5. Stage 1 (Prescreen Evaluation):
1. The
subject's Posthypnotic Suggestibility Index is determined by a series of
simple tests. Hypnoamnesia is applied to the subject for the name of an
object or individual and the subject's speed is timed to determine how
quickly they can overcome or not overcome the posthypnotic suggestion "You
will not be able to remember the name of "____" no matter how hard you
try. Other posthypnotic suggestions can be used to create fear or
discomfort in the subject that can be remedied by flight or movement. The
subject must overcome a posthypnotic suggestion that they cannot move no
matter how hard they try. In summary, a posthypnotic suggestion is given
to the subject and the subject's ability to overcome it is evaluated.
2. A full study of the subject's religious, superstitions,
fears, and insecurities is made through standard subliminal
interrogation
techniques and behavioral observation.
3. Interrogation scenarios
are presented to the subject using standard subliminal interrogation
techniques and somnambulistic interrogation techniques. The standard two
types of scenarios are "Open-ended Questions" (similar to multiple choice
with response labels pre-assigned to each choice) or "Reject if
Disagreeable" (negative response label if the subject disagrees). More
advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.
4. Real-time observation,
standard subliminal interrogation techniques and somnambulistic
interrogation techniques are used to determine the subject's overall
social status, abilities, attitudes, and communication skills with primary
support groups and friends.
5. Scientific understanding and
practical
applications experience in the fields of psychology, hypnosis, and
problem
analysis are considered risks in the subject that may complicate or
inhibit subsequent behavioral modification processes. Once the subject
identifies the technology used it is nearly impossible to contain the
potential security breach without terminating the subject. Most NSA
initiated executions (suicides) are the result of the subject
identifying the technology used or carelessness on the part of the ODO
managing the file.
6. The NSA technology affords powerful
control over
the subject, the subject's environment, and the subject's ability to
plan
and implement a disclosure to appropriate Government Agencies. When
the subject finally does achieve a disclosure, the subject's physical
and
mental condition is depleted. The subject's ability to communicate
concisely has been arrested, and the subject has already been set up
and dishonored in the sight of local and federal law enforcement
agencies to assure the subject's testimony is questionable and
unsubstantiated. Where the NSA feels that these steps cannot be
achieved in medium risk subjects, the NSA will not recruit the
subject
into the behavioral modification process.
6. Stage 2 (Standard
Process):
1. This stage is where most subjects are
behaviorally
modified to serve and follow "God" (AKA NSA management of the
subject's
civil rights). If the subject accepts religion and direction at this
stage the NSA reinforces the subject's relationship with Jesus and
closes
the file. This shortened program receives the maximum return for the
NSA for the least investment and minimizes the security risk. It also
causes the least amount of damage and institutionalization in the
subject.
2. Coincidence:
1. Coincidence is used to create
the perception in the subject that supernatural events are beginning in
the subject's life. A combination of posthypnotic commands and
pre-information awarded to the subject prior to an upcoming experience
that the NSA intelligence system has discovered gives the subject a
feeling that "God" or some other supernatural being is taken interest in
their life.
2. The following is one typical technique used by
the NSA.
NSA Intelligence gathers information regarding the topic of the sermon
in the subject's church. This information is gathered through
electronic
surveillance equipment installed in the church. The NSA then implants a
posthypnotic command that triggers the subject's mind into concern
and contemplation about the sermon's topic prior to going to church.
When the subject hears the sermon, the sermon seems to be speaking
directly to the subject that adds to God's mysterious and
unexplainable ability to address the innermost concerns of the
subject, especially when the subject has not shared those concerns
with any other human being.
3. Another typical method used by
NSA
concerns tragic events occurring to loved ones. NSA Intelligence
receives
a local broadcast or preliminary information through electronic
surveillance that a subject's relative has been injured or killed. The
subject is given a posthypnotic suggestion that a feeling of dread or
loss
is welling up inside them and they are directed to think of that
particular loved one. When they are finally notified through official
channels, the subject believes that they have special powers,
insights, or communications from God, aliens, or other entities.
3. REM Sleep
Deprivation:
1. The Rapid Eye Movement (REM) stage of
sleep is
controlled and usually limited to one to two cycles per night
resulting in
micro-sleeps during the day. REM deprivation inhibits short-term
memory, concentration, tactile abilities, verbal articulation,
reasoning, and
self will. Protein synthesis is inhibited and thereby reduces the
subject's ability to heal after physical damage or after periods of
extensive exercise. The result is that the subject's general health
degrades as does social bonds and work/school performance.
2. The
NSA performs control of REM Sleep through various methods. Posthypnotic
implants can be implanted that place a subject in a light sleep
(posthypnotic trance) with various combinations of muscular tension and
computer cycling implant deliveries (to be
discussed later).
3.
Subjects typically complain of no sleep, restless sleep, waking up every
hour on the hour, staying awake until the hour they have to get up, waking
up an hour after they retire and not returning to sleep, and typically
cannot recall any dreams. Additionally, they will complain of repeating
torturing thoughts, racing thoughts, and facial itching and numbness.
Daily fatigue, poor recall of names, and caffeine consumption is typical.
4. Dark rings' surrounding the eyes is evident and the
darkened area around the eyes can be reported as sore or tender by the
subject. The
subtle perceptual impairing effects of REM deprivation make it more
difficult for the subject to identify the REM Deprivation problem.
When the REM depravation onslaught is gradual and accompanied by a
posthypnotic command that the subject "will feel energetic and
rested", the subject will not recognize the REM Deprivation.
Additional posthypnotic commands can be implanted that will make it
difficult for the subject to "see or perceive" the rings surrounding
their eyes. I have seen many subjects with very dark eye rings and
the
subjects could not recognize them at all.
4. Shame Factor
Enhancement:
1. Various posthypnotic suggestions are
implanted in the
subject after a week or so long period of REM deprivation. The content
of
the posthypnotic scripts is constructed to cause the subject to
perform embarrassing and otherwise shameful acts (usually sexual but
always
anti-social). These shameful behaviors are used by the NSA later to
shame the person into a lower self esteem, reduced confidence in
their
own self discipline, a need for forgiveness from God. These
embarrassments
provide a means to Blackmail or discredit the subject if the NSA is
detected and otherwise threatened by the subject.
2. The NSA will
always use another law enforcement agency to document the behavioral
discrepancy to retain anonymity. The NSA has been known to help subjects
avoid prosecution to gain loyalty or create an adversarial relationship
between the acting agency and the subject (another intimidation factor)
even though the NSA was responsible for creating the behavioral problem in
the subject's life.
5. Religious Relevance and Convictions:
1.
The NSA typically implants posthypnotic suggestions that are clearly
referenced in the Bible. The subject may be punished (through negative
reinforcement) by anything that is referenced in the Bible to substantiate
the validity of the "Word of God". When the NSA does not follow the
standard Biblical references, most subjects fail to recognize the
contradictions out of ignorance or an inability to rationalize, or, they
find other ways to justify the events to receive peace from God (NSA).
This component of the NSA process is to provide the subject with an
increased sense of fear and intimidation resulting from God's presence and
force. "Thou shall not disobey God".
6. Paranoia:
1.
Paranoia is a powerful tool used by the NSA. It provides a means to
develop the subject's distrust of other people including the subject's
primary group that could provide positive support during this time of
distress in the subject's life. Paranoia is often recognized and
discounted as a character fault by most peoples in American society and
therefore discredits the subject's testimony even further. Uninformed, but
well wishing people including friends, may recommend to the subject to
pursue counseling. This negative feedback can make the subject fear that
people will believe the subject is crazy.
2. When the subject
seeks professional counseling, the result will be a misdiagnosis with
an
expensive, inappropriate and ineffective treatment. The observed
symptoms
result from simply hypnosis, not biological, chemical, or
environmental
stresses. A misdiagnosis strongly motivates the subject not to
communicate
their experiences to others to avoid social disgrace of a
"schizophrenia"
label and additional financial burden. This isolation of the subject
and
their reluctance to communicate their experience to others reduces NSA
security risk. The NSA cannot allow the subject to share information
with other subjects that have already experienced the program and
thereby starting a pool of information that could be compiled and
used
to expose the NSA system.
3. The subject is led to believe
that the
subject's neighbors, work associates and/or family are conspiring
against
the subject through a number of scripts delivered to the subject by
the
NSA. The NSA can further complicate the conspiracy delusion by using
the
same technology to have a work associate ask the subject a question or
to make a comment that can be used by the NSA to confirm the subjects
fears. This technique further isolates the subject from trusting their
peer groups, causes additional emotional distress and hostility toward
these people. The subject sometimes resorts to violent behavior, which
is
viewed by observers as irrational, unprovoked behavior that may be
treated
as criminal behavior by law enforcement
personnel.
7. Stage 3
(Extreme Process):
1. This method is very severe and
usually results
in a two to five year program. Because of the severity of the
suffering,
the subject is usually permanently impaired for integration into
normal mainstream life and is essentially institutionalized. The result
is
that the subject must reside in a less competitive environment like a
church group. Subjects that receive this program tend to be highly
superstitious, are agitated easily when objective evidence that
contradicts their belief system is presented. They tend to believe in
the spiritual world (demons, ghosts, god, spiritual entities, etc) and
consider the spiritual world to be more powerful and important than
the
material or real world. This program basically follows the following
steps; REM deprivation, breakdown of self esteem and confidence,
intense
suffering, exaggerated conscience, spiritual contact, reborn in Jesus
Christ, Spiritual battle, release (saved by the Savior), and
recovering
(blessed by Jesus Christ). Whenever possible the NSA will skip or
reduce
these steps to minimize security risk and financial cost.
2.
Increasing Dependence on Drugs and Alcohol:
1. As the
REM Deprivation
increases the subject must depend on Central Nervous System (CNS)
Stimulants to compensate for degradation of productivity at work,
school,
and in interpersonal relationships. This serves the NSA in several
ways.
Use of drugs (especially CNS stimulants) increases the subject's index
of
suggestibility. Or in other words, the post hypnotic commands are more
effective and the subject has greater difficulty resisting the
impulses
generated by the commands. In addition, the increased stress of coping
with the drugs in conjunction with the resisting the newly introduced
posthypnotic commands serves to push the subject closer to an
emotional breakdown. If the subject uses illegal drugs, the NSA tries
to set the subject up for a conviction to get assure that the subject
looses credibility. Who would believe a drug user that claimed that
he/she was being harassed by a government agency that was tormenting
them with hypnosis? It also serves the NSA in the program by
documenting something that the subject will be ashamed of when the
program reaches the exaggerated conscience stage.
2. Alcohol,
sleeping pills and other medications also inhibit REM Stage sleep and
increase irritability over time thereby further degrading and isolating
the subject.
3. In summary, the NSA benefits from the subject
responding to the REM Deprivation assault with self-medication. This
response discredits the subject by labeling them in society as a drug
user, it enhances the effect of the implanted posthypnotic commands
and it gives the subject a reason for shame that will be used against
the
subject later to justify the punishment from "God". It should be noted
that the subject is not really guilty of anything, except being a
victim
that was manipulated in a carefully controlled scientific behavior
modification process.
3. Poor Nutrition:
1. The poor nutrition
reduces the energy the subject has and serves later as another
justification of God's punishment. The subject will be taught later that
"the body is the temple" and that to abuse it is to violate God's will.
4. Apathy:
1. After
the subject's self-esteem is broken down
and continuing failure and persistent suffering start to dominate
every
day, the individual becomes apathetic as a defense mechanism. At this
stage the subject has committed another sin of "not persevering
through faith" which is later used on the subject later to increase a
feeling
of guilt.
5. Depression:
1. Depression precipitates as a
result of chronic REM Sleep Deprivation, social isolation and a feeling of
helplessness in the subject. Commonly, when the subject seeks professional
counseling, they are misdiagnosed and treated for depression with
medications but the root cause of the problem (negative reinforcing
posthypnotic suggestions inflicted over long periods of time) is not
treated or corrected.
6. Insecurity:
1. The subject starts
to experience severe insecurity in this stage. The NSA uses this
insecurity against the subject in several ways. Because of the impaired
reasoning ability and emotional isolation, the subject is susceptible to
the approaches of insincere people, which are used by the NSA to
emotionally hurt the subject more. This allows the NSA to convince the
subject that people can't be trusted and that only the NSA (Jesus) can be
trusted. This serves to isolate the subject from supportive peer groups
and makes the subject emotionally dependent on the NSA resulting in the
NSA gaining more power in the subject's life.
7. Journals and
Diaries:
1. Most of the subjects are directed to keep a
"Journal" or
diary by the NSA so that the subject can record and review feelings,
events, observations, and "God's directions" that normally would be
unavailable due to short term memory loss during extended periods of
REM Deprivation. The NSA uses the Subject's Journals in a variety of
ways.
8. Degrading Spelling and Grammatical Performance:
1.
Subjects in these prolonged stages of REM deprivation, confusion, and
emotional distress, have very poor grammar, spelling, and short attention spans.
9. Slowed Speech:
1. Subjects experience slower
speech and have a greater time articulating concise points as a result of
the REM Deprivation and other performance degrading posthypnotic commands.
Very slight alcohol consumption can exasperate the damage of REM
Deprivation and precipitate slurred speech.
10. Confusion:
1. Confusion results from three primary sources; REM
Deprivation,
specific posthypnotic commands to reinforce the confusion, and the
emotional damage and stress that is being inflicted. The confusion
allows the NSA to continuously inflict damage to the subject's life
without real-time observation. A confused person generally is not as
productive as an organized clear thinker is and has a greater
potential to offend people by what they say or do and is less likely
to recognize when they have made mistakes. All of these symptoms
assist the NSA's objectives in this stage and subsequent stages. In
addition, the confusion restricts the individual from analyzing the
source of their suffering and taking corrective actions, and
therefore
reduces the NSA's security risk.
11. Poor Concentration:
1.
Difficulty concentrating impairs the subject's productivity and restrains
the subject from making self-improvements and corrections in behavior. It
makes it very difficult for the subject to do any research or reading to
evaluate his/her condition. This paves the way for the NSA to demonstrate
that the subject cannot do anything on their own without "God", thereby
increasing the frustration and anxiety of the subject (inducing emotional
breakdown) and ultimately making the subject totally dependant on the will
of God.
12. Loose Association and Personality Disorders:
1.
The subject experiences disjointed thought at this stage (Loose
Association) that appears to observers as a strange sense of humor or
inappropriate responses when engaging in conversations. Ongoing
sarcasm and other negative attitudes and undesirable personality
traits can be present.
13. Anger:
1.
The way that the
subject experiences anger is of profound importance. If the subject
allows
the NSA to redirect the increasing anger and hostilities toward the
NSA to
another person in the form of violence (misplaced aggression), the NSA
will reinforce the violent behavior with posthypnotic commands. The
result
is a person that can achieve national acclaim as a murderer that heard
voices of Satan directing him/her. Typically, the Subject is
encouraged to
commit acts of violence with spouses, friends, or employers resulting
in further social isolation and increased shame. Some examples of NSA
directed victims of misplaced aggression include recent US Postal
Workers whom work within the Postal Service. This is one of the vial
"communication intercept" channels the NSA is directed to monitor. The
routes of suspect mail and the postal worker processing it are
continuously monitored by NSA. Sometimes the NSA ODO takes issue with
a Postal Worker and harasses them or subjects the postal worker to
behavioral modification.
14. Delusions:
1. Delusions are
used to discredit the witness and also provide an additional source for
fear, intimidation and confusion. Delusions can be but are not limited to
the Subject developing conspiracy theories of fellow employees and
friends, beliefs that Angels or Demons are communicating or visiting them,
tingling sensations from microwave guns or implants, beliefs in
supernatural events, etc.
15. Audio Hallucinations:
1.
Subjects often report hearing walls clicking, footsteps in the house, the
sound of someone trying to open the door, drilling at the door, etc.
2. These audio hallucinations are also used to discredit the
witness and also provide an additional source for paranoia, fear, and
negative
reinforcement.
16. Voices in the Subject's Mind:
1. The voices
in the subject's mind are achieved in a variety of ways using real-time
and prescheduled posthypnotic suggestion deliveries, and Noun Substitution
implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion implanted
that changes the form of pronouns in the subject's internal thinking.
The
result is the subject perceives that someone is telling him/her to do
something with nearly every thought. An example is; the subject
thinks, "I should go to church today". With the noun substitution
posthypnotic suggestion the subject experiences the following
internal
thought, "You should go to church today!"
Notice that by implanting the
posthypnotic command into the subject's subconscious mind to think the
pronoun "You" instead of "I" the subject will perceive that they are being
directed by a voice even though the majority of the internal thought
content is their own naturally occurring thought. This subconscious
implant can be used in combination with other implants to increase the
subject's perception of threat, fear, and therefore paranoia. It can be
used with other posthypnotic suggestion implants that will give the
subject the perception of either a "good" or "evil" voice or spirit is
directing him/her.
This implant is powerful because it
gives the subject
the perception that the spirit, angel, God or Holy Spirit knows and
directs the subject's every thought. It provides a convincing proof
that "God knows every thought of his children". Subjects that don't
have a superstitious frame of reference and seek professional help
are
usually misdiagnosed as schizophrenic.
17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed
by the NSA and
typically has no pharmacological or biochemical basis and is produced
by a posthypnotic suggestion. It is often misdiagnosed as ringing
caused by excessive aspirin use and is actually an audio hallucination
triggered by hypnosis.
18. Complete Quiet Silence:
1. Used by
the NSA as a positive reinforcement for two general reasons; the subject
has the tinnitus removed to indicate that the subject has "The Lord's
Peace Restored", and secondly, the subject has achieved a milestone toward
being released by God (the NSA).
19. Quiet Wind:
1. The audio
hallucination of a quiet wind is used to convince the subject that the
Holy Spirit is visiting him/her. An excellent example of this
hallucination combined with the fear that accompanies it is contained in
Phil Collin's lyrics of a song that has the chorus "I can get so scared,
Listen to the wind".
20. Visual Hallucinations:
1. Visual
hallucinations are usually implanted in the waking moments when a subject
is coming out of or is in a somnambulatory state (light sleep) preferably
in a darkened room. The hallucinations are fleeting, usually lasting less
than one minute and are not durable. Typical hallucinations reported by
subjects are Angels, large spiders, and movement of various shadowy
objects across the ceiling, bright spot of light ahead of the subject,
etc.
2. The television show "Sightings" has had numerous
reports of
people seeing "Aliens" at waking moments. These types of news accounts
create confusion in US society and serve to keep people searching for
the wrong phenomenon thus keeping the NSA's technology secure
(disinformation).
21. Tactile, Olfactory hallucinations and Muscle
Spasms:
1. Tactile hallucinations can be more durable and are used to
communicate a desired direction to the subject typically after a
real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:
1. Temporary sensation of pressure to
the tip of the right index finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or "deception of Satan").
3.
Temporary sensation of pressure to the center of the right palm (symbolizing Jesus "Sitting at the right-hand of God").
4.
Temporary sensation of pressure to the ball of the right foot (symbolizing
"Get on the Ball" or "hurry-up").
5. Temporary sensation of pressure
to the tip of the right foot big toe (symbolizing "Right Direction").
6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing "Fucking-up Direction").
7. Temporary
sensation of pressure to the tip of the left foot big toe (symbolizing
"Wrong Direction").
8. Temporary sensation of pressure to the buttocks
(symbolizing "Bad Attitude" or "subject is acting like an ass").
9. Temporary sensation of pressure on tip of penis or clitoris
(symbolizes immoral thoughts like subject is thinking/acting with his
penis or her clitoris).
10. Temporary sensation of pressure to the
left ear drum (symbolizing "do not listen").
11. Temporary
sensation of pressure to the right ear drum (symbolizing "listen").
12. An involuntary blink of the right or left eye (symbolizing: right eye = God's agreement or left eye = Satan's agreement).
13.
Temporary tingling sensation on the Testicles (symbolizing insufficient
male confidence or "Having no balls or strength").
14. Temporary
tingling on other areas of the body to imply that something invisible
and/or supernatural is touching the subject. May be perceived as
threatening or reassuring to the subject. Can be used to intimidate and
confuse the subject often times combined with additional posthypnotic
implants to inflict delusions like "being attacked with microwaves" or
being caressed by Angels.
15. Muscular spasm or perceived pressures
near the jugular vein on
right side of neck (symbolizing Satan having
subject by Jugular or
throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe pain
on the subject by causing extreme involuntary contraction of the
sphincterin
the anal region or other lower back or leg muscles.
17. Perceived odor
sensation of a thick, sweet smell (symbolizing Satan's sweet victory over
the subject's soul).
9. This section is written in an attempt to
provide interested individuals with some of the considerations and
precautions when seeking to demonstrate the NSA's civil rights abuses by
demonstrating the effectiveness and concepts of subliminal access using
Subliminal Implanted Posthypnotic Suggestions and Scripts Using
Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands
without Somnambulistic Preparation in the Subject.
1. Reverse
engineering of the NSA's technology to prove it's abuses against the
American people is quite difficult. Consider the following.
2. If
the scientists and technicians perform their research in a facility that
the NSA has the standard transceivers installed, and therefore the NSA can
influence the direction of research or the data by effecting perceptual
effects in the researchers.
These perceptual effects can be
confusion,
lack of attention to important details, oversights, bad assumptions,
incorrect interpretation of the test data. These same misperceptions
will
also be incorporated into the research test subjects. The technology
cannot be developed and optimized if the NSA has any access to the
test
subjects. The test scripts given to the test subject delivered from
the
researcher can be neutralized by the NSA delivering a canceling script
immediately after the researcher's script. The NSA's test script can
also
include a hypnoamnesia script at the end to cancel any residual
perception
in the subject so that the test subject would report no effects and
the researcher would conclude the test script had no effect.
3. The
research must be carried out in a facility secured from all NSA electronic
intrusion. All equipment in the facility must be TEMPEST protected and
electrically isolated from the outside world.
The research personnel and
their subjects must never leave the secured area of the facility so that
they cannot be subliminally interrogated by the NSA. The NSA would take
this opportunity to deliver disinformation scripts to the subject or
researcher. Foodstuffs and supplies would be the logical choice of NSA
intrusion if all other security measures were effective against the NSA.
4. The NSA will exploit all opportunities to introduce
microscopic transceivers into the facility of it's surrounding grounds.
The
minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to
capture response labels during subliminal interrogations. This can be
through
normal illumination or infrared to see through window, or millimeter
wave or other technologies that can see through barriers like walls
and ceilings.
3. Audible response labels can be used if the NSA
has a micro receiver with a micro speaker inside but cannot get a
transmitter in and operating without detection. Sneezes, coughs, clearing
of throat that can be picked up by laser microphones, audible
amplification microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave
technology that will allow visible intrusion into most facilities. The
test
facilities should be deep underground, AKA 1000 feet with no adjacent
access from other facilities, sewer lines, water lines or power
conduits etc.
6. Any facilities existing will have to be debugged
before habitation and research begins.
7. Subjects must be able to
be subjected to traditional hypnosis after facility habitation as a test
prior to research to assure that the NSA has minimal scripts already
implanted.
8. This technology is the highest level of
intelligence
gathering for the USA. The abuses resulting from mismanagement of this
area of the NSA's intelligence system must force Congress to legislate
additional laws to protect the citizens. The NSA must regulate this
system better. The NSA will take all necessary steps without limit to
assure
that this technology is preserved and autonomously under their
control.
10. Conclusion: America's greatest and highest level
intelligence asset is being mismanaged and the mismanagement must be
corrected before all the Enemies of our great country acquire it. Imagine
if China had this technology to use on their defenseless population?
11. May God help us all in protecting the American public and preserving and managing this vital technology's vital potential to
serve America's National Security.
http://www.topica.com/lists/EDD/read/message.html?mid=1601892956
=============================================================================================
From Newshawk:
Mass Mind Control in the
Present-Day U.S. -- The big picture
There are a number of interlocking systems, technologies
and techniques
which are currently being deployed against the citizens of
the United
States of America by certain segments of our national
government.
First, there are literally COUNTLESS mind-control projects
and
sub-projects in operation at this time which target
SPECIFIC
subjects/victims in a variety of ways; using one or more of a
number of
technologies such as drugs, (ritual) psycho-sexual abuse, a vast
panoply
of different EM/RF mind control technologies, repetitive
conditioning,
hypnotic trance induction, and so on and on and
on.
Reliable reports from MANY different sources indicate that as many
as
TEN MILLION individuals many be ACTIVE subjects/victims of these
kinds
of mind control activities, and huge quantities of hard documentation
on
a great many of these projects DOES exist.
However, in addition
to these kinds of mind control operations, there are
ALSO mind control and
mind manipulation activities that target MASSES
of people in large
geographical regions at the same time. Indeed, there
is VERY strong
evidence that the operators of HAARP for example, have
ever since HAARP's
earliest days intended that it be used for, among many
other things, GLOBAL
mind control.
There is in FACT much evidence to show that HAARP is NOW
being used for
just such utterly evil purposes by the United States federal
government.
Of course, there are many other EM/RF technologies and
systems which
are, or may be, applied to mass-scale mind, mood, thought
and
consciousness control/manipulation operations: such as the
nationwide
"GWEN" (Ground Wave Emergency Network) system, certain ELF and
ULF
transmitter systems, and so on (such as your TV set, even IF it's
turned
OFF!)
Another way to manipulate and "regulate" the minds
and consciousness of
a mass of people at a VERY basic, fundamental level is
to CONTROL the
population's PRIMARY sources of INFORMATION. This is one of
the MOST
powerful ways shape the collective consciousness of the public,
and it is
CLEAR that many mass media outlets in the United States are
both
willingly and un-wittingly aiding and abetting the manipulation
of
our minds by the government, and are assisting the FedGov in carrying
out
many social-engineering agendas.
The mass media's treatment of
school shooting incidents, for instance,
plays DIRECTLY and TOTALLY into
the schemes of those who deployed the
mind-controlled killers to carry out
these shootings, in a grand plan to
shut down our Constitution's 2nd
Amendment, among other things.
Moreover, very carefully designed
CONDITIONING programs and tactics have
been brought to bear against nearly
EVERY segment of society;
disseminated throughout the nation and the world
by mass media and
entertainment industries and corporations; and imbedded
in ALL forms of
so-called entertainment at this point, such as movies, TV
shows, video
and computer games ESPECIALLY, some pop music, and so
on.
This condition of constant, relentless bombardment with grotesquely
violent
imagery, which the general population, ESPECIALLY its younger
members, is
inundated with by nearly ALL forms of popular contemporary
entertainment
and sources of "information", is indeed directly derived
from those
mind-conditioning programs and systems developed at Fort Detrick
(and
other similar locations). San Diego shooter Charles Williams'
father
worked at the Army's Fort Detrick facility for THIRTEEN
YEARS.
Specifically, indoctrination/conditioning programs were
developed at
Fort Detrick in which subjects were repeatedly, continually
and
continuously immersed in virtual reality-type video/computer
"games"
of extreme and GRAPHIC brutality, for long stretches of time
and
over an extended time frame.
This kind of psychological assault
proved very effective in rapidly
obliterating subjects' ethical and moral
values and cultural norms with
regard to violence, brutality, killing and
so on.
These systems were perfected, applied to the brainwashing
and
conditioning of members of the U.S. military and also turned over
to
the intelligence sectors for other applications. The intelligence
sector,
in turn, DELIBERATELY and successfully undertook to have this same
kind
of HIGHLY negative, destructive and effective conditioning applied
to
SOCIETY AS A WHOLE, via mass conditioning of our consciousness
through
the entertainment and information industries, as
noted.
One OTHER method of mass mind
control/manipulation/conditioning which is
NOW being utilized MORE and MORE
-- ESPECIALLY against the most
vulnerable members of our society, our
CHILDREN -- is the
highly-reprehensible/questionable and increasingly
common MANDATED
DRUGGING of ever-growing numbers of children through hugely
intrusive,
invasive, ill-advised, psychologically unpredictable and
often
destructive programs mandated, usually for young males, by
psychiatrists
and social workers. More and more of our children are being
dosed on a
long-term basis with any of a number of psychotropic/psychiatric
drugs
like Prozac, Ritalin, Luvox, and so on.
These drugs not ONLY
are PROVEN to induce SEVERE and often VERY VIOLENT
psychotic reactions
among a significant percentage of subjects, but ALSO
clearly and provably
create a stupefied, dumbed-down, zombified mental
state in targeted
subjects which is a PERFECT "ground state" for the
carrying out of yet
OTHER mind control/manipulation/conditioning activities
on these very same
subjects. In general, this kind of psych-drugging makes
the job of further
mind control programming MUCH easier. And this kind of
drugging is being
done to ever-increasing numbers of our children, down to
toddlers as young
as TWO and THREE YEARS OLD!!
Now, there is ANOTHER way in which our
present-day society is being
literally and effectively mind-controlled en
masse.
Most all of the individually-targeted mind control programs we
noted
above use one or more methods to induce a PSYCHOTIC BREAK or
SPLIT
PERSONALITY in the victim/subject. In fact, one or more of
these
deliberately-induced split personalities formed as a result
of
psycho-sexual abuse or other conditioning are those facets of
the
subject's psyche which ARE actually "programmed"; to kill, or
whatever
else. It's been shown that forcing victims/subjects to witness,
experience
or participate in just about any highly-traumatic and shocking
events on a
repeated basis will induce the kind of psychotic break(down)
that is a
necessary prerequisite for intensive mind control
programming/conditioning.
SO: WHEN our society as a whole is FORCED to
confront and WITNESS over
and over and over again something as
FUNDAMENTALLY shocking as having
our young people perpetrating
inconceivably horrific mass murders of
peers and others on A REGULAR BASIS,
as is NOW THE CASE in the
present-day United States, then the population as
a whole AND on an
individual basis to some extent develops an analogous,
similar
psychological break, and in FACT to some extent develops
split
personality/multiple personality disorder conditions... READY
FOR
FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarily
disturbing events which impact society AS A
WHOLE, such as these school
shootings by young people that have just
occurred, ALSO serve the
malignant, demonic agendas of the FedGov/NWO
social controllers who set
these terrible mass killings off; and the
incidents themselves serve to
further condition, manipulate and "mind
control" the population of the
United States in the year 2001.