Category Archives: Psychiatric Reprisal

What is Mind Control / Psychotronic Torture?



BY DEB CHAKRABORTY

 

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically.

Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

Definition of psychotronic (psycho-physical) weapons.


Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control…” This is not only dangerous, this is deadly!”

Actually, the goal of mind control is to access those areas of the brain that are outside of the conscious control of the individual by circumventing the normal inhibiting response of the cerebral cortex: “an individual’s voluntary conscious self-control must be bypassed or short-circuited.” This unconscious coercion is done through electromagnetic-wave bombardment of the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne waves can travel over distances and are known to change the behavior of animals and humans in their path. Such remote control makes possible potentially frightening uses for altering the brain’s functioning. These are invisible and deadly waves. This waves goes directly to the subconscious parts of the human brain for receiving or transcoding the messages and without the person exposed to such influence having a chance to control the information input consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting mind control requires the creation of “profound and deep emotional states.” Recommended are fear, shock and anxiety, which have “an intense disinhibitive effect on the human brain.” What this means, in essence, is that emotional trauma facilitates the accessing of dissociative states. In order to disable the brain’s “cortical block,” Verdier recommends alcohol, euphoric drugs, isolation, solitary confinement, and – “the most dramatic and unique item in the brainwashing arsenal” – hypnosis. All of these are methods that have been extensively tested by the CIA under the rubric of the MK-ULTRA program.

The technology is rooted in surveillance devices, such as audio and video bugs, through-the-wall and remote sensing devices, and biosensors both remote and implanted.  This provides the feedback for the influencing, as well as any “entertainment” value for voyeur/sadists and intellectual property theft for thieves.  Coupled with the surveillance is some sort of “effectors” or feedback path for influencing an individual.

Thus there are several categories of mind control operations, for example covert drugging, hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks, and ongoing feedback control setups for long-term torture and exploitation of victims, to mention a few.  What they have in common is the attack against the mind of the victim, as well as the deniable and denied nature of the attack.  The exact means being used in any particular case are beside the point here.  These techniques do not just violate one or two of what everyone knows are fundamental human rights:  In one fell swoop they violate almost every fundamental human right a person has.

The electromagnetic technology works on the theory that the mind and body are an electromagnetically mediated biophysics system and the electromagnetic signals form outside sources can mimic the mind and body’s electromagnetic signals and therefore a weapon can be developed based on these principles.

There is evidence that since the 1950’s the U.S. and other government have been developing electromagnetic weapons which can remotely target the electromagnetic system of the human body for military and intelligence purposes.

The First phase is the harassment/surveillance program


During the first phase of this Govt. program a person is broken physically and mentally. The methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them. All privacy and constitutional rights are thus stripped away.

The second phase is the assaults of Directed Energy Weapons.


After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing the pain and no one is touching them. It is an invisible energy force. Along with drugs being administered by the scientist through either a drip system which!has been inserted into an individual, food tampering, or injection all without the victims permission. Then Mind Entrainment begins.

Directed Energy Weapons


Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce “considerable agitation and muscular activity” or “induce muscular weakness and lethargy” this weapon is know as Ultra High Frequency EM.

Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. For the sake of those who came before us, and those who come after us, the world needs to know what is happening.

For many people, this comes out of nowhere. They don’t know whose toes they stepped on in order to warrant such a brutal attack. For others who are whistleblowers, they know full well how they garnered such attention. For some, they don’t even realize that they are the targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that something unspeakable and devastating is happening.

What makes this crime so heinous is that the most sophisticated techniques of psychological warfare are employed against a person in order to make them look like they are crazy. Friends and family members don’t believe the things that are happening and often believe the targeted person is crazy.

This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking part of it, which targets experience to varying degrees. This involves stalking by a multitude of individuals both on foot and while you’re in the car. Known as “street theatre” by those who experience it, it involves vandalism to house, car and personal property. Gang stalking can also be referred to as cause stalking, vengeance stalking and multi-stalking.

Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one’s mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. It is so distressing that only fellow targets can really understand what another target is experiencing.

In either case, the attacks are so well orchestrated that only the victim is aware of them. This is intentional, and it appears that these groups have perfected these techniques over many years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do, since new targets are completely bewildered as to what is happening to them, having never heard a peep out of the media about such occurrences (except in relation to mental illness). Their actions are based on many of the same tactics as those employed in ritual abuse, and are designed to weaken the target’s mind and perpetrators are becoming increasingly addicted to this game of predator/prey, always needing more targets to satisfy their unending thirst for a thrill.

“Electronic harassment” or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common. In general, this term refers to the use of electronic technology to view, track and/or harass a person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by neighbors) is largely personal opinion. There is no definitive proof that would allow any of the present victims to launch a court case, but the numbers of victims and the commonality of experience speaks for itself.

The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. With the rapid increase in cell phone usage, many experiments have been conducted on the detrimental effects of those particular frequencies on animals. The results indicate that the invisible e.m. signals from cell towers can cause a wide range of physical ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is even more likely the case with the frequencies which may be used to cause direct, intentional harm to a person.

Electronic harassment is sometimes referred to as “psychotronics”, but would more accurately be described as “criminal psychotronics”.

Types of Weapons:

Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons

Soft Kill Weapons
Less-Than-Lethal Weapons

Psychological Warfare ( Manipulation)

PSYCHOLOGICAL MANIPULATION

Psychological manipulation is a type of social influence that aims to change the perception or behavior of others through underhanded, deceptive, or even abusive tactics. By advancing the interests of the manipulator, often at the other’s expense, such methods could be considered exploitative, abusive, devious, and deceptive.

Social influence is not necessarily negative. For example, doctors can try to persuade patients to change unhealthy habits. Social influence is generally perceived to be harmless when it respects the right of the influenced to accept or reject it, and is not unduly coercive. Depending on the context and motivations, social influence may constitute underhanded manipulation.

REQUIREMENTS FOR SUCCESSFUL MANIPULATION

According to George K. Simon, successful psychological manipulation primarily involves the manipulator:

-          concealing aggressive intentions and behaviors.

-          knowing the psychological vulnerabilities of the victim to determine what tactics are likely to be the most effective.

-          having a sufficient level of ruthlessness to have no qualms about causing harm to the victim if necessary.

Consequently the manipulation is likely to be covert (relational aggressive or passive aggressive).

HOW MANIPULATORS CONTROL THEIR VICTIMS

According to Braiker

Braiker identified the following basic ways that manipulators control their victims:

-          positive reinforcement – includes praise, superficial charm, superficial sympathy (crocodile tears), excessive apologizing; money, approval, gifts; attention, facial expressions such as a forced laugh or smile; public recognition.

-          negative reinforcement – includes nagging, yelling, the silent treatment, intimidation, threats, swearing, emotional blackmail, the guilt trap, sulking, crying, and playing the victim.

-          intermittent or partial reinforcement – Partial or intermittent negative reinforcement can create an effective climate of fear and doubt. Partial or intermittent positive reinforcement can encourage the victim to persist – for example in most forms of gambling, the gambler is likely to win now and again but still lose money overall.

-          Punishment

-          traumatic one-trial learning – using verbal abuse, explosive anger, or other intimidating behavior to establish dominance or superiority; even one incident of such behavior can condition or train victims to avoid upsetting, confronting or contradicting the manipulator.

According to Simon

Simon identified the following manipulative techniques:

Lying: It is hard to tell if somebody is lying at the time they do it although often the truth may be apparent later when it is too late. One way to minimize the chances of being lied to is to understand that some personality types (particularly psychopaths) are experts at the art of lying and cheating, doing it frequently, and often in subtle ways.

Lying by omission: This is a very subtle form of lying by withholding a significant amount of the truth. This technique is also used in propaganda.

Denial: Manipulator refuses to admit that he or she has done something wrong.

Rationalization: An excuse made by the manipulator for inappropriate behavior. Rationalization is closely related to spin.

Minimization: This is a type of denial coupled with rationalization. The manipulator asserts that his or her behavior is not as harmful or irresponsible as someone else was suggesting, for example saying that a taunt or insult was only a joke.

Selective inattention or selective attention: Manipulator refuses to pay attention to anything that may distract from his or her agenda, saying things like “I don’t want to hear it”.

Diversion: Manipulator not giving a straight answer to a straight question and instead being diversionary, steering the conversation onto another topic.

Evasion: Similar to diversion but giving irrelevant, rambling, vague responses, weasel words.

Covert intimidation: Manipulator throwing the victim onto the defensive by using veiled (subtle, indirect or implied) threats.

Guilt tripping: A special kind of intimidation tactic. A manipulator suggests to the conscientious victim that he or she does not care enough, is too selfish or has it easy. This usually results in the victim feeling bad, keeping them in a self-doubting, anxious and submissive position.

Shaming: Manipulator uses sarcasm and put-downs to increase fear and self-doubt in the victim. Manipulators use this tactic to make others feel unworthy and therefore defer to them. Shaming tactics can be very subtle such as a fierce look or glance, unpleasant tone of voice, rhetorical comments, subtle sarcasm. Manipulators can make one feel ashamed for even daring to challenge them. It is an effective way to foster a sense of inadequacy in the victim.

Playing the victim role (“poor me”): Manipulator portrays him- or herself as a victim of circumstance or of someone else’s behavior in order to gain pity, sympathy or evoke compassion and thereby get something from another. Caring and conscientious people cannot stand to see anyone suffering and the manipulator often finds it easy to play on sympathy to get cooperation.

Vilifying the victim: More than any other, this tactic is a powerful means of putting the victim on the defensive while simultaneously masking the aggressive intent of the manipulator.

Playing the servant role: Cloaking a self-serving agenda in guise of a service to a more noble cause, for example saying he is acting in a certain way for “obedience” and “service” to God or a similar authority figure.

Seduction: Manipulator uses charm, praise, flattery or overtly supporting others in order to get them to lower their defenses and give their trust and loyalty to him or her.

Projecting the blame (blaming others): Manipulator scapegoats in often subtle, hard to detect ways.

Feigning innocence: Manipulator tries to suggest that any harm done was unintentional or did not do something that they were accused of. Manipulator may put on a look of surprise or indignation. This tactic makes the victim question his or her own judgment and possibly his own sanity.

Feigning confusion: Manipulator tries to play dumb by pretending he or she does not know what you are talking about or is confused about an important issue brought to his attention.

Brandishing anger: Manipulator uses anger to brandish sufficient emotional intensity and rage to shock the victim into submission. The manipulator is not actually angry, he or she just puts on an act. He just wants what he wants and gets “angry” when denied.

VULNERABILITIES EXPLOITED BY MANIPULATORS

According to Braiker manipulators exploit the following vulnerabilities (buttons) that may exist in victims:

  • the “disease to please”
  • addiction to earning the approval and acceptance of others
  • Emotophobia (fear of negative emotion)
  • lack of assertiveness and ability to say no
  • blurry sense of identity (with soft personal boundaries)
  • low self-reliance
  • external locus of control

 

According to Simon manipulators exploit the following vulnerabilities that may exist in victims:

 

  • naïveté - victim finds it too hard to accept the idea that some people are cunning, devious and ruthless or is “in denial” if he or she is being victimized
  • over-conscientiousness – victim is too willing to give manipulator the benefit of the doubt and see their side of things in which they blame the victim
  • low self-confidence – victim is self-doubting, lacking in confidence and assertiveness, likely to go on the defensive too easily.
  • over-intellectualization – victim tries too hard to understand and believes the manipulator has some understandable reason to be hurtful.
  • emotional dependency – victim has a submissive or dependent personality. The more emotionally dependent the victim is, the more vulnerable he or she is to being exploited and manipulated.

Manipulators generally take the time to scope out the characteristics and vulnerabilities of their victim.

According to Kantor the following are vulnerable to psychopathic manipulators:

  • too trusting – people who are honest often assume that everyone else is honest. They commit themselves to people they hardly know without checking credentials, etc. They rarely question so-called experts.
  • too altruistic – the opposite of psychopathic; too honest, too fair, too empathetic
  • too impressionable – overly seduced by charmers. For example, they might vote for the phony politician who kisses babies.
  • too naïve – cannot believe there are dishonest people in the world or if there were they would not be allowed to operate.
  • too masochistic – lack of self-respect and unconsciously let psychopaths take advantage of them. They think they deserve it out of a sense of guilt.
  • too narcissistic – narcissists are prone to falling for unmerited flattery.
  • too greedy – the greedy and dishonest may fall prey to a psychopath who can easily entice them to act in an immoral way.
  • too immature – has impaired judgment and believes the exaggerated advertising claims.
  • too materialistic – easy prey for loan sharks or get-rich-quick schemes
  • too dependent - dependent people need to be loved and are therefore gullible and liable to say yes to something to which they should say no.
  • too lonely – lonely people may accept any offer of human contact. A psychopathic stranger may offer human companionship for a price.
  • too impulsive – make snap decisions about, for example, what to buy or whom to marry without consulting others.
  • too frugal – cannot say no to a bargain even if they know the reason why it is so cheap
  • the elderly – the elderly can become fatigued and less capable of multi-tasking. When hearing a sales pitch they are less likely to consider that it could be a con. They are prone to giving money to someone with a hard-luck story. See elder abuse.

MOTIVATIONS OF MANIPULATORS

Manipulators have possible motivations, including:

-          the need to advance their own purposes and personal gain at virtually any cost to others,

-          a strong need to attain feelings of power and superiority in relationships with others,

-          a want and need to feel in control (aka. control freakery),

-          and gaining a feeling of power over others in order to raise self-esteem.

Hearing Voices: Such Things are Known

Such Things are Known

Dorothy Burdick
New York: Vantage Press Inc., 1982

Prologue

Reading minds at a distance by deciphering the brain’s magnetic waves has been a project of the Advanced Research Projects Agency [DARPA] of the Defense Department for some time. Many educational and research institutions have contributed to its success with government funding.
Published information indicates that DARPA scientists have learned to identify specific thought patterns through the interpretation of brain waves. These patterns reveal with up to ninety percent accuracy whether a person is: (1) puzzled or uncertain, (2) has made a decision, (3) is paying attention, (4) is observing colors or patterns, or (5) has lost concentration due to fatigue or boredom.

Thought processes have been linked to the computer through Artificial Intelligence [AI]. The autocorrelated Cray, which does one hundred million calculations a second, is specifically designed for problem solving and can carry out biomedical experiments with the computer simulating the human effects. It takes only fifty billionths of a second for an element of data to enter and leave its memory.

Using psychological interviewing techniques. AI has come up with programs which lead the intelligent human to believe that he is talking to another person, when he is actually carrying on a dialogue with a computer. Properly programmed, computers have the capacity to make judgments based on previous performance or experience, predict observed behavior, speech patterns and idiosyncrasies of thought. Computers also convert many types of signals to signs, codes, sound, music and video. Twenty years were spent by Russell Kirsch at the National Bureau of Standards’ Artificial Intelligence Laboratory teaching machines to make judgments called “image pattern recognition.” A well-instructed machine can look at variegated images like brain waves and make decisions concerning them. The marriage of computer programming and brain mapping has been published. To accomplish the wiring and plotting of the functions of the human brain was an incredibly complex task that could only have been accomplished by the invention of the computer itself.

It is known that enough work has been done with large computers and wave averaging on the transmission of neural messages in the brain so that neural activity associated with the word “no” and the word “yes” can be identified whether it is said aloud or not. Near the speech center in the brain is an area that prepares neural messages that drive the muscles associated with speech. Actions of the tongue and mouth and other muscles involved in speech are quite different for these two words. The patterns of nerve signals that go out to make these two words are also unalike. The patterns are formed long before words reach the vocalizing level, and can be read and interpreted in advance of speech by a computer. Pattern recognition computers will read an answer even in a completely uncooperative subject, or specifically read his mind if the thought is mentally put into unspoken words.

Speech is a motor activity which creates electrical signals traveling along neurons. With a computer, these weak signals can be read at a distance by a superconducting quantum interference device (SQUID), which almost completely eliminates environmental noise while magnifying the signal one thousand times over that read by previous technology.

To read the mind, wave analyzers must deal with the complex oscillations of the brain in somewhat the same way that a prism separates the colors of a beam of light. The components of this complex wave are isolated by electronic circuits tuned to several frequencies. Statistical averages can be determined from many readings of the mind under investigation. From this information its versatility and repertoire of adaptive stratagems can be assessed and plotted. This frequency analysis of tactics can now be instantly known and evaluated by computer faster than men can think.

Optical and electronic subsystems for spacecraft and artificial intelligence have been under development since 1955. Sophisticated biomedical sensors have been developed to use on animals at a distance without physical contact. The same equipment has been used to test environmental factors on human sensory organs. Laser is used in biomedical displays to pick up brain signals and convert them to sound and color or even music. With current laser techniques verbal and aural communication is possible between any two points on earth with video and via satellite.

The human head is a target which gives off a magnetic field. Suppose that it is capable of being picked up and locked onto at a distance by a supersensitive sensor many times amplified by optics. Depending upon the kind of ray directed at the head the symptoms and sensations of the subject will vary.

The carotid artery and the hypothalamus are easily reached through the thin wall of the ear drum by sonic and ultrasonic radio waves. Stimuli to this area can raise and lower blood pressure and body temperature. Sensations in other parts of the anatomy are similar to those caused by diathermy depending upon which brain signals are played upon. The subject is literally an instrument who may experience numbness, pain, pleasure, muscle jerks, spasm and stimulation of the sympathetic and parasympathetic nervous system.

It is known that thoughts can be pulsed into the mind through the nervous system by microwaves. This has nothing to do with the auditory nerves. Scientists who have submitted themselves to this process report temporary loss of memory and disorganization of thinking processes.

A subtle method of communication, laser, is used to deliver messages unheard by those close to the receiver. Depending upon the verbal messages received concurrently with physical stimulation, these technological developments become powerful tools combined with psychological techniques to shape, modify, direct, prevent and control human thought and behavior through interference with all known diurnal physiological patterns. Additionally, verbal messages may be delivered at the subliminal level during consciousness and during sleep, so that the subject is unaware that he is receiving them or that his dream sleep is being influenced. Words are emotional triggers. When the subject’s emotional triggers are analyzed he is put in the position of having his thoughts and actions controlled by other individuals. This is mind control.

For at least the last four years every minute of my conscious and unconscious life had been invaded by investigators using state of the art technology. Recently on the “Today Show,” William Colby said that the CIA investigated a device which could read Brezhnev’s mind on his way to work. It is my contention that they not only investigated it but that they made it work.
People have asked me, “What do these voices say?” They say, “We want to be your friends.” As in brainwashing they confuse the issue, and truth becomes obscure. Falsehoods seem reasonable. Indoctrination techniques resemble some techniques used in hypnosis. Like hypnosis they have a soporific effect, reiterating and repeating the same monotonous phrases.

“What you do is up to you. You’ve got to believe in yourself.” This remark is made until you are not really certain whether you know what you want or can rely upon your own opinion.
Pavlov said that a conditioned reflex can be worked out for every stimulus. In brainwashing, brain-changing results. Damage is done to the mind through drugs, hypnotism and other means, so that a memory of what actually happened can be wiped out and a new memory of what never happened inserted. The Voices, by interfering with sleep in a subliminal mode are able to stir up old memories and influence REM Sleep by vocal suggestion. They interfere with normal sleep patterns by inducing physical symptoms which result in jerks, cramps, irritation of the intestinal tract and skin, and in sexual arousal or sudden and unwanted awakening when rest is needed. All the subject is aware of is pain, discomfort, nightmares, unaccountable physical symptoms, fatigue and depression. At other times, he is euphoric with relief.

As in brainwashing, the Voices try to install a feeling of personal satisfaction by making the individual feel that he is needed in some way. The message is combined with physical reinforcement.

“We want you to feel good about yourself.” They specialize in uncertainty. You are always on an up staircase that is going down.

“Dorothy, we don’t know what we are going to do with you.” This comes after occasions of rebuttal, rebellion and general recalcitrance. It may be accompanied by good humor or very unpleasant remarks and physical symptoms.

In the beginning, although one is not incarcerated except mentally and environmentally, the subject feels dreadfully tired and worn out. Returning POWs describe it as being like an automaton or going about in a daze.

The Voices use suggestive interrogation with desired answers implied in the wording. They alternate this with a barrage of denunciation and accusation to make you cringe. The more tired you are, the more it upsets you. They excavate the psyche for areas of sensitivity involving social attitudes, sex, marital and family relationships and feelings about self. Any vulnerability will do, and all the time, fatigue both physical and mental, is working for them. The more sensitive and reasonable the individual, the more vulnerable they are. Pushovers for indoctrinators are very intelligent but uneducated, especially the indecisive minds that always see some valid point in the other side’s argument.

The victim’s feeling is that his thinking is being directed. The brainwasher has been called a corticovisceral psychiatrist, able to interfere with the normal path that every human follows in life. Such a Voice directs or suggests to the subject a new route leading off in an entirely new direction. Conflicts arise in anyone between known emotional responses and those of which he is unaware and which are suppressed. No one actually knows or realizes what is going on in his own subconscious mind. The Brainwasher Voice is trained to increase such conflict and to manipulate these responses.

A great effort is made to arouse guilt feelings. Failures to meet a standard of achievement or conduct are used frequently as guilt stimuli. A decided effort is made to uncover normal failings and to take advantage of them in order to hammer them into a guilt complex. No matter how guilt arises, it is necessary to the Voice Indoctrinator for projection purposes.

The Brainwasher Voice continually attempts to sow doubt in the mind of the subject. Regardless of the strength of conviction of the individual so attacked, the moment doubt clouds the mind, it leads to tension. Tension is related to fear, and guilt also produces fear.

They asked me, “What do you want lo do?” My answer was that I wanted to survive. Fear itself is an expression of unsatisfied need for survival and security. First reactions are nervousness, tension, apprehension and depression. They make the need for security and self-protection even more acutely felt.

Fortunately for me none of this was done in a really controlled environment, yet my privacy in all things was gone and I was isolated from human intercourse because nobody could believe that the Voices I heard were anything but inventions of my subconscious.

As a result of these artificially induced pressures including chronic fatigue, I was deprived of strength to combat repetitious suggestions and started to doubt my own thoughts and convictions.

Suppose in this condition that ideas are suggested at a subconscious level, not positive suggestions used in department store tapes to prevent stealing, but destructive behavioral ideas that will result in a poorer self-image, lowered confidence, both physical and mental, and atypical behavior. The suggestions assume a symbolic significance to the individual. Suppose the assault on the mind, body and nervous system is continual over a twenty-four hour period seven days a week. In this state one begins to live in a realm of fantasies and false beliefs. In the hands of Brainwasher Voices and technologists with Space Age Tools, anyone is malleable. An illusory, surreal, invisible environment is created, real only to the victim.

In a prison camp one can make up one’s mind not to listen. There are other prisoners. As a laser receiving station in your own home and environment one has to listen involuntarily and still try to act normally, perform tasks, drive a car and do routine things as much as possible. The incarceration is real, but unseen.

The tools of mind attack include suggestion, mockery, fear, fatigue, deception and manipulation. As in brainwashing, the Voice sometimes begins with ideas and ideals with which the recipient can agree. The only relief from tension in this insidious process is laughter or drugs like sleeping pills and alcohol. The receiver forgets that he is the one who is suffering from fear, uncertainty, browbeating and the invasion of privacy in sex, toilet and social relationships. When he most fears for public performance and they let up, he feels grateful for no reason at all.

All these things are known to government psychiatrists and psychologists. The government in question is the government of the United States of America. The events I recount began on a May weekend in 1978.

MASER BEAMS READING SUBVOCALISED THOUGHTS


The latest advance in electronic mind control is equipment that uses special types of microwave beams called MASERs (Gyrotron Resonance Masers). These are the laser equivalent of microwave beams.

MASER stands for Microwave Amplification by Stimulation Emission of Radiation. A LASER is a MASER that works with higher frequency photons in the ultraviolet or visible light spectrum (photons are bundles of electromagnetic energy commonly thought of as “rays of light” which travel in oscillating waves of various wavelengths) .

These MASER beams have been used to develop something called synthetic telepathy. This is the ability to read people’s minds from a distance. Electronic scanning of victims’ brains by monitoring the electromagnetic (EM) emissions from peoples brains and using amongst other things, the brain waves (as measured on an EEG), to read the victim’s subvocalised thoughts.

In synthetic telepathy, the weak electromagnetic signals in the brain associated with subvocalised thought, are connected to a computer by use of electrodes, or in more advanced mechanisms by MASER beams. Sophisticated computer systems have learnt to read the subvocalised thoughts in the brain, by associating a specific brain exciting potential, with a particular word. In this case, only one specific language can be decoded, as each word in a language has a specific set of frequencies that must be discovered. Once the donkey work of finding the specific frequencies for all the words in a language has been programmed into a super computer, which can carry out massive parallel processing, fuzzy logic software is used to match this with real world excitation potential associated with subvocalised thought obtained from thousands of abductees, who are used to calibrate the synthetic telepathy devices.

Synthetic telepathy detects the I5Hz, 5 milliwatt auditory cortex brain emissions, that are linked with the excitation potentials in the brain associated with subvocalised thought. New technology, involving low frequency microwaves and RF, has enabled devices to be built which can scan through walls and look inside peoples’ bodies like X-rays. This enables security personnel to see a target in his own home and to track him throughout the house. Further to this, being able to see inside the victim’s head, would allow computer controlled targeting of specific brain centres in the victim’s brain, even when he was walking around the house. A scan of the specific brain emissions given off when the victim subvocalises using an array AF pulsed frequency MASERs fired at the specific brain centres of the subversive, while he resides in his own home, enables the victim to be scanned. By finding an array of ELF pulse modulated MASERs, which scan up and down the window of frequency emissions given off by subvocalised thought, interference effects can be measured in the MASER beam. The victim’s ELF brain emissions will interact constructively or destructively with the pulse frequency MASER carrying ELF in the ELF window associated with subvocalised thoughts.

If we fire an array of pulsed MASERs, which are out of phase with each other, extraneous noise can be filtered out in the digital domain. Since the converging ELF modulated MASERs are being effected by the low level emissions in the victim’s brain, the shifts in the ELF pulsed signal going into the subversive’s brain can be detected.

A simplistic version of this would be the LASER beam shone at the window of the person that is being bugged. The vibrations in the window cause modulations in the LASER that can be converted into electrical signals and hence into sound. In this way the subvocalised thoughts in the victim’s brain can be read. Having already built up a library of excitation potential signatures for differing words and groupings of words, a sophisticated computer can begin to decode the emission signatures into word streams. In this way the subvocalised thoughts of the victim can be stored in the memory of a supercomputer and analysed to give a read out of what the target is thinking.

Using ELF audiograms carried by a single pulse-modulated Maser, subvocalised thoughts can be placed in the victim’s brain. This enables synthetic telepathy operators the ability to enter into conversations with the subversive to drive him mad or to bring up key words which will get the victim thinking about the information they wish to find. Visual cortex excitation potentials can also be broadcast into the victim’s brain so that illusory images can be projected into their brain to drive them mad, or to program them to commit suicide.

 

Mental Illness or Social Sickness?

by Susan Rosenthal / May 19th, 2008

When you are sick or injured, you want to know what’s wrong and what can be done. You want a diagnosis. A correct diagnosis reveals what is wrong, what is the preferred treatment and what is the likely outcome. For example, a diagnosis of pneumonia indicates a serious lung infection that can usually be cured with antibiotics.

While medical diagnoses are based on science, psychiatric “diagnoses” are not at all scientific. They do not reveal what is wrong, what is the preferred treatment, and what is the likely outcome. Nor are they reliable. Different psychiatrists who examine the same patient typically offer different “diagnoses.” Moreover, psychiatric “diagnoses” move in and out of favor, depending on a variety of social factors.

Psychiatric “diagnosis” is actually a labeling process, where the patient’s symptoms are matched with a grouping of symptoms listed in the American Psychiatric Association’s Diagnostic and Statistical Manual of Psychiatric Disorders (DSM). As we shall see, this psychiatric “bible” was developed and is maintained by financial and political interests.1

Sigmund Freud

Who decides what is normal or healthy and what is deviant or sick?

Before the 20th century, life stresses were generally seen as spiritual problems or physical illnesses, and people turned to religious advisors and physicians for help. Medical doctors treated “hysteria” and “nerves” as physical problems. Psychiatry was restricted to the treatment of severely disturbed people in asylums.2 The first classification of psychiatric disorders in the United States appeared in 1918 and contained 22 categories. All but one referred to various forms of insanity.

In 1901, Sigmund Freud revolutionized psychiatry by breaking down the barrier between mental illness and normal behavior. In The Psychopathology of Everyday Life,3 Freud argued that commonplace behaviors — slips of the tongue, what people find humorous, what they forget and the mistakes they make — indicate repressed sexual feelings that lurk beneath the surface of normal behavior.

By linking everyday behavior with mental illness, Freud and his followers released psychiatry from the asylum. Between 1917 and 1970, as psychiatrists cultivated clients with a broad range of problems, the number of psychiatrists practicing outside institutions swelled from eight percent to 66 percent.4

The social movements of the 1960′s opposed psychiatry’s focus on inner conflict and emphasized the social sources of sickness instead. Dr. Alvin Poussaint recalls the 1969 convention of the American Psychiatric Association (APA).

“After multiple racist killings during the civil rights movement, a group of black psychiatrists sought to have murderous bigotry based on race classified as a mental disorder. The APA’s officials rejected that recommendation, arguing that since so many Americans are racist, racism in this country is normative.”5

Growing the industry

In 1980, the APA overhauled the DSM. The Task Force established to create the new manual declared that any disorder could be included,

“If there is general agreement among clinicians, who would be expected to encounter the condition, that there are significant number of patients who have it and that its identification is important in the clinical work it is included in the classification.”6

In other words, the new DSM was not based on science, but on the need to maintain existing patients and include new ones who might seek help for any number of problems. A profitable and self-perpetuating industry was born. The more people could be encouraged to seek treatment, the more conditions could be entered into the DSM, and the more people could be encouraged to seek treatment for these new conditions.

By 1994, the DSM listed 400 distinct mental disorders covering a wide variety of behaviors in adults and children. Significantly, racism, homophobia (fear of homosexuality) and misogyny (hatred of women) have never been listed as mental disorders. In 1999, the chairperson of the APA’s Council on Psychiatry and the Law confirmed that racism “is not something that is designated as an illness that can be treated by mental health professionals.”7 Homosexuality was listed as a mental disorder until activists campaigned to have it removed.8

The women’s liberation movement condemned labeling symptoms of oppression as mental illnesses. In They Say You’re Crazy: How the World’s Most Powerful Psychiatrists Decide Who’s Normal, Paula Caplan explains,

“In a culture that scorns and demeans lesbians and gay men, it is hard to be completely comfortable with one’s homosexuality, and so the DSM-III authors were treating as a mental disorder what was often simply a perfectly comprehensible reaction to being mocked and oppressed.”9

Caplan describes efforts to prevent “Masochistic Personality Disorder” from being included in the DSM. This disorder assumes that women stay with abusive spouses because like to suffer, not because they lack the resources to leave. Despite protest, “Masochistic Personality Disorder” was added to the 1987 edition of the DSM, although it was later dropped.

The inclusion of “Pre-Menstrual Dysphoric Disorder” (PMDD) in the DSM also raised a protest. According to Caplan,

“The problem with PMDD is not the women who report premenstrual mood problems but the diagnosis of PMDD itself. Excellent research shows that these women are significantly more likely than other women to be in upsetting life situations, such as being battered or being mistreated at work. To label them mentally disordered — to send the message that their problems are individual, psychological ones — hides the real, external sources of their trouble.”10

As soon as PMDD was listed in the DSM, Eli Lilly repackaged its best-selling drug, Prozac, in a pink-pill format, renamed it Serafem, and promoted it as a treatment for PMDD. By creating Serafem, Lilly was able to extend its patent on the Prozac formula for another seven years.

A marketing gold mine

The DSM is a marketing gold mine for the drug industry. The FDA will approve a drug to treat a mental disorder only if that disorder is listed in the DSM. Therefore, each new listing is worth millions in potential drug sales. Most of the experts who construct the DSM have financial ties to pharmaceutical companies, and every new edition of the DSM contains more conditions than the previous one.

Once the DSM lists a new mental disorder, drugs for that disorder are heavily marketed for everyone who might fit the symptom checklist. (Doctors are also encouraged to prescribe these drugs for “off-label use,” which means to anyone they think might benefit.) Not surprisingly, the numbers of people “diagnosed” with a mental condition rise rapidly after a drug is approved to treat that condition.

In 2005, a major study announced that “About half of Americans will meet the criteria for a DSM-IV disorder sometime in their life…”11 How is this possible? Has it become normal to be mentally ill, or has the definition of mental illness expanded beyond reason? Both could be true.

Capitalism damages people in many ways. It’s also true that the more people can be labeled as sick, the more profits can be made from selling them treatments. In Creating Mental Illness, Alan Horowitz warns,

“…a large proportion of behaviors that are currently regarded as mental illnesses are normal consequences of stressful social arrangements or forms of social deviance. Contrary to its general definition of mental disorder, the DSM and much research that follows from it considers all symptoms, whether internal or not, expected or not, deviant or not, as signs of disorder.”12

Most people know the difference between normal behavior (such as grief over the death of a loved one) and abnormal behavior that could indicate an internal disorder (such as prolonged grief for no apparent reason). However, the DSM does not consider what happens in people’s lives. With one exception (Post-Traumatic Stress Disorder), the DSM lists and categorizes symptoms outside of any social context. As a result, DSM-based surveys artificially increase the numbers of people suffering from mental disorders and, therefore, the market for drug treatments.

DSM-inflated rates of mental illness are typically accompanied by the warning that not enough people are getting treatment.13 The question of whether or not they are actually sick is never raised.

Social control

Psychiatry has a long history of medicating the oppressed, including children, for social control.14

Using DSM criteria, at least six million American children have been diagnosed with serious mental disorders, triple the number in the early 1990′s. The rate of boys aged 7 to 12 diagnosed with Bipolar Disorder more than doubled between 1995 and 2000 and continues to rise.

A 2007 survey of 8- to 15-year-olds discovered that nine percent met the DSM criteria for attention deficit/hyperactivity disorder (ADHD). The survey found that fewer than half of these children had been diagnosed or treated, “suggesting that some children with clinically significant inattention and hyperactivity may not be receiving optimal attention.” Noting that poor children were least likely to receive medication, the authors of the study recommend “further investigation and possible intervention.”15

Instead of addressing the stressful social conditions that agitate children, psychiatry imposes conformity through medication. To force compliance with this oppressive system, access to insurance benefits, medical care and social services depends on “having a diagnosis.”

The psychiatric-pharmaceutical industry treats illness as strictly individual and internal — the result of faulty genes or chemical imbalances. In reality, human problems exist in a social context.

Most of the symptoms listed in the DSM describe human responses to deprivation and oppression (anxiety, agitation, aggression, depression) and the many ways that people try to manage unbearable pain (obsessions, compulsions, rage, addictions). Depression is strongly linked with poverty,16 and alleviating poverty can lift depression.17

Under capitalism, addressing the social causes of misery is politically risky and unprofitable. So psychiatry extracts the individual from society, splits the brain from the body, severs the mind from the brain and drugs the brain.18

A sick society

Capitalism is a system that requires the majority to have no control over their lives and to believe that this condition is normal. Therefore, all reactions to inequality and deprivation must be viewed as signs of personal inadequacy, biological defect, mental illness — anything other than reasonable responses to unreasonable conditions.

During slavery days, experts argued that Black people were psychologically suited for a life of slavery, so there must be something wrong with those who rebelled.19 In 1851, the diagnosis of “drapetomania”(runaway fever) was developed to explain why slaves try to escape.20 Not much has changed. Today, exploitation and oppression are considered normal, and those who rebel in any way are considered to be sick or deviant and in need of medication or incarceration.

What’s the diagnosis for a sick society? We know what’s wrong. Most people are kept in sick social conditions so that a few can maintain their wealth and power. What is the treatment? Putting human needs first would eliminate most human misery. Who will deliver the medicine? The majority must organize to take collective control of society.

I don’t expect this diagnosis to appear in the DSM anytime soon.

  1. Kirk, S.S. & Kutchins, H. (1992). The selling of DSM: The rhetoric of science in psychiatry. New York: Aldine De Gruyter. []
  2. Horowitz, A.V. (2002). Creating mental illness. Chicago: University of Chicago Press. []
  3. Freud, S. (1901/1991). The psychopathology of everyday life. New York: Penguin []
  4. Shorter, E. (1997). A history of psychiatry: From the era of the asylum to the age of Prozac. New York: John Wiley & Sons. []
  5. Poussaint, A.F. & Alexander, A. (2000). Lay my burden down: Suicide and the mental health crisis among African-Americans. Boston: Beacon Press, p.125. []
  6. Spitzer, R.L., Sheeney, M. & Endicott, J. (1977). DSM III: Guiding principles. In Psychiatric diagnosis, (Eds). Rakoff, V., Stancer, H. & Kedward, H. New York: Brunner Mazel. []
  7. Egan, T. (1999). Racist shootings test limits of health system and laws. New York Times, August 14, p.1. []
  8. “DSM and homosexuality: A cautionary tale.” in Kirk, S.A., Kutchins, H. (1992). The selling of DSM: The rhetoric of science in psychiatry. New York: Aldine De Gruyter p 81-90 []
  9. Caplan, P. (1995). They say you’re crazy: How the world’s most powerful psychiatrists decide who’s normal. New York: Addison-Wesley, pp.180-181. []
  10. Caplan, P.J. (2002). Expert decries diagnosis for pathologizing women. Journal of Addiction and Mental Health. September/October 2001, p.16. []
  11. Kessler, R.C., Berglund, P., Demler, O., Jin, R. & Walters, E.E. (2005). Lifetime prevalence and age-of-onset distributions of DSM-IV disorders in the National Comorbidity Survey Replication. Arch Gen Psychiatry. Vol.62, No.6, pp.593-602. []
  12. Horowitz, A.V. (2002). Creating Mental Illness. Chicago: University of Chicago Press. p.37. []
  13. Talen, J. (2005). Survey says nearly half of all Americans will be affected by a mental illness, some before adulthood. Newsday, June 7. []
  14. Breggin, P.R. & Breggin, G. R. (1994). The war against children: How the drugs, programs, and theories of the psychiatric establishment are threatening America’s children with a medical ‘cure’ for violence. New York: St. Martin’s Press. []
  15. Froehlich TE, et.al. (2007). Prevalence, recognition, and treatment of attention-deficit/hyperactivity disorder in a national sample of US children. Arch Pediatr Adolesc Med. Vol.161, pp.857-864. []
  16. Duenwald, M. (2003). “More Americans Seeking Help for Depression.” New York Times, June 18. []
  17. Costello EJ, Compton SN, Keeler G, Angold A.(2003). Relationships between poverty and psychopathology: a natural experiment. JAMA. Oct 15, Vol.290, No. 15, pp.2023-9. []
  18. Ross, C.A., & Pam, A., (1995). Pseudoscience in biological psychiatry: Blaming the body. New York: Wiley. []
  19. Poussaint, A.F. & Alexander, A. (2000). Lay my burden down: Suicide and the mental health crisis among African Americans. Boston: Beacon Press. []
  20. Cartwright, S. (1851). Report on the diseases and physical peculiarities of the Negro race. New Orleans Medical and Surgical Journal. May, p. 707. []

Forced Dreams (Mining for Information)

“Thought reading”, i.e. “MINING” someone’s brain for information from a distance is SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we do know that we are “fed” hypnotic signals to force consistent “neutral” content DREAMS(but of different character than prior to becoming test subjects,).

These forced, neutral content (“bland” content) dreams occur every single night and may represent the harassers’ (or experimenters’) efforts to have our experiences portray themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION, but it seems very logical. It is therefore extremely likely that these forced dreams can be displayed on the experimenters’ screens in an adjacent apartment or adjacent house, (which are
made obvious to the involuntary experimentee.)

Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us about events inside our homes at times when they could not have seen from the outside.

Some of the ” forced dreams” are pretty much surreal and disconnected from normal dreams pattern.

This is the basic idea for the movie INCEPTION.

ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY (Mind Control in Practice)

The British Mind Control Agent

By C L Heywood (Copyright 2006)

Contents

1.    THE BRITISH MIND-CONTROL AGENT (An Introduction)

  • Introduction
  • Battle for the Mind
  • The Mind Controllers (MCs)
  • The Human Brain and Behaviour
  • Covert Wars With Civilian Populations – Human Experimentation and MKULTRA

2.    Electronic Harassment and Implant Technology (Mind Control in Practice)

  • Alien Abduction and Medical Exploration
  • The Human Body, Radio Communication and Electromagnetic Stimulation
  • The Implant Specialists
  • The Gaffer
  • The Design, Testing and Analysis of Implants

3.    The Human Body and Private Home is a Sacred Temple?


the British MindControl Agent

(An Introduction)

Introduction

Conspiracy theory is a very controversial subject and has captivated the media’s attention for countless years. Journalists, due to their exceptional capability to sniff out a story, have actively leaked and exposed information of a classified nature in an effort to prove to themselves and anyone who will listen just how prominent government corruption really is.

On a global scale every nation funds its own team of secret police and military enforcers whose prime objective is to sustain and develop national-security strategies and policy. Understandably the majority of their activities are conducted covertly on an extensive level; MI6, the CIA and the KGB being prime examples. Their various dealings have always been enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis. It is also proven fact that these intelligence-gathering establishments have conducted unethical testing on their own soldiers and intelligence personnel using a varied range of lethal arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their books, magazines, movies and television documentaries. ‘Mind Control’ in particular has taken centre stage. John Marks’ The Search for the Manchurian Candidate, for instance, highlighted extensive CIA pursuits of mind-control intelligence and weaponry.

Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources to interview places restrictions on the research avenues that journalists may pursue. As a result, the secrecy surrounding mind control developments has now piqued unquenchable global curiosity.

Battle for the Mind

Since the beginning of civilisation topical issues concerning the human brain have always attracted substantial attention for a number of obvious reasons. The human brain is a most valuable asset and extremely unique, as it holds the precious cocktail of individuality and personality. It is what separates the timid from the aggressive and the academically gifted from Mr Average. The brain controls physical movement, all cognitive capabilities (memory, counting and language) and regulates a vast array of bodily functions.

Although substantial headway has been made in pursuit of understanding the brain and its function, scientists are still a long way from mastering and controlling the mechanisms that work within it. This situation has uncovered many dilemmas for law-enforcement agencies, the military and medical communities, who all believe there is great potential to be found in mastering physical control of the brain and mind.

Criminal psychologists, for example, are no longer blaming environmental circumstance and adverse social conditioning as the sole cause of criminal activity. They stress some individuals may be more susceptible to committing murders and assaults due to their inherited genetic wiring. This theory asserts that there are chemicals within the brain which can trigger anger and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical imbalances which they are unable to control without the intervention of drugs and other inhibitors. Naturally it is hoped that brain exploration will offer some answers.

Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may be supplemented or suppressed by drugs which in the long run can make an individual’s behaviour more desirable and manageable. They foresee great potential in the use of implants and other artificial aids to assist the body’s performance and maintain organs to optimal working condition. Consultants view the exploration and control of the brain as a fascinating realm of discovery where new breakthroughs in psychiatric treatment and disease can be made. Utilising medical research and analysis, their sole objective is to rid the world of every brain dysfunction and life-threatening condition known to mankind.

The military, unlike the medical and law-enforcement professions, hold slightly different interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world domination, biological warfare and intelligence gathering. They wish to discover newfound ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations. They strongly believe that the man who can crack the complex code of human behaviour is the man who has the power to manipulate, control and modify the actions and thoughts of another.

It is abundantly clear why so many government-funded establishments are interested in methods which control human brains and minds because the capability to detect criminals, advance medical technology and win wars runs paramount with the security and advancement of British society.

1.   Criminals cost the British government millions of pounds in surveillance, rehabilitation, punishment and victim-support services.

2.   An unhealthy nation places pressure on the social services and hospital staff, as well as spreading disease and infections which are difficult to eradicate. Humans with permanent illnesses are repeatedly forced into unemployment as a consequence.

3.   Intelligence agents and soldiers are very expensive to pay; the government could cut MoD, MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations, expose spies and ascertain threats to national security using quality technological surveillance and interrogation techniques.

Scientists who can unravel the mysteries of brain function are worth billions of pounds to the British government and are now in mass abundance. Ultimately, it is the unhealthy and often stressful state of government politics, and heightened security fears, which have led to the emergence of the mind-control professional.

Many will have their own definitions of mind control and its meaning, and these definitions often vary slightly. This paper follows the assertion that ‘Mind Control’ encompasses all theoretical and technological applications which are used to gain minimal or complete control over an individual’s brain or psychological state of mind and behaviour, both covertly and overtly. The aim of the game is to control an individual to the point where he will do the manipulator’s bidding against his will or, alternatively, to adjust his behaviour in a desirable way in order to satisfy an expressed agenda, whatever this may be.

British research into mind control technology is a very important issue and stands high on the political agenda.

The Mind Controllers (MCs)

Scientists who conduct mind control research for British intelligence agencies are commonly referred to as Mind Controllers (MCs). Their main aim is to:

  • design and produce lethal and non-lethal mind-control weaponry which can be used against criminals, foreign government spies and military personnel;
  • design and use equipment which can counter the affects of foreign mind-control techniques, and prevent spies and terrorists from extracting/intercepting information from British agents, military scientists and politicians.

MCs are a special task force of multi-skilled professionals who are funded by the British government as secret agents. These operatives are deployed and assigned to a diverse range of projects depending on their expertise and, as a cohesive force, comprise doctors, psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists, telecommunications technicians and child-development professionals, etc. For the most part MCs are employed within the social care and public service sectors and, as a result, have primary contact with members of the public. This brings them closer to observing human behaviour in its rawest form and enables interactivity with personalities and, ultimately, functioning brains. They are by necessity a rather corrupt lot as their research methods often take them down roads which lead to performing both invasive and non-invasive procedures on the brains and psyches of well-adjusted citizens without legal consent. These operatives, for instance, are notoriously known for their involvement with implant technology, psycho chemicals and the brainwashing of military captives.

As active behavioural scientists MCs are great believers in trial-and-error experimentation and follow this principal like a bible. A practising mind controller must torture a real human being to acquire credible information on torture and its effect on the physical body and mental state.

Mind Control Applications:
Sensory deprivation (to create disorientation and fear) Torture/physical assault (kicks, punches, burning, cutting, electrocution, sexual assault, chronic induced sickness, cramps, vomiting, temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/ punishment versus reward Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of electromagnetic waves to influence the human brain)
Sound technology (the incessant use of music and voices to arouse certain thoughts and feelings) Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors – polygraph tests

This table represents just a snippet of the work MCs are primarily responsible for, and accounts for the substantial amount of mind and behaviour research circulating university lecture theatres and colleges.

The most alarming aspect of mind control research is that experimentation on the unwitting human being is condoned by security bureaucrats and military personnel, who have convinced themselves and the involved parties that their sometimes ruthless investigations are honest attempts to search for scientific truth. It is of small consequence if the pregnant mother is given LSD without her knowledge as the investigative results may revolutionise the way LSD is used in the future by the British population; and by business sectors who treat LSD addicts, and pharmaceutical companies that produce and examine LSD properties.

The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human experimentation when the scientist plunged to his death from an upper-floor window after CIA mind-control agents spiked his drink with LSD.

The phrase ‘one life for many’ is the core golden rationalization here and, irrespective of links with law enforcement, MCs aren’t strangers to unconstitutional murder as some of their projects are terminal, meaning the victim’s life is expendable and the objectives of the study must be fulfilled by any means necessary.

Mind-control operatives establish themselves as law abiding social scientists whose prime objective is to nurture society to help it flourish and develop to its full potential. In the idyllic society man is co-operative, productive, law abiding and happy to help his fellow man. He is flawless, a well-balanced individual with the drive and motivation to promote and encourage happiness wherever he goes. There is no place in harmonious society for his exact antithesis. Via tampering with the human brain MCs hope to determine what causes differences in behaviour and find ways of manipulating the natural processes of thought and behaviour with the intention of ultimately dictating it.

British security acts legislate MI5 (the security service), MI6 (the secret intelligence service), GCHQ (Government Communications Headquarters) and national crime services to work in partnership and direct support of one another’s schemes. Mind-control agents are no exception to this rule and have the full use of government services at their disposal, including the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates of criminal activity identify them as some of the most influential and dangerous civil servants functioning in political arenas today.

The Human Brain and Behaviour

To run a plausible mind control operation MCs must remain informed about new developments within their field. This means being open to the idea that theorists from a variety of occupational sectors may inadvertently offer new, healthy, innovative notions from which feasible mind control strategies may be born. This section explores two fundamental mind and behaviour theories.

One very famous pioneer interested in the advancement of brain exploration was Dr Jose Delgado. He became the Professor of Physiology at Yale University and wrote the controversial book ‘Physical Control of the Mind: Toward a Psychocivilized Society’. Dr Delgado highlights the need to study the brain as a quest for human survival. He stresses that man survived life where other species, like the dinosaur, failed because of his unique ability to acquire knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way since realising he could increase his welfare and wealth by investigating the properties of the planet and manipulating their function to his own devices. He portrays the human being as a master manipulator of the environment, flawless in many ways but ignorant of the conscious mind working behind the innovations and formations he creates. Ideally the doctor hoped to use his findings of brain exploration as a stepping stone to creating a healthier society.

His genius lies within his ability to carefully weigh up the advantages and relevance of brain activity in everyday living. He states the following issues as being at the foundation of his theory.

“There are basic mechanisms in the brain responsible for all mental activities, including perceptions, emotions, abstract thought, social relations, and the most refined artistic creations. These mechanisms may be detected, analyzed, influenced, and sometimes substituted for by means of physical and chemical technology. This approach does not claim that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious fact that the central nervous system is absolutely necessary for any behavioural manifestation.” (Delgado J, 1969)

What Dr Delgado highlights is the fact that the human body is a machine (controlled by the brain), and that its overall behaviour, response and function may be predicted and modified. This theory reaffirms the MCs’ suspicion that, with the right selection of armaments and expertise to hand, they could manipulate a human into doing anything they so desired.

  1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning and thought-reform techniques. Ultimately, the soldier switches sides and starts working in partnership with the enemy feeling and believing the enemy’s pain.
  2. A human being may be drugged and suspended in an emotional high of acute depression or prolonged euphoria for weeks at a time.
  3. Mind-reading machines could extract a human being’s personal thoughts and decode them into actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer be inviolable.

To understand further the full implications of brain activity on human behaviour, academics Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in violence and anger management, highlight some interesting points in their book ‘Violence and the Brain’. Although Vernon and Frank agree there are a number of factors such as poverty, family background and negative social conditioning that may contribute and nurture violent behaviour, they also believe the functioning brain holds substantial influence. They claim that all states of being and behaviour are an indication of the functioning areas of the brain; the brain’s interaction with the external world, memory and the association the brain makes with past and present information and experience. Chemical balances within the brain, its physical composition and response to transmitted information from the rest of the body are all significant influences.

Vernon and Frank stress that there are parts of the brain that, in ‘susceptible individuals’, help trigger violence. These areas can be pinpointed clearly and are often associated with aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts that there are different types of violent behaviour, and that these negative outbursts can be analysed and categorised into predictable causes, influences and outcomes.

From a political perspective, violent acts help to whittle away and undermine respect and co-operation for the laws the British government uphold in the regulation of civilian behaviour. On a global perspective, governments are placed in the inevitable position where they must spend billions of pounds on an annual basis paying for the damage that (foreign and native) rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs’ responsibility to help contain this problem and redress the balance of power.

Due to the nature of their work (espionage, sabotage and military enforcement) MCs are active participants in violence and aggression, but are also frequent casualties themselves. It is only logical, therefore, that they maintain a vested interest in this arena.

Covert Wars With Civilian Populations – Human Experimentation and MKULTRA

Mind-control victims (MCVs) are very diverse characters of differing background, age, race and class. Individual claims of victimisation tend to be extremely uncommon and are especially sparse in relation to the world’s population as a whole. One is more likely to come across witches and Santa Claus than genuine MCVs.

First of all, there aren’t any apparent limitations as to where MCVs and MCs are found. Evidence clarifies that they are actively resident in America, Sweden, England and Canada, and most likely the rest of the world too. Secondly, human subjects are usually ‘Mr Average’ and have no social links with either government agencies or dissident groups. Only a sparse number are members of spy networks, or terrorists who pose a genuine threat.

The general characteristics of mind control victimisation suggest MCs are running extensive experiments on MCVs ranging across continental borders.

  1. The British are deploying their MCs to foreign countries to acquire experimental subjects.

2.    Operatives are picking to order individuals of varying background and personality trait for experimentation at home and abroad. Subjects are administered mind control arsenal unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments are most beneficial and conducive to mind control research as potential victims are incarcerated for the immediate. This provides MCs with the opportunity to control the treatment that subjects receive, enabling greater flexibility. Operatives are able to use the results provided as indicators of how their arsenal would realistically perform in the field.

3.    Victims range from the newborn child to the elderly, suggesting there is a great need for extensive studies spanning a possible eighty years of an individual’s life. Undoubtedly human development and age influence the efficiency and practicality of some forms of arsenal. When administering hallucinogens, for example, the dosage must be customised to the size of the person, and gender is an obvious issue.

Perhaps the most notorious mind control experiments known to mankind were those conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began their research in the early 1950s under the code name MKULTRA and it was rumoured that superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding with the testing and intelligence gathering. The CIA were particularly interested in studies concerned with memory enhancement, psychotherapy for psychological-warfare purposes, truth serums, poisons and electroconvulsive therapy.

The CIA had an extensive requirement for human subjects and strove hard to find them. Unwitting victims were the most prized as their reactions to arsenal realistically put theory into practice and was the ultimate indication of success or failure.

Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric Press), published the book ‘Psychiatry and the CIA: Victims of Mind Control’ to shed some light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to his father’s admission to the Allan Memorial Psychiatric Institute (Canada), where he was treated by the renowned professional Dr Ewen Cameron who at the time had been commissioned by the CIA to undergo testing on his patients. The experiments hoped to provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy, LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique ‘Psychic Driving’.

Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were rumoured to have burned all their mind-control files during the 1980s. However, conspiracy theorists and members of the American military remain sceptical, believing that the MKULTRA project is thriving but has evolved into a new scheme utilising exactly the same techniques and regimes.

Britain’s MI6 might not have officially been charged with MKULTRA dealings like the CIA but were equally active in the programme, and were major players in the race for political power and world domination. Whilst mind control techniques and strategies may have changed throughout the decades, the ethos and concept remains the same. The British Empire hasn’t faired badly in war on a global perspective and their pursuit of mind control strategy may be one of the many reasons why.

Definitions of some of the most prevalent mind control specialisms are listed below.

ESB (Electrical Stimulation of the Brain)

ESB involved the transmission of electrical currents (using electrodes) to different parts of the human brain. Using ESB, MCs could influence the human thinking process, manipulate motor movements and place victims under a number of different emotional states, like anger, happiness and fear. ESB proved the human body could be controlled externally via the brain by use of permanently implanted electrodes and a remote control.

Sound Technology

Sound technology focused on the effects music and sound have on mental health; how certain lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings within the mind. Tunes that were played repetitively, for instance, induced depression, violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked thoughts of freedom, anarchy and happiness. This led to the understanding that concentrated, prolonged, highly explicit lyrics could aid interrogations and the ‘breaking’ of captives. This is because musical lyrics and their topical content (love, family, aspirations, sex and guns) linger within the realms of the brain’s thoughts via association even after the tracks have stopped being played. MCs ensure the captive hears music prior to and after interrogation to invoke emotional instability and lack of confidence.

Brain Mapping

Brain mapping was of great interest and concerned research that helped MCs pinpoint which parts of the brain and body were responsible for different physical capabilities, e.g. the ability to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line of research was pursued primarily with the intention of finding ways to understand and define human behaviour for eventual manipulation.

Sensory Deprivation

Sensory-deprivation studies investigated the psychological and physical effects the prolonged absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques included those of:

  • blindfolding captives using goggles and bags;
  • forcing captives to wear sound-proof earmuffs;
  • afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
  • bright, fluorescent, flashing lights, which blinded the eyes;
  • exposure to severe temperatures of heat and freezing conditions.

Military captives who were consistently denied their physical senses for weekly and monthly periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal thoughts. Captives also lost track of time and were unaware whether it was night or day.

Brainwashing and Behaviour Modification

The capability to surreptitiously alter an individual’s point of view and direct him towards another way of thinking attracted radical attention from MI6. They believed human beings could be influenced during interrogation and incarceration periods with greater efficiency, manipulating individual viewpoint and attacking personality trait. This strategy was achieved in the following three ways.

  1. Attacking the identity of the person. Subjects are racially abused; prominent physical features, like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This depletes the subject’s confidence in himself and, in an ideal scenario, the subject takes on the manipulator’s viewpoint and wallows in self-hatred and pity whilst striving for new perfection.
  2. Stripping the person of all decency. The subject is denied clothes and forced to face the humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up and down for an hour. This technique reinforces the idea (in the subject’s mind) that he is owned property (a slave) and that to cough, laugh or urinate without being granted permission to do so is a sin and a direct act of defiance, punishable through death.
  3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement, the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed acceptable. This means extra recreation time, larger food rations, a clean shower and the acquirement of items like books, pens and paper. In the case of negative reinforcement, the subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane instruments. The subject lives by the perpetrator’s rules without questioning them and does what he is told. Out of genuine necessity the subject sees conformity as a means to survival.

Sleep Deprivation

Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling the nervous system’s ability to function to optimal performance. The manifestations of prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations, slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and forgetfulness. British agents involved in the interrogation of suspects rely heavily on this method as it makes the extraction of information from prisoners easier.

Torture Techniques

Torture basically incorporates any act used to cause pain and suffering of a captive with the intent of orchestrating severe punishment, obtaining a confession, coercing individuals to take on a given viewpoint or enforcing behaviour modification. Torture is an ancient technique often favoured for its aid in interrogations. Usually the inflictions made on an individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence information through fear for their lives. The torture of enemy troops has always been deemed beneficial because even the smallest details of information can turn a war around and gain the captor a substantial advantage. Strategies utilised included the following.

  1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
  2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are century-old techniques, valued because the instruments used are cheap and easy to come by, and most British soldiers carry matches and knives as a basic utility. MI6 don’t value this highly as a preferred technique because permanent marks of disfigurement are clearly noticeable and wounds caused by cutting and burning, if left uncleansed, turn sceptic.
  3. Starvation. The captive is denied food and water. The body left without basic sustenance begins to deteriorate. Within one to two weeks the captive is desperate to divulge information that the captors have requested; anything to relieve the demoralising, painful and desperate suffering of dehydration and malnutrition.
  4. Electrocution. Electrocution is utilised because it doesn’t leave cuts or abrasions to the body, and the intensity can be amplified and decreased using a remote control. The use of electrocution as a torture technique is illegal in most nations but is utilised on civilians in the form of an electroshock stun gun or taser gun by American and UK police forces.

Hypnosis

Hypnosis is a state of mind which is induced using concentrated focus and thought aided by the guidance of an interrogator’s reassuring and convincing voice. Visual stimulation, physical movement, external noise and environmental influence are restricted so that verbal suggestions are easily assimilated into the target’s subconscious mind. It is hoped that, once the target leaves the hypnotist’s presence, the information assimilated into the subconscious mind will be recalled by the brain at relevant intervals. The target then believes the knowledge/information which pops up from his subconscious is the ultimate truth and follows this truth as a gut reaction without questioning its logicality. MCs often administer drugs to help induce heightened hypnotic states.

As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD, hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation, which makes mind control a worthy adventure.

MCs have managed to unravel an entire realm of questions and answers regarding humans and behaviour. They have divulged the great possibilities empowered to civilisation if the brain is controlled right down to the minutest components.

If mind-control scientists succeed in their technological pursuits, society will undoubtedly have to make way for these new developments and evolve with them. Over a period of countless centuries, MCs will manipulate human-being behaviour using a range of artificial devices, biological technology and social conditioning to create the British government’s ideal harmonious civilisation. MCs will also utilise this same technology to bring down populations and foreign armed forces to the brink of destruction. Mind control is a developing science, which is becoming ever more sophisticated as greater numbers of contract-funded intellectuals join the rat race.

ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY

(Mind Control in Practice)

Alien Abduction and Medical Exploration

Human beings throughout the twentieth century have always claimed to be victims of mind control technology. Aliens from outer space have arrived in UFOs and whisked them away to unknown planets and subjected them to endless routines of torture. Implants have been surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a frequent basis. Some individuals claim to have been abducted more than twice and believe they suffer continuous harassment from their alien antagonists.

Dr Helmut Lammer, author of the book ‘MILABS: Military Mind Control and Alien Abduction’, brings to attention his analysis of implant technology and the alien abduction saga. The doctor claims mind control practice is rife, and pays particular attention to the CIA and global-warfare history, both past and present. He suggests that some alien abductees are disillusioned subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities have befallen them. He backs up this theory with case studies of abductees who have proof of medical tampering, and the unauthorised deployment of treatments which physicians haven’t mentioned in the consultation room. Brain implants in particular (of various designs) are most commonly discovered by chance due to a patient’s persistent pursuit of a competent doctor and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance Imaging) and x-rays, and can be as small as a grain of rice.

He claims the existence of aliens and their extraterrestrial implants are, therefore, not a reality, rather some fabrication of the truth brought into existence by mind-control professionals attempting to quash suspicion and hide illegal activities.

Dr Helmut Lammer alleges implant technology was developed sometime after World War II due to increased global military competition, and that the research conducted encompassed aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information from brain activity to a computer. The correlations of biological activity are in eventuality decoded into actual behavioural manifestations, allowing the subject’s lifestyle to be understood and analysed. The doctor states that the similarities between alien implants and man-made telemetric devices are uncanny, and follows the assertion that the implants abductees refer to are readily available and marketed to research professionals across the world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the telemetric implant called the ‘stimoceiver’, which he designed in the 1960s.

The stimoceiver is an implantable device used for direct communication with the brain. The instrument is fitted with electrodes, which monitor the electrical emissions occurring within different parts of the skull and, most importantly, can send electrical signals to defined parts of the brain to produce involuntary actions and mental states. The bio-feedback from the stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on psychiatric patients undergoing treatment and surmised that he could block the thinking process, inhibit speech and movement, and produce fear and hallucinations. The doctor engineered research which helped establish the fact that correlations of electrical activity within the brain directly correspond with specific types of behaviour.

Modern stimoceivers are often referred to as acute probes and have been miniaturised to a mere 4mm in size. The acute probe is still in its early stages of development and, on a legal medical note, is being used to treat illnesses like dystonia and severe depression in suicidal patients. University students and lecturers also utilise them (usually in the operating theatre and in animal experimentation) for scientific inquiry.

The alien-abduction conspiracy follows the assertion that humans are experimented on: first, as a means to impregnate them for racial mixing; and second, to cause the eventual downfall of the human race using a strong concoction of biological warfare and space-age technology. It appears that in twenty-first century Britain extra-terrestrials have some mighty stiff competition from a growing number of laboratory technicians and medics.

The Human Body, Radio Communication and Electromagnetic Stimulation

Since the mid-1990s the World Wide Web has become a major player in global communications and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy theorists converge and exchange information. Mind-control websites are in clear abundance and victimisation claims of electronic harassment highlight that MCs are using a number of prevalent tactics and techniques.

Audible Voice to Skull and Microwave Hearing

Voice to skull is a form of radio communication, which enables MCs to transmit conversation directly to the brain. The sound (as described by victims) appears to radiate from behind the head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound distance and intensity of radio signal remains the same regardless of the head’s orientation.

The hearing of voices in the head has always been associated with the onset of schizophrenia but military science suggests the transmission of spoken word to the brain isn’t an enormous impossibility, and that the science behind its application is coveted by MI6.

The truth is that humans can hear themselves think in spoken word and perceive sound without the aid of their external ears, and it is the complexity of the brain which empowers this. When human ears detect acoustic sound frequencies from external sources the sound waves are funnelled via the external ear, hit the eardrum and are translated into nerve impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.

When MCs transmit voice to skull, they speak into a microphone, which transforms verbal speech/sound signals into encoded electrical pulses. These radio-frequency pulses are directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes the electrical pulses into understandable spoken word and sound. Ensuring the encoded electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and communicate with a subject many miles away.

Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-modulated microwaves at the auditory nerve during their time at the Walter Reed Army Institute of Research. The transmission of sound via the auditory nerve has been practised since the mid-twentieth century and has proven successful even in hard-of-hearing subjects. The employment of ESB enables targeted subjects to perceive sound depending on the frequency and amplitude of stimulation. The auditory symptoms include those of constant buzzing, clicks and what is called ‘ringing in the ears’. If utilised for extended periods of time the loudness and variation in noise causes lack of concentration, distress and high irritability.

Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had unlimited communication, thus enabling the abandonment of conventional earpiece/microphone headgear, which is a visible target on the battlefield.

Voice to skull brings into focus the growing number of psychics, alien abductees, witches and psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise with the devil on a frequent basis. The realisation that MCs may effectively talk themselves into a human being’s life and pose as supernatural powers seems blasphemous. What is clear is that intelligence agents and medics have tried hard to master this skill and that there are a growing number of MCVs confirming its deployment.

Electromagnetic Torture – Involuntary Motor Movements and Actions

A brief consultation with any practising neurologist would confirm that the brain is primarily responsible for all voluntary movements and the co-ordination of a vast number of muscles within the body. The fluid movements and precision of muscle control executed by break dancers and gymnasts are very much representative of the brain’s capability. Neurologists can map the functional areas of the brain in diagram form, enabling them to pinpoint the regions most responsible for independent movement. The motor cortex, for example, is responsible for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.

MCVs have long claimed that MCs have the capability to physically torture them irrespective of global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of the acute probe and the electrical signals it produces to cause involuntary actions.

MCs aren’t content with the medical profession’s notion of brain stimulation as consultants utilise electromagnetic research primarily to improve health, not damage it. MCs are interested in the acute probe as an intelligence aid, so it helps to know what happens when levels of brain stimulation are increased beyond the brain’s natural capacity and capability. Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding that ESB may realistically be used as a torture weapon that surpasses conventional methods.

MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening contractions) within the human body by applying variations of electrical stimulation, causing pain as the muscles and tendons are strained beyond their maximum range of motion. This form of torture is useful, the main advantage being that sensitive areas of the body, like the genitals, eyes and tongue, may be isolated and afflicted independently. The acute probe’s electrical signals travel from the brain into the spinal cord and stimulate the nerves and then the muscles; the muscle tissue then contracts. In general the severity of pain and wounds inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and spine.

Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with ringing, clicking and buzzing
Repeated spasms and contracting of muscles and tendons within the body Bleeding and discharge from the nasal cavity

Electromagnetic torture is unique as it is performed without the necessity of incarceration, so MCs needn’t be in close proximity. The victim may, in fact, be over 5,000 miles away on a distant continent. The greater advantage is that the victim can’t escape his tormentor without appropriate medical intervention, i.e. surgical removal of the implant.

The Implant Specialists

The culprits responsible for the upsurge in implant technology are unsurprisingly not alien invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to implant technology and for the sake of espionage work for the British government under the umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense that, by preference, enemies are fought not in the field using guns and bombs but through utilising electronic-communications technology. This way they may collect information, analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the potential number of casualties lost in battle. Implantable devices are just one of the many sophisticated communications products British security forces employ, and they are granted ample funding because they are multifunctional devices favoured for the following three reasons.

  1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant on their exact function, and enable researchers to establish the whereabouts of their target using a receiver that detects the implant’s transmitter signal. This scientific technique is frequently used on mammals like sharks where their movements are tracked within the vast open seas. Conservationists, as a result, are able to locate their shark many miles away and monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest Mice roaming wild and cultivated fields.
  2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct link between the human body and computer, like electrocardiograms. These devices enable researchers to study the intimate functions of the body closely by monitoring organ activity and reactivity. They are frequently used in the monitoring and assessment of mental illness, heart activity and brain dysfunction. From an intelligence agency’s perspective, monitoring devices may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression. This type of research is essentially useful to the MoD (Ministry of Defence) as these common conditions often influence soldiers and their performance on the battlefield, interfering with perception, physical co-ordination, eyesight and, ultimately, performance.
  3. Manipulation and Control. These implants are probably the most controversial of all as they are both intrusive and obtrusive to the human body. They empower an external party to influence the thoughts, functional body parts and behaviour of another. The devices themselves are often telemetric instruments and are frequently inserted into laboratory animals undergoing behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to a dog’s brain every time the animal disobeys a command. The dog quickly learns via association and negative reinforcement that if he doesn’t sit when told to he’ll be harmed.

Implants are attractive in the sense that they are hidden from view within the body and are difficult to detect and remove without professional intervention. One would have to gain access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.

Bearing in mind the surveillance perspective, the possibilities are vast for intelligence agencies: audio equipment may be inserted under the skin, possibly within the face or arms, and enable operatives to eavesdrop on all of an implanted subject’s verbal conversations. This tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are limited once the subject leaves his bugged household. Interaction with strangers and associates in the street is also acquirable without operatives having to rely on second-hand information from bystanders and culprits who may deceive. The most advanced implantable device is undoubtedly one which incorporates all five features of tracking, monitoring, manipulation, audio technology and radio communication.

The Gaffer

Perhaps the easiest way to understand the IS strategy is to view the entire operation as a business where there is a clear, identifiable organisational aim and staff hierarchy; a unified, cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there is twenty-four hour monitoring of a victim’s life.

Project Co-ordinators

Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is the strategic driving force behind the operation and is often in control of funding initiatives, equipment, staffing levels and the distribution of workloads. The co-ordinator knows his department and subject area well, and may spend precious time holding talks and presentations throughout Great Britain at renowned universities, such as Cranfield. He is a well-paid specialist and more often than not has a Masters degree or PhD title to his name. As the head co-ordinator it is his task to be on the lookout for new opportunities to market, network, expand and spread the word about his work and team. Primarily the co-ordinator services the government but, dependant on the political environment, secrecy acts and commercial influences, expertise and implantable devices are granted deployment by private institutes and overseas military forces. A project co-ordinator’s investigations, for example, may uncover a way to cause temporary paralysis in implanted victims without the use of drug administration but using electromagnetic stimulation. This research is likely to remain classified for the immediate but, eventually, could be used for mob-management strategy on a global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to calm rioting crowds would be replaced with an electromagnetic beam (transmitted from portable transmitters and receivers), which would hit all human brains within a ten-metre radius. The beam would cause immediate paralysis in marching rioters, making the booking and arrest process considerably easier. This strategy would lessen the damage to property, decrease the number of police casualties and relieve pressure from emergency services. An electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield to incapacitate enemy forces without killing them, instead rendering them too sick to fight.

Consultants

The consultants comprise an invaluable team. Like the project co-ordinator, they are high-flying, wealthy academics – the best and brightest specialists Britain has to offer. They are the intelligence scientists who oversee projects and advise on all aspects of the mind control scheme.

The development of an implant in general requires the full attention and expertise of many consultants, some of them foreign if absolutely necessary. They comprise of the following.

  1. Neurologists and associate medical staff who understand the brain and its complicated activity.
  2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for miniaturised implants to be tested on animals and, eventually, humans. These implants must be easy to insert, hygienically clean and safe to use on a permanent basis.
  3. Sociologists and statisticians who understand human culture, economic trends and factors that influence them, e.g. birth rate, life expectancy, educational standards, the British population’s health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
  4. Factory contractors who can mass produce implant technology in secret and at a reasonable price.
  5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental influences and produce behavioural models based on induced mental states.
  6. IT and telecommunications staff at GCHQ who can produce customised communication systems, software and interactive devices to enable the safe, covert detection, monitoring and transmission of information over vast areas of space quickly.

Without appropriate input from consultants to advise, research, direct observations and analyse data, the project co-ordinator and the rest of the mind-control team are completely lost in their pursuits and lack the skills to forward the project to greater heights.

Field Agents

Field Agents are the mind control administrators. Their role is primarily concentrated on interacting with the victim in liaison with the project co-ordinator and consultants’ requests. They ensure the close monitoring of the victim’s life and the networking of information between internal staff.

Field agents must find an effective way to induce and nurture the behaviour that the consultants wish to observe in the victim. This means attempting to control the environment and anything else that may influence the victim’s behaviour. Harassment revolves around the victim’s lifestyle and identity, which may be split into two major areas of activity.

  1. Home Life and Recreation.
  2. Work Life.

Where home life is concerned, field agents concentrate on family relations and activities. In this arena agents make frequent contact with the subject’s kin, flashing law-enforcement badges to establish authority. A study on depression and trauma, for instance, requires that the subject be depressed for extended periods of time, and sometimes chronic depressive states have to be induced to acquire the necessary electrode readings. Family contacts ensure the subject is spoken to at necessary intervals and treated accordingly to aid the research process. This may entail boosting the subject’s self-confidence or lowering it using instructed verbal communication, physical body language and inclusion/exclusion tactics. Families are more often than not happy to comply with demands, especially if led to believe that co-operation may improve their loved one’s welfare in some way.

Observation of the employment work-place routine enables agents to familiarise themselves with the layout of the building and environmental psychology – the lunch room, toilet facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify where the victim’s work station is situated and how he will move in and around the office on a daily basis. Agents endeavour to create an artificial environment where the victim’s every move is interacted with, controlled and manipulated on cue to produce prolonged depressive states. Work associates and managers are spoken to in attempts to ensure the environmental psychology is in the correct balance and remains so for the duration.

Field agents work in numbers of two or more and, in cases of voice-to-skull harassment, it’s the radio communication from these agents which victims hear. They are also active networkers who keep intact the sourcing of contacts like the local GP. Victims suffering electromagnetic torture are likely to visit the doctor more often perhaps than average. The subject will convey information to the GP about his health, which may be of extreme interest and aids the research gathering process. In this event, field agents ensure the victim is sent to the relevant specialist and receives meticulous medical examination. Copies of the results are forwarded to the IS who, upon receipt, will understand the influence their electronic harassment is having.

Field agents are great believers in economic sabotage, which is often utilised in attempts to force a victim’s lifestyle to diversify in accordance with research expansion. Great Britain, for instance, is run by hundreds of different governmental authorities who as a collective help manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated withdrawal of these services can both damage and improve human welfare relatively swiftly. The following two theories identify the key ideologies behind economic sabotage.

Employment = Pay Cheque

The ‘employment = pay cheque’ concept surmises that human survival in Britain comes down to career prospects and financial status. The capital raised from employment ultimately dictates the quality of lifestyle and opportunity a subject may pave for himself. This encompasses educational advantage, his stake in the property market, travel capability, nutritional diet and size of family he may comfortably afford, investment opportunities in the stock market, recreational activities and the possession of commodities like cars, computers, digital TV and telephones. Using their law-enforcement status, field agents illegally force subjects into substantial bouts of employment and falsified redundancy to best accommodate their mind control project.

Welfare State = Public Welfare

The ‘welfare state = public welfare’ theory surmises that partial aspects of a British citizen’s welfare aren’t necessarily dictated by individual financial status. The welfare state and tax system ensures funds are allotted to those who most require them as this strategy creates a sense of equality and inclusion amongst the classes. Most importantly, the minimal human requirements of food, water and shelter are met because British citizens are granted access to a number of statutory public services. Organisations like the Home Office, NHS, Social Services, Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this welfare strategy. In this arena the field agents’ aim is to manipulate the advice, welfare service quality and customer care that the subject receives in a way which meets project criterion. The ‘marginalisation’ of the victim within society is most essential; it is important that every aspect of the subject’s life is under magnified analysis and is controllable down to the minutest components.

Experimental Subjects – Locating Specimens

Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit consultants for a vast variety of ailments and treatments. Registered citizens across Britain have an allocated NHS number and medical record, which enables security forces to identify individuals by:

Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations

The IS search the NHS medical-file databases for potential victims of relevant identity, and also have access to medical departments within prisons, military bases and psychiatric institutes to maximise catchments.

In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This isn’t to say, however, that medical staff are acutely aware that the patient concerned might be molested while under the influence of anaesthesia.

  1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical intervention or for surveillance and torture?
  2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient without falling foul of the law himself?

Doctors have no jurisdiction over their patients’ welfare where security forces are concerned. Security forces still retain the legal right:

  • to transfer a patient to another hospital against his wishes;
    • to extradite a patient without medical treatment; and
    • to administer whatever medical intervention to a patient they so wish, with or without his consent and knowledge.

Looking at the ‘experimental subjects’ theory, it’s easy to understand how MCs ‘pick to order’ their subjects and distribute implants to so many.

The Design, Testing and Analysis of Implants

There are six essential stages to the IS testing and analysis strategy.

Research

Design

Testing and Refinement

Implementation

Analysis

Conclusion

Where Research is concerned, consultants analyse the success of bygone experiments as well as appreciate the modern. This entails briefings with professionals of the relevant field and scouring the bookshelves of medical and military libraries for data-collection purposes. Case studies will be sought and investigated (depicting both success and failure) to highlight potential complications and spark innovative ideas. Foreign intelligence, if available, dictates the plans of action and overall development of implant design, which must be competitive on a global scale and outperform those already in circulation.

Using all the relevant research the consultants have collated, they must then Design a strategy that will help them achieve their objective. They will have to decide whether or not it is feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a human being, the individual’s identity, age, race, class and occupation will be important. It will be decided whether or not the experimentee is consenting or unwitting, and how one is to go about finding an individual who meets the criteria and specified characteristics. The IS work in networked multi-disciplinary groups, so at some point relevant participants like doctors, military men and psychologists will meet and discuss the options available, and the feasibility and funding of the proposed operation. Various implant designs are sought and their properties investigated.

A pilot study will be performed for Testing and Refinement purposes. Obviously there is the chance of the project design being flawed; it may be that newly programmed equipment is faulty, staff aren’t sure of their role or invaluable resources and funding are withdrawn or dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point and extensive adjustments made to the overall scheme of things. It is possible in rare circumstances that the entire project is abandoned and that the IS decide to start anew. At this point in the testing phase they have a vague idea of how the study will pull together, the budgeting costs, the risks involved and the quality of research likely to be acquired.

At the Implementation stage the team have ascertained where and when the research will be conducted. They will have acquired a number of human subjects who they may tap for research at relevant intervals. Surveillance and monitoring equipment is set up and professionals who can translate the output are hired. Telemetric data is recorded and archived whilst undercover field agents are deployed to subjects’ places of domicile to cover environmental and social influences. The manipulation and sabotage of the subjects’ lives will commence only if deemed crucial to the objective.

The Analysis and Conclusion involves the dissemination of research. Dependant on the surveillance systems used, results may be sent away to laboratory scientists who test and analyse data. The majority of scientists approached aren’t necessarily part of the IS team and are unaware that the research has been acquired illegally.

Once the reports are compiled, the IS set about building a picture of individual case files and eventually incorporate the information into a larger overview. They can look for common correlations and patterns of behaviour in the data and statistics. How the data is analysed will obviously vary, dependent on whether the study was to offer investigative, interventive or preventive insight.

The experimentees don’t have faces; they are simply part of a statistic, which is extracted from a computer database for intelligence committees to scrutinise. The final conclusion basically encompasses all the information based on the extensive analysis. If the experiments proved successful there is the option of pursuing research further or remaining content and assessing ways of incorporating the intelligence into future operations.

From a military perspective the IS have made substantial headway with implant technology. They have come to the realisation that the human body is a magnificent weapon in itself, and that all they need do is add a few refined capabilities.

  1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to eavesdrop on the verbal interactions occurring within their target’s physical range. This replaces the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing) also enables field agents to speak to their target by transmitting electromagnetic radio frequencies directly to the auditory nerve.
  2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict serious illness, physical wounds and pain. This replaces the common requirement of torture instruments.
  3. Self-destruct Equipment. Throughout military history it hasn’t been uncommon for captives to carry poison pills as a means to commit suicide in the event of capture. Nor has it been uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A miniaturised bomb may be implanted within the target’s body and detonated on cue. This way bombs get through Customs undetected and may be carried into high-security establishments, such as the Pentagon.
  4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain their whereabouts by country, borough and street name.
  5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert operatives to their target’s general state of health, like levels of pain and sleep patterns. Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress, body temperature and breathing, etc.

Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and disperses, and where funding and resources are sourced. The agent may sabotage the operation from the inside whilst adding to Her Majesty’s Secret Service’s wealth of intelligence.

MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board. The implants they carry are the early indicators of the British government’s ‘Big Brother’ nation. Mind-control implants are primarily designed to be carried by British spies and dissidents (for covert-surveillance purposes) to track and annihilate the operations of terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate casualties of the government’s experimental testing phase, not the long-term ultimate targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is disastrous, the knock-on effects are limited.

To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic embarrassment to the British government and could, in extreme circumstance, damage American and British relations. The Americans would detain the spy, torture him for intelligence and demand a full explanation from the British. If a suitable explanation wasn’t forthcoming, they would consider the death penalty if their security had been compromised. Preliminary testing phases are only extended to those whose identity is inconsequential. Only once a technique has been tried and tested over and over with guaranteed results will it be used on an enemy of the state.

The IS are repeatedly committing crimes in attempts to enhance the safety and security of their country. In this vicious game of silent warfare all casualties are expendable.

THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?

Mind-control developments bring into question a number of moralistic issues, which are fundamental in preserving the British legal system and human rights.

Britain has willingly signed up to the European Convention on Human Rights, United Nations Universal Declaration of Human Rights and, of course, created the British Human Rights Act 1998. The British constitution believes:

  • everyone has the right to life, liberty and the security of person;
  • no one shall be held in slavery or servitude – slavery and the slave trade shall be prohibited in all their forms;
  • no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
  • no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honour and reputation – everyone has the right to the protection of the law against such interference or attacks;
  • everyone has the right to work, to free choice of employment, to just and favourable conditions of work and to protection against unemployment;
  • no one shall be subjected without his free consent to medical or scientific experimentation;
  • everyone shall have the right to freedom of expression – this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice.

The Right to Privacy, Freedom of Thought and Health

The right to privacy grants citizens to live in domestic domicile without interference from the government. Citizens may develop close relationships with whom they wish whether they be social or sexual. The right to undress and bathe oneself in a dignified fashion goes without debate.

Humans are private creatures and in their element when they have unlimited control of their environment. They may control who enters their house, may divulge information about themselves in private conversation, and dictate what they wear and eat. The privately owned house and the goings-on which occur within it give the individual an impression of territory, ownership and power.

Brains enable humans to be independent thinkers; to thrive on the freedoms and opportunities free thought provides. The right to personal autonomy, to develop personal interests, dictate direction and seek stimulus are major components of a healthy, balanced mental state.

MCs work hard to challenge the longstanding assertion that a man’s home environment is sacred ground, that his physical body and psyche are inviolable, and that any proposed manipulation or violation is an unholy adventure. They believe the following.

  1. It is dangerous for humans to have freedom of thought, as it isn’t always in check with government idealism.
  2. Humans shouldn’t have a right to privacy if it distorts truth. Who knows what information the average human is concealing?

Agents want to live and breathe (in real time) the target’s domesticated lifestyle to ultimately investigate and understand it. They have so many questions regarding human behaviour and must violate human privacy to make way for their research team of prying eyes and surveillance equipment. Only by accomplishing this will they learn how a human personality is formed and understand the intimacy of relationships.

Unfortunately for the victim, betraying every private thought and intimate moment with government agents is highly likely to traumatise him to the point of severe depression and humiliation and, in an extreme scenario, provoke suicidal thoughts.

Victimisation

Mind control is a form of brain rape and torture; whether the affliction is caused by drug administration, electromagnetic stimulation, brainwashing or the nurture of personality disorders, the end result remains the same. The target is forced to endure continued harassments. IS mind control, in particular, is likened to slavery because the target’s brain and mind are tapped for research against his will. He is helpless to prevent the intrusion and resist the brain’s physical and mental reaction to electrode stimulation.

To date the American Guantanamo military base displays the most public flagrant disregard for human rights where systematic mind control is highly prevalent. Freed captives have accused the CIA of utilising sensory-deprivation and sound-technology techniques to install in them fear and hypnotic suggestions. They’ve been denied physical exercise, exposed to severe temperatures and prevented from prayer and conversation. When captives have disobeyed they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs. On the odd occasion captives have been doused with urine and threats have been made towards their families if information wasn’t forthcoming in the interrogation room. Slowly but surely the restraints which have kept the human brain and mind inviolable are being eroded by science.

So long as it remains national policy to protect the security of the British nation and its interests, the government will strive to produce mind control techniques that are ever more invasive and efficient. Mind control is such an integrative component of military warfare now that research pertaining to its use is highly classified.

The government, of course, denies that Mind Controllers exist. Exposure of their antics would prove undoubtedly that the government is committing criminal acts against the people it is sworn to protect. Exposure would also make folly of the laws which govern civilised society.

The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as such. Greater openness and education regarding mind control will help aid the legal process and eventual conviction of the perpetrators who wish to make political and financial gain from the suffering of others. It is especially important that those involved in mental health understand mind control methodology and find ways to effectively treat and reverse the prolonged physical and psychological effects endured by victims and their families.

Bibliography

  1. Andrew, George (2001). MKULTRA: The CIA’s Top Secret Program in Human Experimentation & Behavior Modification, Healthnet Press.
  1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin Company.
  1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper Colophon Books.
  1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
  1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction, IllumiNet Press.
  1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North Carolina Press.
  1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
  1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
  1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
  1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric Press.

Glossary

  • MCs – Mind Controllers

Government-funded agents who conduct mind control-research.

  • MCVs – Mind Control Victims

Human beings who are used for human experimentation.

  • IS – Implant Specialists

Mind-control agents who specialise in implant technology.

Sleep Deprivation & Mind Control

“Mind Control” is a rather loosely-used term. It conjures up images of enslaving other people’s thoughts, making puppets or bio-robots out of them, like in some cheap sci-fi or horror flick, or perhaps a Nazi experiment. This doesn’t occur outside of stories and rumors.

The nearest thing to it in real life can be found in the practices of certain high-demand religions, such as ultra-orthodoxies and cults. They sometimes use practices such as sleep deprivation, mind-altering drugs, ‘love bombing’ (relentlessly hyper-positive feedback toward the inquirer), the big lie, hypnosis, endless repetition, doublespeak (using words in a way that they don’t mean what they seem, to stop any cohesive thinking), sexual stimulation, the teaching of ‘insider’ secrets, group-think (using the whole group to draw each person into its mindset), enemy creation, and control of both the surroundings and the flow of information. These techniques taken as a group are sometimes called ‘brainwashing’. By themselves, each technique has little effect, but when taken together, they create a strong influence over personal thought-patterns and behaviors. The methods get the inquirer to want what that group or its leader wants them to want.

A Myth of Mental Illness by JBHfile.com

“How has a generated myth of my being mentally ill been employed by the investigators to assist in ongoing attempts to discredit my efforts? What are the types of mental illnesses applied to my person?”

Since my first, public claims of being under investigation, the FBI and others involved have worked to build a public persona of myself as being paranoid schizophrenic, bi-polar, psychotic, or god knows what else.

Those organizing the investigation have done this based solely on the fact that I for one, have claimed an investigation against me exists and two, have not digressed in my efforts to seek legitimate proof of such an investigation (FOIPA requests, etc.).

This myth of mental illness, generated for the sole purpose of continually discrediting my efforts to obtain data related to the investigation, has been the single most destructive aspect of those, oft-times harmful tactics employed by the investigation and the informant/participant networks associated with it.

Paranoid schizophrenia, a terrible thing to taste! (especially when it’s of the manufactured variety)

Early on in my awareness of the investigation and its tactics, I penned a rather frustrated newsgroup message regarding that very subject, follow the link if you care to view it, both because it is slightly humorous and as well, because it’s a good window into my mindset at the time.

At one point, also early on, around mid 2001, I was even prescribed a variety of psychotropic medications; the stated goal at the time was to allow me to see my claims of being under investigation as simple delusions.

In essence, they said, “The drugs will help you believe us when we tell you your making this whole thing up.”

Yeah, right.

The drugs in fact made my life 100% more chaotic and were even quite terrifying in their effects and I’ve since become somewhat of an anti-psychiatry, anti-medication advocate, not quite a scientologist, mind you, just a bit more informed.

No offense to the scientologists out there.

The problem with such medications and specifically in regards to my circumstances:

The professionals involved were trying to medicate a problem, which is grounded in truth; no amount of medication, short of chemical-lobotomy, can make something that is truthful, untrue.

 

Paranoid Schizophrenia

Primarily, the myth of my suffering from a variety of mental illnesses was generated during the first year of my becoming aware of the investigation, when the surveillance and gang stalking tactics were employed to disastrous effects in an attempt to erode my emotional state to a point of complete nervous breakdown; in other words, I did indeed display signs of severe emotional duress during this period, even traits that could be called paranoid; but throughout, my emotional state was brought on by the actions of an existing investigation and it’s myriad of real, live participants, many of whom were and are very close friends with my immediate family.

This is why it is paramount that I prove the investigation exists; if the investigation can be shown to be factual and that it exists, then the claim of paranoid schizophrenia has no basis in reality. This is something that the perpetrators of the investigation do not want to happen.

As I’ve heard on certain occasions, “just because your paranoid, doesn’t mean they aren’t really out to get you!”

So, in large part, other than simply needing to prove that an investigation exists, my goal is also to correct false diagnosis’, which have been applied to my person in the past.

Another interesting note regarding the birth of this myth of schizophrenia:

Those persons in local and federal law enforcement, who are long-time personal friends of my family, were some of the most vocal proponents, when dealing with my immediate family members, of my having a mental disorder, even to the point of suggesting to my parents that I be confined to a state mental institution (simply for claiming an investigation exists!).

I discuss in detail these family connections to local and federal law enforcement in another section of this site; it is a very important part of my story insofar as demonstrating some of the more political factors involved.

 

Obsessive/Predatory Sexual Behavior

As well as the general application of paranoid schizophrenia, rumors and false witness testimony have been employed in an attempt to build a public profile of myself as being predatory in regards to sex and sexuality.

It is known to me that primary among the investigations objectives, and should any given incrimination attempt be successful, is the desire to have unrestricted, court ordered psycho-therapeutic discussion of my past and current sex life, including discussion of past partners.

To achieve this end, and because I traditionally am not a frequent dater or ‘serial-dater,’ the agencies behind the investigation, along with the behavioral science groups have orchestrated a somewhat constant variety of social ruses to give the impression of my exhibiting ‘classic’ signs of predatory and or sexually obsessive/compulsive behavior.

To accomplish the creation of such an illusion, the investigators have worked within several of my existing social environments to craft, at times, quite elaborate ruses which they hope will indicate my propensity towards sexual deviance or issues of predation, mostly involving false witness testimony to my character in public and especially anything related to such attention as given to minors or underage persons, this being the easiest way of generating immediate and dramatic concern (hysteria) and especially the all important willingness of others to participate in the ongoing ruse.

I discuss, in detail, many of these sorts of situations, which may or may not involve the use of false witness testimony, in the ‘Anatomy of a Setup’ section.

An interesting note on psychological profiling, in general:

Here it should be stressed that the investigators have apparently been working in the reverse of the direction most (to my knowledge, anyway) investigations take.

Regarding the practice of psychological profiling, one would assume the investigation starts from real and factual individual behaviors and then develops a profile based upon said behaviors, aligning the subjects observed behavior patterns with existing and popular psychological/forensic models with which the subject may or may not share characteristics.

What I’ve found to be the case in my circumstance is the investigators seem to be gathering classic behaviors from established profiles and have been attempting to forcefully and deceptively apply these traits to my person through set ups and false witness testimony, all towards the eventual buttressing of the agencies desired argument in a court room setting.

Sort of like reverse profiling.

 

Drug Addiction

One of the hallmarks of the agencies tactics has been to utilize any past blemish upon my personal and/or public record in the interest of showing support for their ongoing set up attempts.

For instance, as a 17 year old (I’m now 38) I had a very real and known problem with drug addiction; frankly, I was the classic teenage punk-surfer-dope-smoking-hoodlum that you find in so many of the middle to upper class, suburban environs of the American landscape.

It was when I began doing cocaine, however, around 17 years old, that I knew I didn’t want to remain on the same path.

I only did the drug for about 8 or 9 months, but it was enough to convince me that I hated who I was becoming and so I talked to my folks and put myself in treatment.

This was my introduction to AA, which, frankly, saved my life and taught me a new way to live, but also, frankly, I strongly believe can be a dangerous organization if one buys to heavily into the popular AA delusion that addiction is a disease that must, for life, be met with constant involvement in AA meetings. On one hand, AA does some good in person’s lives and on the other hand, it’s a cult that should be understood as such.

More on the AA connection, elsewhere in this site, but suffice it to say, I did, indeed have a drug problem as a kid.

What the agencies behind the investigation have done is to take this fact and attempt to apply it to my current life, especially considering their desire to create an illusion of my having a proclivity towards memory dysfunction.

This is why covert druggings have been used so frequently; because, should I be covertly drugged and actually apprehended for something related to a drugs effects on me, it would not matter if I denied ever personally taking the drug, because there is always my actual involvement with substance abuse, as a teenager to point back to.

The rest should be easy to deduce … once an addict, always an addict, disease theory, “he’s in denial,” or “he did the drug and blacked out,” etc.

The possibilities are endless.

Part III: Mental Firewalls

Part III: Mental Firewalls
Allen Barker, Feb 17, 2002

 

This is the third of a three-part series of essays on mind control.  As the earlier essays explained, “mind control” is the term commonly and historically used to describe clandestine operations to alter human behavior and thought.  The series focuses mainly on high-technology techniques involving, for example, surveillance devices and electromagnetic weapons — though victims of all sorts of mind control techniques have common experiences and sequelae.  The first essay of the series, “Motives for Mind Control,” dealt with some of the reasons that mind control harassment, torture, and exploitation happens and why it continues.  The second part, “Resisting the Mind Control State,” dealt with ways to protest and resist mind control abuses in a supposedly “free” society.  In this final part, I explore some of the methods and techniques that victims have developed to help them resist these ongoing human rights atrocities committed every day against their bodies and minds.  In a sense we are going to have a look at mind control torture from the torture victim’s point of view, from “inside” the mind of the victim.

This essay is written from the point of view of someone experiencing real torture from externally induced mind control phenomena, including induced voices in the head, surveillance, harassment from various sources, and nonlethal aversive jolts.  While I make no secret of the fact that I have personally been subjected to a similar sort of mind control torture, this is not my story.  Of course it is influenced by events I have experienced, but the essay is a composite from my interactions with many mind control victims (and provocateurs) over the past few years.  I will save the actual details of my own experiences for my lawyers or for prosecutors when that time comes, or perhaps for other writings I might choose to make public.  Thus, in keeping with the earlier parts of the series, you do not even have to believe me about my having been tortured — though it all happened.  There are many people in the world, including many American citizens, who have experienced very similar things.  You can even think that all of those people made it all up, and still have to be concerned despite your Holocaust denial.  The technology undoubtedly exists right now to carry out the sorts of torture operations described in this essay, and will only become more advanced with time.

I cover a lot of different techniques and possibilities in this essay, but keep in mind that the truth is bad enough.  What we already know and can document is bad enough, and is only the tip of the iceberg.  In the spirit of mentioning all the possibilities, though, let me briefly discuss mental illness here.  There truly are some people with mental illnesses which occur naturally.  There are also people with mental illnesses which were externally and purposely inflicted, for example by harassment operations.  And there are mind control victims who are completely normal except that they have undergone years and years of some of the most hideous torture imaginable — in a lying, despicable society that denies it, ignores it, and further tortures the victims.  We know this from documented sources; what the government has admitted is bad enough.  I hope this essay will prove helpful even to victims who suffer from true mental illness.  I call them victims also because the cowardly U.S. government has hidden behind the skirts of the mentally ill to commit some of the worst atrocities imaginable, and the truly mentally ill are victimized by this as well.  The mentally ill are also known to have been used as guinea pigs in mind control experiments precisely because they would tend to be disbelieved and are relatively powerless victims for torturers to experiment on.  Some victims may have been poisoned by drugs engineered to cause them psychological problems — and I do not mean ordinary street drugs.  Others have had psychosurgery, microwave harassment, etc., which can cause organic problems in addition to psychological problems.  And of course, the mind is really not separate from the body and psychological torture is just as bad as direct physical torture.

Most people are still free to think what they want — to the extent that that still means anything — and some will try to second guess the victims and provide armchair diagnoses of the victims’ problems.  People who try to dismiss true torture victims as just mentally ill will receive and deserve the utmost contempt from the victims and from those decent people who know what is really going on.  And we will remember.  For the reasons described in Part II, the psychiatric and psychological “communities” cannot be trusted, except for a few actual healers here and there.

Much of this essay contains a sort of analysis that it is fashionable among the pseudo-intelligentsia to dismiss as just black-and-white thinking.  These people have their sixth-grade epiphany that not everything is black-and-white, and for the rest of their lives go around justifying anything convenient with this amoral relativism.  They never realize (or it just does not suit their lies) that while nothing is black-and-white, some things are close enough that they might as well be.  I will be writing about Nazi pigs, and I mean this in the sense of “Mengele the Nazi pig,” not any other cultural pig association.  Those who dismiss this sort of thinking perhaps would think differently if they had ever experienced real torture or were capable of the slightest bit of empathy.  There is no doubt that this sort of thinking has been misused and misapplied at various times, but I cannot worry about how every moron might misunderstand or misapply what I write.  People may well misapply things I have written here, or use them to create some propaganda distraction from what I am actually writing about, but I am describing it the way it is.  If you don’t call a Nazi a Nazi you end up with Nazism by some other name.

Every victim has had to develop his or her own method of coping with the torture.  I am not trying to impose my methods on anyone.  A religious person under torture finds strength in his or her religion, so some Zen Buddhist philosophy may necessarily be apparent in my writing.  In the ignorant U.S. there are still people who will blame a victim for being Buddhist, a major world religion.  Of course Mengele the pig tries to justify and rationalize his acts of torture in any and all ways possible.  There are the usual myriad ways of blaming and smearing the victims and rationalizing away the acts of the torturer.

I hope that this essay will help some victims.  I know that I have benefited from the work of other victims who had the courage to speak out about their experiences.  Much of this essay deals with the mental “game” of mind control, which is of course not a game at all to the torture victims.  You can compare it to having to face mock executions each day.  There is also the physical intimidation many victims experience.  As a victim might put it, if it is all in my head then who harassed me on the highway?  Why did my mail all arrive opened?  Why did my phone regularly ring twice a day with hang-up calls?  Why did many of my internet posts stop propagating anywhere?  Why did a police car pull up beside mine every time I talked about China, on the drive to my honeymoon?  The unfortunate reality is that the victims have to develop their own methods to deal with the constant, credible physical threats of death or worse.  I wish I could help there, but I do what I can.  This is a barbaric and savage nation.

What is a Firewall?

For the purposes of this essay, let me digress a bit here and describe the concept of a firewall.  A firewall, in the historical sense, is a wall built between connected buildings and specifically constructed so that a fire in one unit of the structure will not spread to the other units.  In a more recent sense, a firewall is a device on a computer network that keeps nodes of the network separated, for instance so that a hacker attack on one node of the network cannot spread to connected nodes of the network.

For our purposes, we can consider all the computers on a network to be like houses on a street.  (Network engineers, please bear with me.)  Each house has several doors into it, which correspond to what are called ports on a networked computer.  A computer actually has thousands of ports, but the principle is illustrated by considering a house with several doors.  All the houses have inhabitants in them, who send out messengers to the other houses:  But some houses send out the equivalent of burglars also.  When the inhabitants of one house want to communicate with the inhabitants of another, they send a messenger to a particular door of the house they want to communicate with.  The messenger knocks on the door.

Now, the inhabitants of the house can either open the door and let the messenger in or ignore the knock.  If they let the messenger in, they can restrict what he is allowed to do while in the house.  The messenger may, for example, pick up a piece of paper and carry it back to his house.  This would correspond to a file transfer over a network.  If the inhabitants of the house accidentally leave a door open, though, a messenger may be able to come in the house without permission and do whatever they like, again without permission.  (There are many doors because a messenger occupies a particular door the whole time he is “in the house.”)

A firewall, in this analogy, would correspond to a complete facade built around a house (or group of houses, to be picky).  The actual house is not even visible from the street.  The doors of the original house are only visible to messengers if the inhabitants of the house build corresponding doors in the facade.  To enter the house in this scenario, a messenger would have to first knock at some visible door of the facade, be allowed in, and then knock at and be allowed into the actual door of the house.  In this way the security of the house is greatly increased from unwanted intrusions.  (And you can have a collection of trusted houses “inside the fort” which are less protected from each other.)

The title of this essay, “Mental Firewalls,” comes from an article by Timothy L. Thomas which appeared in the Army War College journal Parameters in Spring 1998.  It was titled “The Mind Has No Firewalls.”  The Army has an often honorable tradition going back to the Revolutionary War, the minutemen, and so forth.  But it also has had and still has some treason in its ranks.  This is just the “ground truth,” the “facts on the ground.”  An army that tortures the domestic population is an occupation army.  Treasonous Nazi pigs, in this real sense rather than some spin machine crap or some pathological liar’s bullshit, must be dealt with accordingly.  This holds for all branches of the military.  This holds for law enforcement as well.  It holds for all intelligence agencies also.  It holds even when they pretend the torture devices “don’t exist.”  Even if the victim does not realize what is happening to him or her, it is still torture.  Informed consent must be truly informed.  Torturing an American citizen is at least as treasonous as selling the nation’s top secrets to a foreign power.

Thomas’ article was in fact entered into evidence as part of a lawsuit by Harlan Girard of the International Committee for the Convention Against Offensive Microwave Weapons.  The article’s central metaphor is that human beings are like the computers on a network, except that they do not have the ability to control the information traffic entering and leaving them.  Their ports, or doors, are wide open.  This sort of analogy was prevalent during the military “information warfare” buzzword phase, and illustrates the sort of thinking that was going on at the time.  [On a note of caution, not all of Thomas' article should be taken literally; whether purposefully or not there is some likely disinfo there.]

Deception Operations Against the Human “Biocomputer”

What is it that corresponds to your reality?  What do you perceive, and how do you make your decisions?  You receive information through your eyes, ears, and other senses.  You read the information from the writers you choose to read, and listen to the speakers you have access to — very often these days from TV, radio, or the internet.  You think to yourself, in your private inner voice.  You visualize and imagine.  In information warfare against individuals all of these are thought of as nothing but information channels that can be blocked, censored, co-opted, faked, forged, impersonated, or otherwise controlled to manipulate an individual.  If you can control all the information an individual receives then you can control their whole perceived reality.  Like the hypnotized subject who does something which violates his ethics while being persuaded to imagine he is doing something else entirely, the information warfare subject is acting in a fantasy world created precisely to manipulate him to do what his controllers want.  This is known as a deception operation.

Such complete control, as far as I know, is not yet possible, but the principles still hold for whatever approximation can be achieved.  And the principles have been put into practice.  Of course “information warfare” is a buzzword and most of it is just a take on the ages-old practices of propaganda, lying, and manipulation.  But a new buzzword generates funding, and perhaps more importantly serves to morally distance the new “clean” practices from the dirty, filthy business of amorally manipulating human beings like pawns, with complete disregard for unalienable human rights.  What was new at the time of information warfare was 1) the internet as a widespread societal force, and 2) the wider development of neuroinfluencing and so-called nonlethal weapons that can directly influence people’s brains.

As medicine and technology develop ever more advanced prosthetic devices, people will increasingly become cyborgs — as is already happening.  Because of this trend these issues will become increasingly clear with time.  That is, it will become increasingly common to have computer devices implanted in one’s body.  If someone hacks into your home computer and steals or manipulates your data then a crime has been committed and you should rightly be angry.  But if someone hacks into your physical body, brain, and mind the violation is incomparably greater.

The Basic Modern Mind Control Torture Operation

In this section I will describe the basic torture setup used against our hypothetical, composite mind control torture victim.  The focus is on the effects that the victim experiences, not necessarily the particular technology that is used to inflict it.  Remember in all of this that the torture any individual receives can vary.  It will vary according to the torturers’ motives and technology, but will also be tailored to the psychology of the victim.  What might bother one person would not bother another.  The “professional” torturers will start according to how their torture manuals say to go about torturing someone with your profile, but almost all torturers will refine the torture to the individual if they can.  As they learn what bothers you they can focus on that more and more in their torture.  As you read this, keep that in mind.  These torturers are not any different from the sort you might read about in Red Cross literature, who shock the genitals of victims, etc., except that they have access to abuse the most advanced technology and hide behind an evil U.S. government which sinks to the lowest common denominator of the torturers it protects.

First of all, the victim is under constant surveillance.  The victim is harassed overtly and covertly, on the street, on internet, etc.  All forms of taunting and goading tend to occur.  For example, there is a “Marco Polo” type of “can you catch me” taunting.  Any and all sorts of high-tech and low-tech harassment are used.  (Just because it is sophomoric or pathetic does not mean they will not do it.  In fact, this increases the likelihood that the victims will be ridiculed if they complain.  Remember the shoe powder to make Castro’s beard fall out?)  The victim soon has to wonder about everything that breaks or goes wrong in their lives.  The harassers use their surveillance to see what troubles the victim is having and then try to “take credit” for causing them.  The torturers are often arrogant and even incompetent at their vile torture “jobs” despite using the most advanced technology to commit treason.

The victim is purposely isolated.  People close to them are threatened or deceptions are created to make the victim suspect those closest to him or her.  Deceptions are launched so victims will blame innocent neighbors for the harassment.  (Unfortunately, in the despicable circles of mind control torture, it sometimes is a neighbor or even a close family member that truly is responsible.  There might be an out-of-control “safe house” next door, for example.)

The victim is zapped inside his or her home (or a deception operation is launched so the victim thinks this is what is happening).  Heart rhythm palpitations induced by remote technology can cause terror to an individual inside his or her home.

The victim’s mind is under assault with voice projection, voice cloning. The Village Voice, in an article from July 2001 titled “Psycho Warfare,” described an Air Force report uncovered by Nick Begich.  Quoting from the article,

…the technology may be able to create high-fidelity speech in humans, “raising the possibility of covert suggestion and psychological direction.” It may be possible to “talk” to selected adversaries “in a fashion that would be most disturbing to them.” This is exactly what they do, and there are several different technologies documented in the open literature which can achieve this.  Some victims may be test cases for such psychological harassment techniques, or the method may already be “perfected” and in covert operational use.  [They don't mention this in psych textbooks or in movies about "schizophrenics," do they?]

Twenty-four hours a day, the victim is subjected to commands, ridicule, and distractions inside his or her private mind.  How would it feel if you heard a voice in your head asking, “Can you hear this?” as if someone were calibrating a torture device?  The brain wants to respond; it was never meant to be violated in these ways.  Interrogation.  What might bother you?  Any secrets, etc., the pigs might tease out and harass you with?  Anything that would insult you they could focus on?  Anything that might distract you they could keep you distracted with?

Finally, the victims’ supposedly private, subvocalized thoughts are somehow read, or inferred and analyzed.  There are various levels at which this can occur, from remote heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG signals.  Not all victims report this level of surveillance, and certainly just the other harassment techniques mentioned above result in a grotesque human rights abuse.  But many victims discover that even their supposedly private thoughts are being violated and manipulated.

Living with Constant Harassment

How do you deal with “ordinary” social interactions with the pigs harassing you constantly in your mind?  Do you act “ethically” and warn everyone you interact with that their privacy is also being invaded, by way of you, against your consent?  People you interact with either believe you or they don’t, but either way the social dynamic is completely changed.  The pigs invade the privacy of everyone around you, by using you, even that of your spouse and children.  They may also impersonate anyone you see, in your mind, to make it seem as if that person is the one “contacting” you.  They try to make it seem like everyone can hear your private thoughts, that you are “broadcasting” to everyone.  (Of course some victims might actually be doing that; if they can read your thoughts they could then broadcast them wide-field or local-field…)

What sort of career are you “allowed” to have in a system where your intellectual property is stolen the minute you think it up and where you have to cope with both “regular” harassment as well as harassment in your mind?  All this is in addition to the ordinary stresses of the job — and not to mention that some jobs require actual mental concentration.  How sociable are long-term harassment victims with serious cases of Ongoing Traumatic Stress Disorder?  In American society there are also plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived weaknesses in people and home in on them.  The Nazis can often just wound a person and then throw him or her to the sharks, bleeding.

It is natural for humans to think about other people.  It is even natural to run a mental simulacrum process to imagine and empathize with other people.  Monkey see, monkey do, air guitar, “I was just thinking of you…” etc.  The rapist pigs try to turn this against the human beings they torture.  Sex is also a natural process, as is farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.  The rapist  torturers try to turn this against their victims.  They constantly attempt to demean their victims.  Worrying and anxiety are also normal human emotions.  The torturers, though, try to turn all of these human properties against their victims.

One technique the Nazi pigs use is to try to reinforce anything you might worry about or feel anxious about.  It is like taking a dynamical system and driving it at its natural frequency in order to purposely destroy it.  Of course this is not to say the idiots know anything about dynamical systems.  If you ever read Lord of the Flies in junior high school you know about the level that these pig idiots operate at, but when they rape your brain to inflict such ridicule and hatefulness it sets up positive feedback processes in the brain that constitute torture.  (If I am teaching these idiots anything by this, then you had better watch out because they have already tortured me.)  They will purposely injure you and then pick at your scabs if you start to heal.

This process also happens because you know damn well you are under surveillance and the pig ridicule squad is there to taunt you.  Try not thinking about something you are conditioned with “cattle prods” into knowing will result in harassment.  You know the torturers will zap you — that is why they goad you with triggers at times — but it is like not thinking of a pink elephant on command.   Yins produce yangs, so to speak.  Transcending the yins and yangs is hard enough without the torture.

The torturers treat your personal, private, internal speech as if it were your public speech.  They try to subject you to all the ignorance and “political correctness” and everything else that someone at a podium in a public place might be subjected to.  The sadist nanny state is not just concerned with what you say in your own home, they want to regulate what you think inside your head also.  That can really cause your “moron anticipator” thought pattern to distract from your normal private thinking, because you cannot even think your private thoughts without knowing they will be “reviewed” for you by rapist morons.

The Possibility of Magician-Like Illusions to Deceive Victims

The technology for thought inference does exist, but it is important to keep in mind the ways in which magician-like deception operations can be applied to a person to make it seem to them that their mind is being read.  While some victims’ thoughts are read, all of these techniques have likely been tested on nonconsenting American citizens.  The classic example is where the “magician” first subliminally “inserts” a thought into a victims brain and then later the magician “reveals” what the person was thinking.  By waving his hands and strongly suggesting to the victim that his thoughts are being read, the victim sees the phony “evidence” and tends to believe that is what is happening.  The outrage, indignation, and terror responses the victim is feeling will also tend to interfere with his or her reasoning processes.  Advanced profiling and prediction, based on standard surveillance techniques, is another possible means for deceiving a person into thinking their mind is being read.  While some victims have undoubtedly had such deceptions inflicted on them, the black budget torturers — before they will admit the true extent of technological advancement — will likely try to claim this is what was done in all cases.  Purposefully setting up the illusion of mind reading on a victim, though, is every bit as despicable and criminal as actually doing it.

The setup for the elementary example above can be carried out with only a basic voice-to-skull projection device with the victim in range for some period of time.  Suppose you wanted the victim to think about blue violets, for example.  You could beam at the victim very quiet suggestions of “blue violet.”  You could send them a song that they thought just got stuck in their heads.  You could use voice cloning technology and try to fake their own voice in their head.  Another technique is to transmit a word or phrase that is closely associated with what you want the victim to think about or do, and let their brain’s associative memory do the rest.  Now, after the subliminal send, the tension and drama build until the sadist magician culminates this particular deception operation against the mark (a.k.a. human being).  The magician sends an email to, say, a public mailing list the victim is known to read.  In the text of the message the magician works in the phrase “blue violet” — perhaps combined with a subtle threat.

Multiple Victims, Multiple Perpetrators

The above example is only the most elementary, of course.  What if two victims were interacting, how could a pair of them be manipulated?  The variations include two nonconsensual victims, or a consensual harasser messing with a nonconsensual victim.  There are also witting and unwitting victims; some have figured out parts of what is going on (intended or not) while others have not.  Some have been purposely duped into misinterpreting what is going on – they may think they are psychic, for example.  What about wide-field projection devices?  If two interacting people are given the same subliminal stimuli, how might they interpret it?  If you weren’t paying close attention, would you know if you were the sender or the receiver?  Especially if the manipulation continued for a long period without your awareness, perhaps even from childhood.  When PTSD is purposely induced, the victim is that much more susceptible.  Then you can consider the case where there are far more than two victims interacting:  a society of would-be slavemasters and those they would hold as slaves.  The general situation involves multiple victims and multiple perpetrators, all interacting.

There are many, many different scenarios.  I even considered writing an academic paper on the topic, something like “Mind Control Games People Play.”  Suppose you assume a particular set of technologies is available.  What logically follows from that?  It is like science fiction except that the reality these days is beyond science fiction.  The military might call it wargaming.  It is amazing the hideous sorts of operations that are possible with only your basic secret video/audio surveillance of an individual.  Now assume that a targetable voice projection device exists.  What could the people controlling it do in the worst case?  What sorts of deceptions could they carry out?  What countermeasures could be adopted?  When it really does exist and the consequences are so far-reaching, isn’t it unconscionable to leave the public in the dark about it?  Could a politician resist abusing this secret power?

For the purposes of the rest of this essay I will assume our composite victim has been “injected” or implanted somehow with a “brain bug” that transmits tracking information as well as audio and video of the sights, sounds, and internal subvocalized “thoughts” the nonconsenting victim experiences.  This is something like an advanced form of the CIA’s “Acoustic Kitty” project from the 1960s, where a cat was wired up as a motor-controlled listening device to be used in spying.  The difference is many years of technological refinement — integrated circuits were not even available then, let alone nano-scale devices — and the obvious difference that a human being is being tortured.  I assume that this device can also inject sounds which the victim perceives as if he or she “heard” or “thought” them in internal speech.  This is somewhat less control than what some victims report experiencing, but nonetheless is sufficient to illustrate most of the methods.  Even if such devices are not available to some particular group, variations of most of the techniques can be created by lower-tech methods like standard surveillance devices and external “zapping” or voice projection devices which are publicly known to exist.  The point is not the particular technological implementation, but what the victim experiences.

The Realtime Idiot and the Autopig

The term I use for an external voice projected into a victim’s mind is the realtime idiot.  For an illustration of what the realtime idiots “seem like,” consider a secret studio like at a radio station.  The “DJs” in this case are the rapists “monitors” who sit and listen to the violated thoughts of the victim.  These torturers also have microphones where they can “converse” with the unfortunate victim in realtime.  The victim hears these transmitted voices in his or her head.  Perhaps the rapists also have a virtual reality computer display of everything the victim is doing at the time, or even a display of exactly what the victim “sees” through his or her eyes.  Any thoughts the victim has, the realtime idiots try to pretend it is like a conversation with them.  You could not think a rhetorical question to yourself in your own private thoughts without the realtime idiot’s comments.  You could not pause for a moment of silent mental reflection.  They comment on things, they harass, they goad, they distract, they try to issue “commands,” they attempt to demean the victims (“Go brush your teeth”).  This all while the victim tries to live his or her regular, “ordinary” life and interact in the phony society.

At this point I have described the technique whereby Nazi pigs beam words and voices into the mind of the victims in order to harass and torture them.  This requires too many low-level Auschwitz guards, though.  These dumb sadists may get drunk and start talking, or they may get religion and try to expose their former activities.  The need for personnel also limits the number of victims, or “subscribers,” who can be controlled by the system.  The American answer, of course, is to use technology to automate the process and increase productivity.  This results in a device I call the autopig (or the Cameron/Delgado memorial autopig).

The autopig at its simplest is just a digital recorder that sends fixed “messages” to the victims at random times.  This is very similar to Cameron’s psychic driving torture that he inflicted on people coming in for psychiatric health care.  I sometimes call these random “pulses” Bergeron pulses after Vonnegut’s short story “Harrison Bergeron” (not the movie, which is good but different from the short story).  In the story all people were forced to be “equal” by handicapping those with exceptional abilities, and strong thinkers had to wear a device which would periodically emit a loud tone designed to disrupt the their thought stream.

Of course an autopig could also be used as a computer-aided torture device so that a single human torturer could switch between victims, secure in knowing that none of them was being left alone in their “private” minds.  The Delgado part comes in when the device gets feedback from the victim’s brain and sends an “appropriate” message.  That is, the sensor system analyzes the brain rape data, an AI-like algorithm decides what sort of response to send to the victim, and then the digital voice simulator constructs it and sends it.  Thus each victim has his or her own “electric fence” or something like the invisible fencing they use on dogs but more technologically sophisticated.  (You can consider things like stateful autopigs and stateless, or memoryless, autopigs, and so forth.  It is basic engineering.)

Besides realtime idiots and autopigs, there is something I call a Delgado button.  A Delgado button is a button the harassers can press and which stimulates some part of the brain.  There may be many Delgado buttons, for example, and the harassers learn what each one does empirically by observing the victims.  To the victim a Delgado button would just feel like some sensation, experience, or emotion came over them all of a sudden.  It might occur at a particularly inappropriate time, for example.  It might also serve as a distraction when the pigs wanted to stop some particular thought train you were having.  It might be difficult to notice; some subjects in published research would rationalize such induced behaviors and say that they just decided to do whatever behavior the buttons evoked.  A Delgado button also need not literally be a button and a brain electrode, it could also be something like a microwave beam at a particular frequency and with a particular modulation aimed at a person.  Metaphorically there can also be conditioned “software” Delgado buttons in addition to the hardware wired-in electrode buttons.

Data Analysis Under Torture

Now that I have described the basic mind control operation, in this section I consider the problem of data analysis for a victim of such crimes.  Don’t blame the victims; try to understand the hideous position they were thrown into and which they in no way got to choose.  Naive science-dude has probably not spent 5 minutes considering what victims are forced to agonize over for years.  The situation is closer to game theory with a malicious “opponent” rather than to the usual study of natural science, where natural phenomena are considered to be repeatable (or at least indifferent).

The victims must rely mostly on their own sensations and introspection; that is just the nature of this sort of advanced, secret torture.  This is not to say that evidence of the “ordinary” sorts of harassment should not be collected, or that a breakthrough will not occur and someone will learn how to detect whatever signals or devices are used to inflict the mind control torture and make it available to the victims.  The first challenge for the victim, though, is just to figure out what is really going on.  Many do not even have the language to describe what is happening to them.  They have to see beyond the stagecraft (“tradecraft”) of the Nazi technical illusionists.  The victims need to live their lives each day with whatever mental firewall countermeasures they can adopt in their minds.  Beyond this they can gather evidence to convince other people or for a lawsuit.  They will discover, though, that for the time being the court system, like the psychiatric system, is part of the problem.

How many times does someone have to beam a clearly external voice into your head before you have to question all your thoughts?  Not too many times, once really.  Some victims of this “one-shot” voice projection mind control may still suffer for years.  When will you believe they are not reading your thoughts or that they are not trying to manipulate you?  When the truth commission reveals the crimes?  No, you will never believe them again once you know how the pigs operate.  Most victims suffer from far more than just one voice projection experience, though.

Internal and External Thoughts and Sensory Inputs

Inside the mind, the torture victims really are human beings just like everyone else (even though they are treated worse than anyone would treat a dog).  They see with their eyes, hear with their ears, etc., have internal dialogs thinking about things, sparks of intuition, and all the usual features of the human mind.  As mentioned earlier, these are the processes the mind controllers attempt to hijack.  For the victims we can consider that their thoughts fall into three categories:  internals, conditioned internals, and externals.

An internal is a normal, natural thought grounded in external sensory input that the person consensually engages in.  The usual thought model that most people have the luxury of believing is that all of their interactions are consensual and that their private thoughts are actually private and not tampered with.  That is, they only experience internals.

An external is a nonconsensual input, like Cameron’s psychic driving where a person is strapped down and forced to listen to manipulative recording loops.  In the modern sense, the externals are the voices projected into a person’s mind from an external source.  (You can theoretically have consensual externals, even of this sort, but the victims certainly never saw a consent form and you’d be a fool to consent to having the pigs the victims are familiar with have anything to do with your mind.)  The signal from a programmed autopig chip in the head would also count as an external.  An external could also be an email from a Nazi that is based on mind-raped data.  Any normally consensual interaction becomes an external when mind-raped data or psychological triggers are purposely embedded there.

A conditioned internal, in the sense being discussed here, is an internal thought process that is a direct result of the torture by externals.  The mental “fruit of the poisoned tree,” so to speak.  After a week or so of having “you are a good marine” drilled into your head from nonconsensual externals, then when the machine is turned off there will likely still be the tendency to hear the phrase.  (Besides whatever other damage such harassment causes.)  This is especially true if the conditioning was specifically focused on certain stimuli — though random stimuli also become conditioned in the same way that a bell ring is associated to the bowl of food by the salivating dog.  A similar-sounding phrase, for example, can serve as a trigger for a conditioned internal.  Conditioning during trauma is also strong and long-lasting and can bring back vivid feelings of the original torture experience.

The manipulators can probably get some unwitting victims to march around their own homes like controlled robots.  People’s sensitivity to what is internal or external “in their head” would vary according to the person.  Age, length of abuse, and the particular technology and techniques used would also influence who becomes “witting nonconsensual.”  Perhaps this is a part of what determines who they harass and try to “break” and who they secretly control.  Those susceptible to hypnosis might be especially vulnerable, and some victims may be influenced only while they sleep.  (Is it terrorism to call for blowing up a Nazi torture center that “doesn’t exist”?)

The Protocol

A way to verify that a signal is purely external is via the protocol.  This protocol assumes you have a cooperative person on the other end of the external channel you wish to authenticate.  In practice, what you learn is that if there is such an external channel you do not have a “friendly witting” on the other end.  (And victims know from long experience that there is such an external channel.)  That is, the protocol is a way that a “friendly witting” could authenticate to you the existence of an information channel that supposedly “doesn’t exist.”

If you have visual, auditory, or tactile contact with a person the protocol is easy.  (It is better if they cannot see or hear you, since that constitutes another, uncontrolled data path.)  Suppose you can hear a person talking.  Then the protocol is to think to yourself something like, “say 4533.”  You may wish to choose something else they could say without attracting attention, if that is a problem, but be sure it is something which is very unlikely without a mental send.  Count, say, five seconds for a response.  Either they hear your thoughts or not, and they either respond or not.  In this case the channel is specific to a person and may not exist or the person may not be a “friendly.”  For visual contact the situation is similar, you can think something like, “hold up three fingers.”  Notice that this protocol also works for something like listening to a realtime broadcast such as radio.  A similar protocol works for written media, think “write the number 6423″ and email it to me or put it in your newspaper column.  Note, though, that in all cases there may still be a hidden “man in the middle.”

You can actually verify a pure external send and receive without visual, auditory, or tactile contact.  Just the “mental” contact.  This applies to anyone and everyone who can hear your thoughts and send a reply.  It requires that you have a calculator, and a cooperative person with a calculator on the other end of the channel.  The protocol is, “What is the cosine of 1999?”  The first four digits after the decimal, in radians, one at a time.  If the pigs cannot send that data they are either retarded or engaging in a conspiracy.  There are a couple of other possibilities, including pure internals, but the point is to have a cryptographic authentication challenge to verify a pure external send and receive.  Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator.  I do not know the answer, but I can check it easily.  [You should change the number 1999 to something else for your own protocol, since you want to be able to conclude a pure external read and send.  The number is something you only think "to yourself," and choose a new challenge number each time you check a response with a calculator.]

They never send valid four-digit numeric data, let alone the correct answer.  They do send numerics, though, and could presumably program the answer into the autopig.  And they get sloppy sometimes and you get a good strong piece of data that indicates external reads and sends, even though they do not send the protocol.  This is one reason such a protocol is useful:  It illustrates what the ideal data would look like for a remote read and send, and can help clarify more ambiguous situations.  But keep in mind possible magician-like deceptions as were mentioned earlier.

The Calibration Problem

In evaluating uncertain data in the real world, including that from hostile sources, it is important to calibrate the expected level of background noise.  If you are reading the torture between the lines, you also need to keep your head and not go off on too much unconnected symbolism.  Keep this in mind when reading items that truly could not possibly relate to you or your situation.  This gives you an idea of the basic background level for symbols, etc., to appear.  Keep a threshold and discard any questionable data.  The good data points tend to be frequent enough, and at some point even they do not tell you much you do not already know.

As an example, suppose you cursed the pigs, just in your head, sometimes.  If you get them angry they sometimes screw up.  Say you were taunting them by asking them whether they picked up your thoughts in Niger (as an random example of a far-off place).  By the way, you can taunt them all you want in your head, since it is only you and the Nazis there.  Likewise, curse the pigs that bug your house all you want.  They just do not seem to understand that if they reveal anything they know about your private mentation or private conversations in your home they cannot call you crazy.  It would be like entering the FBI tapes of Martin Luther King saying the FBI was out to get him as evidence that he was paranoid.  “The voice in my head said I was crazy.”  Back to the Niger example, suppose you then get email from someone claiming to be a victim, who has a name very similar to yours, and who claims that he went to Niger and could not escape the harassment.  That seems pretty unlikely for a coincidence.  Then the question is, is the person a witting or unwitting harassment agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro agent?  How many people have been to Niger?  Many victims are understandably afraid to talk about such experiences, though.

Reasoning Under Uncertainty

One thing that the mind controllers do — and which manipulators and propagandists have done for all time — is to exploit weaknesses in human reasoning.  The brain is a fantastic, beautiful organ of the human body; no human being on the earth should ever be tortured.  But humans also tend to have some weaknesses in evaluating data compared to, say, a mathematical algorithm.  One difficulty lies in dealing with uncertainty.  The mind control victim is literally overwhelmed with uncertainty and must sort things out as best as he or she can.  The victim has to consider every weird thing that has ever happened to him or her, whether it is related, and knowing that the mind rapists will see this thought process and try to reinforce any misconceptions.  Another difficulty is dealing with distractions, especially when they come in on a hostile “channel” that the brain was never meant to be accessed on.  Proportionality and scale are another difficulty, and people tend to think binary rather than continuous, and one-dimensional rather than multi-dimensional.  People often have a tendency toward superstitious thinking.  Finally, in a social sense, people are very bad at dealing with big lies, i.e., conspiracies of liars.

Understand aggregate statistics.  You can sometimes reason better with them.  As an example, you know that there are some people in the world you can trust; you just don’t know exactly which ones they are.  You can often estimate aggregate statistics better, since if you get one wrong here or there it all averages out.  Suppose you estimate, based on a great deal of data, that posters on some mailing list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who probably consider themselves scientific, nonsuperstitious thinkers looking for the truth, and another 10% who are unclassifiable.  There are some who you are sure enough about to not worry with percentages, but in general any particular person on that list is “suspect.”  Nonetheless, the list can still function as a way to reach and connect the 35% of mind control victims and activists.  It may also serve as a way to convince and educate some of the actual open-minded decent people who are not mind control victims.  Another use of aggregate statistics is to reason from historical records.  We know that there are thousands of mind control victims in the population, at the least.  We just do not know which particular people claiming to be victims are the actual victims (or which still unwitting people were/are victims).  Never forget the humanity of the real human beings involved in the statistics, though.

The Asymmetry of Dignity

You are a human being with unalienable human rights.  Unalienable means that they cannot be taken away.  They can be violated, infringed, ignored, and even legislated away, but the acts of a tyrant do not change the fact that you are a human being with unalienable human rights.  This means that the tyrant is always a tyrant, and remains a tyrant, to meet the fate of tyrants.  The same holds for the lackeys and collaborators of tyrants.  This is a fundamental asymmetry between the citizen and the tyrant.

Torture demeans the torturer.  The dignity of the torture victim cannot be taken away by the torturer, but the act of torture destroys the dignity of the torturer.  This is not enough punishment for such hideous crimes, but gives cause to pity the torturer even as you work to hang the pig.  Let me explain about what I mean about justice for the victims of these treasonous Nazis, who commit crimes against their fellow American citizens in peacetime which would be war crimes even against an enemy in warfare.  Under a legitimate government such people would receive life sentences in a humane prison system.  That would be my preference, but the United States currently has neither.  So when I talk about hanging the pigs I am referring to whatever justice-type processes can be set into motion.  That was the subject of Part II.  Get the right ones.  We will not forget, and when these pigs are 75 years old they are still Nazi pigs and still serve the rest of their worthless lives in a humane prison cell if such exists.  The legitimate government treats mind control torture like the true crime it is, even when government agents are involved in committing the crimes.

You have absolute free mentation in your brain and mind.  Your freedom of thought is unalienable.

The Nazi Pig Theorem

The adjective, “Auschwitz-level,” to describe these crimes, is not hyperbole.  If you do not feel like you need to vomit, you probably do not really understand the full sickness of mind control crimes.   Gordon Thomas wrote in the introduction to his book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse: “In working on this book I have had to come to terms with my own emotions — disbelief, bewilderment, disgust, and anger and, more than once in the early stages, a feeling that the subject was simply too evil to cope with.  Nothing I had researched before could have prepared me for the dark reality of doctors who set out to deliberately destroy minds and bodies they were trained to heal.” Torturers can never blame their victims, though they invariably try.  These torturers are the sorts of people who will repeatedly hit a bound and gagged victim with a stick and then try to claim the victim caused it.  They’ll steal from you and then complain about the property they stole; they’ll rape you and sneer at the quality of the “sex.”

This brings me to what I refer to as the Nazi Pig Theorem (NPT).  Strictly speaking it is a metaphorical axiom, but it can be very useful to the torture victim.  It basically asserts that if you act like Mengele then you are a Nazi pig.  Then there are a few obvious conclusions that are also part of the “theorem.”

The Nazi Pig Theorem (NPT):  

Anyone who nonconsensually violates your brain/mind/mentation using Mengele-like methods is a Nazi pig.

 

You do not care what a Nazi pig thinks.  You do not care about a Nazi pig’s opinions.  You do not respond to a Nazi pig ridiculing you, threatening you, trying to distract you, or otherwise trying to manipulate you.

You work to get a Nazi pig hanged.


Isn’t that obvious?  Don’t you believe it?  Then remember it and act like you know it.  NPT is as sharp as a razor.

The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not raping your brain.  So you can think anything about anyone; it’s just you and the Nazis in your mind, and their opinions do not matter at all.  If you have a passing thought about someone and the Nazis try to harass you with it or make you feel guilty about it, it does not matter.  The Nazi pigs’ opinions do not matter (unless they somehow help to get the pigs hanged).  If you think some thought about someone who really is raping your brain, then you have some worse things to think about that Nazi piece of human garbage than what floated through your brain originally.

One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are being tortured and you know the true, evil nature of the society you are living in.  Spend some time each day working for justice in the physical world, and the rest of the time try to ignore the Nazi pigs and get on with your life as best as you can.  My philosophy is basically to wish people well, and any differences I have had with people are all water under the bridge after not too long.  But atrocities never, ever pass under the bridge.  The victims never forget, and never should forget.  Of course any victim is free to choose to forgive his or her torturers, but for torturers to lecture their victims about forgiveness is the “Christianity” of the oppressor.  Forgiveness also does not preclude justice.

The unfortunate reality is that when dealing with anyone, they are either a Nazi or a non-Nazi.  Torture makes it that clear.  This is the top node of the decision tree for the torture victim, and it is a stark split.  The following diagram illustrates the split:

That is clear enough.  Of course the difficult part is that you do not know exactly who is a Nazi pig and who is not.  So you might start off with a reasonable benefit of the doubt and collect evidence from there to update your current assumptions.  But how do you deal with someone you think has a 10% chance of being a Nazi pig?  How do you deal with someone you think has an 80% chance of being a Nazi pig?  That is your own utility/decision function and it is not easy.  People have to make decisions based on imperfect information all the time, but this purposefully inflicted torture pushes it past what people are accustomed to have to deal with in ordinary situations.  Nonetheless, the government is accountable for the aggregate situation where torture occurs regularly and systematically in American society.

The NPT is your firewall.  As a corollary, the external firewall theorem states that you do not care in the slightest bit what Mengele thinks.  Analyze the external incomings for nature and source, as well as for other evidence if you choose to, and then send them straight to your mental /dev/null.  Then work each day to get the pigs hanged in the real world, in the best way you can figure to do it (see Part II).  There is also an internal firewall theorem:  Your brain is your own to think whatever you want with.  Simply invoke IFT and think about something entirely different if you are thinking something that you don’t want to be thinking about.  Train yourself toward that, at any rate.

Some Suggestions for Thinking about the Harassment

The way to think of a nonconsensual external is as an advanced cattle prod that can be modulated in various ways to cause you pain.  The modulation happens to be with words or clicks, but that is secondary.  It is a modulated cattle prod.  Notice it and try to get a feel for the nature and source of the signal.  Where does it seem to be coming from?  What is the quality of the signal?  Later you can analyze the psyop sentence the pigs modulated onto the cattle prod signal if you feel like it.  (This may reveal more about them than about you; the modulation is based on “you” reflected off of their filthy Nazi distorting mirror — with their intention being to cause you harm.)  You might keep a rough histogram count on the autopig phrases, for example.  Does the signal ever have a foreign accent or speak a foreign language?  Probably not.  But basically understand that the Nazi pigs are complete, pathological liars.  If they flatter you one second they’ll kick you in the head three beats later, you can almost count on it.  Pathological liars only tell the nominal truth as part of a larger lie, and the purpose is to destroy your mental well-being and your life.

Source before semantics (signal before semantics).  The source is where the signal comes from, both the “person” sending it and the sensory input method by which you receive it.  The semantics is the meaning of the signal: it is the interpretation of the signal and its modulation.  For example, the semantics of a signal will often be its interpretation as an English sentence.  If the signal comes in on a rape channel, do not even give it a semantics except perhaps as part of an evidence-gathering process.  It is just a sensation you feel from the external cattle prod.  The presence of the nonconsensual external signal itself is torture and is the only real information, since the modulation is by pathological liars whose intention is to cause you harm.

Don’t debate the autopig (or the realtime idiot).  Even if it’s easy.  (Unless you feel like it.)  They hate it when you ignore them.  Go on with your ordinary life, meeting people, etc., and especially speaking out and working for justice in the real world.  You can only really ignore them when you know what is going on, though.  Some of the people who they march around their own homes like robots probably think they are just ignoring it.  There is a big difference between an experienced victim deciding to ignore future signals and some well-meaning advice-giver who has never been tortured telling you to “just ignore it.”

If it is indistinguishable from an autopig, treat it as if it were an autopig.  With some basic voice-recognition type software applied to raped subvocalized thoughts, I could write an AI-like program that sounded just like the repetitive, simple-patterned Nazi pigs I am familiar with.  In this sense, the realtime idiots do not even pass the Turing test.  Actual people (who are not torturers) have names, they do not repeat things endlessly, they think things other than harassing you and commenting on your thoughts, and they can push a few calculator buttons.  For instance, why do you never hear someone driving their car down the street thinking “use a turn signal, you asshole”?

Don’t explain your thinking to the Nazi pigs, it is better if they misunderstand what they rape from you.  By default you are only ever thinking to yourself.  Work toward the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as you can manage.  Try to extinguish your conditioned responses and replace them with only an awareness of the triggering sensation.  Some are random events acting as triggers, while others are purposely inflicted.

It may help to write about what you experience or keep a journal.  There are pros and cons to this, though, since the pigs will have access to what you write also.  It might provide them with feedback to help them torture you or others.  If you complain about something they will almost surely start doing it to you more.  You have to weigh whether writing about it helps you to deal with it, like when you can share it with other people or when you see how stupid it really looks when written out.  Stupidity is no barrier to the torturers, in fact it is part of the torture.  For example, if you make a self-deprecating joke it will not be long before the pigs are goading you with the subject of that joke for real.  Of course much of the torture is never anything clever the torturers do, but your own knowledge that these people who do not even know you nonetheless hate you enough to violate your mind and then go to a great deal of effort to try to inflict serious harm on you — often seemingly for their own entertainment.

Try tuning out the pigs like you might cure yourself of hiccups.  It might work, or at least help you train yourself to ignore the pigs.  Notice the nature and source of the signals, the mental gnats meant to annoy you.  Parasitic mind fleas.  If you think like the monkey, you’ll be as dumb as the monkey.  If you watch that TV too much you’ll be as dumb as the morons on it.  They will entertain you right into digging your own grave.

How Can a Society I Detest Defile Me?

How do you deal with a secrecy-bred society of dumb-as-cows “innocent” people, Nazi pigs, and victims?   Or the collaborators, apologists, and profiteers?  What about the people who idiotically ask, “Why are you ongoing torture victims so obsessed with your torture (and human rights, etc.)?”  The social system where no one can talk about the elephant in the living room, even though many people know at least that something is there.  Did people not get born with tongues to speak with?  Or is this a conspiracy of idiots and cowards?  What the hell is wrong with these people?  What kind of people complacently live in a society where torture regularly and systematically occurs, pretending it doesn’t?  Is it still that old pig slaver mentality, or the ability to look away from such abominations as an everyday thing?  For centuries it was forbidden to teach slaves basic skills like reading.  Is it better if you can read but only have access to lies?

Every day for the mind control victims, it is like the rape victim who has to go out and interact in the society where her rapist is still at large.  The difference is that there is a whole conspiracy of rapists and they rape the victims each and every day.  So perhaps it is closer to what were euphemistically called “comfort girls.”  How do you think it feels to wake up with a pig in your head?  Is that the only alternative to being dumb as a cow and wearing a gag in this society?  The “consensus reality” of the average citizen is far, far from the real truth on the ground.

Americans are the best liars and biggest hypocrites on the planet.  They will probably even be flattered by that description.  They love being number one, after all.  Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big hypocrisy.  If you credibly call an American a big-sense hypocrite they will often start spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling someone their new haircut looks bad.  Americans want to be both peepers and prudes, they want to rig the game and call it free enterprise, and they want to be known for freedom and liberty regardless of any domestic atrocities they commit.  You can never un-torture someone.

If people are capable of outrage there will be far fewer outrages.  How dare those pigs do that to anybody.

Follow

Get every new post delivered to your Inbox.

Join 97 other followers