Category Archives: Torture

Forced Dreams (Mining for Information)

“Thought reading”, i.e. “MINING” someone’s brain for information from a distance is SPECULATIVE. We targeted individuals have no way to verify that is happening, however, we do know that we are “fed” hypnotic signals to force consistent “neutral” content DREAMS(but of different character than prior to becoming test subjects,).

These forced, neutral content (“bland” content) dreams occur every single night and may represent the harassers’ (or experimenters’) efforts to have our experiences portray themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION, but it seems very logical. It is therefore extremely likely that these forced dreams can be displayed on the experimenters’ screens in an adjacent apartment or adjacent house, (which are
made obvious to the involuntary experimentee.)

Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us about events inside our homes at times when they could not have seen from the outside.

Some of the ” forced dreams” are pretty much surreal and disconnected from normal dreams pattern.

This is the basic idea for the movie INCEPTION.

ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY (Mind Control in Practice)

The British Mind Control Agent

By C L Heywood (Copyright 2006)

Contents

1.    THE BRITISH MIND-CONTROL AGENT (An Introduction)

  • Introduction
  • Battle for the Mind
  • The Mind Controllers (MCs)
  • The Human Brain and Behaviour
  • Covert Wars With Civilian Populations – Human Experimentation and MKULTRA

2.    Electronic Harassment and Implant Technology (Mind Control in Practice)

  • Alien Abduction and Medical Exploration
  • The Human Body, Radio Communication and Electromagnetic Stimulation
  • The Implant Specialists
  • The Gaffer
  • The Design, Testing and Analysis of Implants

3.    The Human Body and Private Home is a Sacred Temple?


the British MindControl Agent

(An Introduction)

Introduction

Conspiracy theory is a very controversial subject and has captivated the media’s attention for countless years. Journalists, due to their exceptional capability to sniff out a story, have actively leaked and exposed information of a classified nature in an effort to prove to themselves and anyone who will listen just how prominent government corruption really is.

On a global scale every nation funds its own team of secret police and military enforcers whose prime objective is to sustain and develop national-security strategies and policy. Understandably the majority of their activities are conducted covertly on an extensive level; MI6, the CIA and the KGB being prime examples. Their various dealings have always been enlightening if not interesting, suggesting they have murdered, poisoned, gassed, drugged and brainwashed enemies of the state and unwitting citizenry on a surprisingly frequent basis. It is also proven fact that these intelligence-gathering establishments have conducted unethical testing on their own soldiers and intelligence personnel using a varied range of lethal arsenal. Journalists have detailed these arcane schemes and suspicious goings-on in their books, magazines, movies and television documentaries. ‘Mind Control’ in particular has taken centre stage. John Marks’ The Search for the Manchurian Candidate, for instance, highlighted extensive CIA pursuits of mind-control intelligence and weaponry.

Undoubtedly the pungent cocktail of national-security legislation and lack of primary sources to interview places restrictions on the research avenues that journalists may pursue. As a result, the secrecy surrounding mind control developments has now piqued unquenchable global curiosity.

Battle for the Mind

Since the beginning of civilisation topical issues concerning the human brain have always attracted substantial attention for a number of obvious reasons. The human brain is a most valuable asset and extremely unique, as it holds the precious cocktail of individuality and personality. It is what separates the timid from the aggressive and the academically gifted from Mr Average. The brain controls physical movement, all cognitive capabilities (memory, counting and language) and regulates a vast array of bodily functions.

Although substantial headway has been made in pursuit of understanding the brain and its function, scientists are still a long way from mastering and controlling the mechanisms that work within it. This situation has uncovered many dilemmas for law-enforcement agencies, the military and medical communities, who all believe there is great potential to be found in mastering physical control of the brain and mind.

Criminal psychologists, for example, are no longer blaming environmental circumstance and adverse social conditioning as the sole cause of criminal activity. They stress some individuals may be more susceptible to committing murders and assaults due to their inherited genetic wiring. This theory asserts that there are chemicals within the brain which can trigger anger and antisocial behaviour. Those who commit grievous bodily harm may be victims of chemical imbalances which they are unable to control without the intervention of drugs and other inhibitors. Naturally it is hoped that brain exploration will offer some answers.

Medical practitioners and surgeons believe chemicals in the brain that influence behaviour may be supplemented or suppressed by drugs which in the long run can make an individual’s behaviour more desirable and manageable. They foresee great potential in the use of implants and other artificial aids to assist the body’s performance and maintain organs to optimal working condition. Consultants view the exploration and control of the brain as a fascinating realm of discovery where new breakthroughs in psychiatric treatment and disease can be made. Utilising medical research and analysis, their sole objective is to rid the world of every brain dysfunction and life-threatening condition known to mankind.

The military, unlike the medical and law-enforcement professions, hold slightly different interests in brain exploration. The brain, in their eyes, contains the ultimate secret to world domination, biological warfare and intelligence gathering. They wish to discover newfound ways to torture, interrogate and annihilate enemy troops and civilians of opposing nations. They strongly believe that the man who can crack the complex code of human behaviour is the man who has the power to manipulate, control and modify the actions and thoughts of another.

It is abundantly clear why so many government-funded establishments are interested in methods which control human brains and minds because the capability to detect criminals, advance medical technology and win wars runs paramount with the security and advancement of British society.

1.   Criminals cost the British government millions of pounds in surveillance, rehabilitation, punishment and victim-support services.

2.   An unhealthy nation places pressure on the social services and hospital staff, as well as spreading disease and infections which are difficult to eradicate. Humans with permanent illnesses are repeatedly forced into unemployment as a consequence.

3.   Intelligence agents and soldiers are very expensive to pay; the government could cut MoD, MI6, police service and MI5 workers by a quarter if they could infiltrate plots, assassinations, expose spies and ascertain threats to national security using quality technological surveillance and interrogation techniques.

Scientists who can unravel the mysteries of brain function are worth billions of pounds to the British government and are now in mass abundance. Ultimately, it is the unhealthy and often stressful state of government politics, and heightened security fears, which have led to the emergence of the mind-control professional.

Many will have their own definitions of mind control and its meaning, and these definitions often vary slightly. This paper follows the assertion that ‘Mind Control’ encompasses all theoretical and technological applications which are used to gain minimal or complete control over an individual’s brain or psychological state of mind and behaviour, both covertly and overtly. The aim of the game is to control an individual to the point where he will do the manipulator’s bidding against his will or, alternatively, to adjust his behaviour in a desirable way in order to satisfy an expressed agenda, whatever this may be.

British research into mind control technology is a very important issue and stands high on the political agenda.

The Mind Controllers (MCs)

Scientists who conduct mind control research for British intelligence agencies are commonly referred to as Mind Controllers (MCs). Their main aim is to:

  • design and produce lethal and non-lethal mind-control weaponry which can be used against criminals, foreign government spies and military personnel;
  • design and use equipment which can counter the affects of foreign mind-control techniques, and prevent spies and terrorists from extracting/intercepting information from British agents, military scientists and politicians.

MCs are a special task force of multi-skilled professionals who are funded by the British government as secret agents. These operatives are deployed and assigned to a diverse range of projects depending on their expertise and, as a cohesive force, comprise doctors, psychiatrists, neurologists, teachers, criminologists, forensics, IT specialists, telecommunications technicians and child-development professionals, etc. For the most part MCs are employed within the social care and public service sectors and, as a result, have primary contact with members of the public. This brings them closer to observing human behaviour in its rawest form and enables interactivity with personalities and, ultimately, functioning brains. They are by necessity a rather corrupt lot as their research methods often take them down roads which lead to performing both invasive and non-invasive procedures on the brains and psyches of well-adjusted citizens without legal consent. These operatives, for instance, are notoriously known for their involvement with implant technology, psycho chemicals and the brainwashing of military captives.

As active behavioural scientists MCs are great believers in trial-and-error experimentation and follow this principal like a bible. A practising mind controller must torture a real human being to acquire credible information on torture and its effect on the physical body and mental state.

Mind Control Applications:
Sensory deprivation (to create disorientation and fear) Torture/physical assault (kicks, punches, burning, cutting, electrocution, sexual assault, chronic induced sickness, cramps, vomiting, temporary blindness)
Verbal abuse (shouting, threats and insults) Starvation and dehydration
Positive and negative reinforcement/ punishment versus reward Hallucinogens (induced paranoia) and narcotics
Sleep deprivation Induced personality disorders
Hypnosis Electromagnetic frequencies (the use of electromagnetic waves to influence the human brain)
Sound technology (the incessant use of music and voices to arouse certain thoughts and feelings) Brainwashing and totalitarianism
Lobotomy and neurosurgery Interrogation techniques and lie detectors – polygraph tests

This table represents just a snippet of the work MCs are primarily responsible for, and accounts for the substantial amount of mind and behaviour research circulating university lecture theatres and colleges.

The most alarming aspect of mind control research is that experimentation on the unwitting human being is condoned by security bureaucrats and military personnel, who have convinced themselves and the involved parties that their sometimes ruthless investigations are honest attempts to search for scientific truth. It is of small consequence if the pregnant mother is given LSD without her knowledge as the investigative results may revolutionise the way LSD is used in the future by the British population; and by business sectors who treat LSD addicts, and pharmaceutical companies that produce and examine LSD properties.

The case of Frank Olson, for instance, in 1953 highlighted the dangerously dark side of human experimentation when the scientist plunged to his death from an upper-floor window after CIA mind-control agents spiked his drink with LSD.

The phrase ‘one life for many’ is the core golden rationalization here and, irrespective of links with law enforcement, MCs aren’t strangers to unconstitutional murder as some of their projects are terminal, meaning the victim’s life is expendable and the objectives of the study must be fulfilled by any means necessary.

Mind-control operatives establish themselves as law abiding social scientists whose prime objective is to nurture society to help it flourish and develop to its full potential. In the idyllic society man is co-operative, productive, law abiding and happy to help his fellow man. He is flawless, a well-balanced individual with the drive and motivation to promote and encourage happiness wherever he goes. There is no place in harmonious society for his exact antithesis. Via tampering with the human brain MCs hope to determine what causes differences in behaviour and find ways of manipulating the natural processes of thought and behaviour with the intention of ultimately dictating it.

British security acts legislate MI5 (the security service), MI6 (the secret intelligence service), GCHQ (Government Communications Headquarters) and national crime services to work in partnership and direct support of one another’s schemes. Mind-control agents are no exception to this rule and have the full use of government services at their disposal, including the Metropolitan Police Force. Their use of covert torture, expansive spy network and spates of criminal activity identify them as some of the most influential and dangerous civil servants functioning in political arenas today.

The Human Brain and Behaviour

To run a plausible mind control operation MCs must remain informed about new developments within their field. This means being open to the idea that theorists from a variety of occupational sectors may inadvertently offer new, healthy, innovative notions from which feasible mind control strategies may be born. This section explores two fundamental mind and behaviour theories.

One very famous pioneer interested in the advancement of brain exploration was Dr Jose Delgado. He became the Professor of Physiology at Yale University and wrote the controversial book ‘Physical Control of the Mind: Toward a Psychocivilized Society’. Dr Delgado highlights the need to study the brain as a quest for human survival. He stresses that man survived life where other species, like the dinosaur, failed because of his unique ability to acquire knowledge and adapt his behaviour to the harsh elements. He insists man has come a long way since realising he could increase his welfare and wealth by investigating the properties of the planet and manipulating their function to his own devices. He portrays the human being as a master manipulator of the environment, flawless in many ways but ignorant of the conscious mind working behind the innovations and formations he creates. Ideally the doctor hoped to use his findings of brain exploration as a stepping stone to creating a healthier society.

His genius lies within his ability to carefully weigh up the advantages and relevance of brain activity in everyday living. He states the following issues as being at the foundation of his theory.

“There are basic mechanisms in the brain responsible for all mental activities, including perceptions, emotions, abstract thought, social relations, and the most refined artistic creations. These mechanisms may be detected, analyzed, influenced, and sometimes substituted for by means of physical and chemical technology. This approach does not claim that love or thoughts are exclusively neurophysiological phenomena, but accepts the obvious fact that the central nervous system is absolutely necessary for any behavioural manifestation.” (Delgado J, 1969)

What Dr Delgado highlights is the fact that the human body is a machine (controlled by the brain), and that its overall behaviour, response and function may be predicted and modified. This theory reaffirms the MCs’ suspicion that, with the right selection of armaments and expertise to hand, they could manipulate a human into doing anything they so desired.

  1. A prisoner of war may be brainwashed into another way of thinking using advanced conditioning and thought-reform techniques. Ultimately, the soldier switches sides and starts working in partnership with the enemy feeling and believing the enemy’s pain.
  2. A human being may be drugged and suspended in an emotional high of acute depression or prolonged euphoria for weeks at a time.
  3. Mind-reading machines could extract a human being’s personal thoughts and decode them into actual verbal or textual output. Intelligence hidden within the realms of the brain would no longer be inviolable.

To understand further the full implications of brain activity on human behaviour, academics Mark Vernon (neurologist) and Ervin Frank (psychiatrist), who are both active researchers in violence and anger management, highlight some interesting points in their book ‘Violence and the Brain’. Although Vernon and Frank agree there are a number of factors such as poverty, family background and negative social conditioning that may contribute and nurture violent behaviour, they also believe the functioning brain holds substantial influence. They claim that all states of being and behaviour are an indication of the functioning areas of the brain; the brain’s interaction with the external world, memory and the association the brain makes with past and present information and experience. Chemical balances within the brain, its physical composition and response to transmitted information from the rest of the body are all significant influences.

Vernon and Frank stress that there are parts of the brain that, in ‘susceptible individuals’, help trigger violence. These areas can be pinpointed clearly and are often associated with aggression-based feeding, fleeing, sexual activity and fighting. Their general viewpoint asserts that there are different types of violent behaviour, and that these negative outbursts can be analysed and categorised into predictable causes, influences and outcomes.

From a political perspective, violent acts help to whittle away and undermine respect and co-operation for the laws the British government uphold in the regulation of civilian behaviour. On a global perspective, governments are placed in the inevitable position where they must spend billions of pounds on an annual basis paying for the damage that (foreign and native) rioters, terrorists and vigilantes inflict on property. It is, understandably, the MCs’ responsibility to help contain this problem and redress the balance of power.

Due to the nature of their work (espionage, sabotage and military enforcement) MCs are active participants in violence and aggression, but are also frequent casualties themselves. It is only logical, therefore, that they maintain a vested interest in this arena.

Covert Wars With Civilian Populations – Human Experimentation and MKULTRA

Mind-control victims (MCVs) are very diverse characters of differing background, age, race and class. Individual claims of victimisation tend to be extremely uncommon and are especially sparse in relation to the world’s population as a whole. One is more likely to come across witches and Santa Claus than genuine MCVs.

First of all, there aren’t any apparent limitations as to where MCVs and MCs are found. Evidence clarifies that they are actively resident in America, Sweden, England and Canada, and most likely the rest of the world too. Secondly, human subjects are usually ‘Mr Average’ and have no social links with either government agencies or dissident groups. Only a sparse number are members of spy networks, or terrorists who pose a genuine threat.

The general characteristics of mind control victimisation suggest MCs are running extensive experiments on MCVs ranging across continental borders.

  1. The British are deploying their MCs to foreign countries to acquire experimental subjects.

2.    Operatives are picking to order individuals of varying background and personality trait for experimentation at home and abroad. Subjects are administered mind control arsenal unwittingly in hospitals, military bases, psychiatric institutes and jails. These environments are most beneficial and conducive to mind control research as potential victims are incarcerated for the immediate. This provides MCs with the opportunity to control the treatment that subjects receive, enabling greater flexibility. Operatives are able to use the results provided as indicators of how their arsenal would realistically perform in the field.

3.    Victims range from the newborn child to the elderly, suggesting there is a great need for extensive studies spanning a possible eighty years of an individual’s life. Undoubtedly human development and age influence the efficiency and practicality of some forms of arsenal. When administering hallucinogens, for example, the dosage must be customised to the size of the person, and gender is an obvious issue.

Perhaps the most notorious mind control experiments known to mankind were those conducted by the CIA (Central Intelligence Agency) in the mid-twentieth century. They began their research in the early 1950s under the code name MKULTRA and it was rumoured that superpowers Great Britain and Canada joined the MKULTRA scheme as a partnership, aiding with the testing and intelligence gathering. The CIA were particularly interested in studies concerned with memory enhancement, psychotherapy for psychological-warfare purposes, truth serums, poisons and electroconvulsive therapy.

The CIA had an extensive requirement for human subjects and strove hard to find them. Unwitting victims were the most prized as their reactions to arsenal realistically put theory into practice and was the ultimate indication of success or failure.

Mr Harvey Weinstein, a qualified psychiatrist (in partnership with the American Psychiatric Press), published the book ‘Psychiatry and the CIA: Victims of Mind Control’ to shed some light on the entire MKULTRA affair. In the book, Harvey passionately makes firm reference to his father’s admission to the Allan Memorial Psychiatric Institute (Canada), where he was treated by the renowned professional Dr Ewen Cameron who at the time had been commissioned by the CIA to undergo testing on his patients. The experiments hoped to provide exceptional insight into the effects of sensory deprivation, electroconvulsive therapy, LSD, Chlorpromazine, coercion and thought reform. Dr Ewen Cameron called his technique ‘Psychic Driving’.

Following unrelenting global exposure and prosecution from MKULTRA victims, the CIA were rumoured to have burned all their mind-control files during the 1980s. However, conspiracy theorists and members of the American military remain sceptical, believing that the MKULTRA project is thriving but has evolved into a new scheme utilising exactly the same techniques and regimes.

Britain’s MI6 might not have officially been charged with MKULTRA dealings like the CIA but were equally active in the programme, and were major players in the race for political power and world domination. Whilst mind control techniques and strategies may have changed throughout the decades, the ethos and concept remains the same. The British Empire hasn’t faired badly in war on a global perspective and their pursuit of mind control strategy may be one of the many reasons why.

Definitions of some of the most prevalent mind control specialisms are listed below.

ESB (Electrical Stimulation of the Brain)

ESB involved the transmission of electrical currents (using electrodes) to different parts of the human brain. Using ESB, MCs could influence the human thinking process, manipulate motor movements and place victims under a number of different emotional states, like anger, happiness and fear. ESB proved the human body could be controlled externally via the brain by use of permanently implanted electrodes and a remote control.

Sound Technology

Sound technology focused on the effects music and sound have on mental health; how certain lyrics, melodies and frequencies of sound conjure up specific fantasies, thoughts and feelings within the mind. Tunes that were played repetitively, for instance, induced depression, violent thoughts, and a sense of loss and helplessness. Others cheered people up and invoked thoughts of freedom, anarchy and happiness. This led to the understanding that concentrated, prolonged, highly explicit lyrics could aid interrogations and the ‘breaking’ of captives. This is because musical lyrics and their topical content (love, family, aspirations, sex and guns) linger within the realms of the brain’s thoughts via association even after the tracks have stopped being played. MCs ensure the captive hears music prior to and after interrogation to invoke emotional instability and lack of confidence.

Brain Mapping

Brain mapping was of great interest and concerned research that helped MCs pinpoint which parts of the brain and body were responsible for different physical capabilities, e.g. the ability to recognise smells, hear, talk, read, count numbers, be sympathetic and memorise. This line of research was pursued primarily with the intention of finding ways to understand and define human behaviour for eventual manipulation.

Sensory Deprivation

Sensory-deprivation studies investigated the psychological and physical effects the prolonged absence of touch, sight, hearing, smell and taste had on human behaviour. Popular techniques included those of:

  • blindfolding captives using goggles and bags;
  • forcing captives to wear sound-proof earmuffs;
  • afflicting the ears with loud, frightening noises for prolonged periods in pitch darkness;
  • bright, fluorescent, flashing lights, which blinded the eyes;
  • exposure to severe temperatures of heat and freezing conditions.

Military captives who were consistently denied their physical senses for weekly and monthly periods were prone to extreme fear, disorientation, dizziness, nausea, trauma and suicidal thoughts. Captives also lost track of time and were unaware whether it was night or day.

Brainwashing and Behaviour Modification

The capability to surreptitiously alter an individual’s point of view and direct him towards another way of thinking attracted radical attention from MI6. They believed human beings could be influenced during interrogation and incarceration periods with greater efficiency, manipulating individual viewpoint and attacking personality trait. This strategy was achieved in the following three ways.

  1. Attacking the identity of the person. Subjects are racially abused; prominent physical features, like a large or small nose, are ridiculed; religious and occupational beliefs are questioned. This depletes the subject’s confidence in himself and, in an ideal scenario, the subject takes on the manipulator’s viewpoint and wallows in self-hatred and pity whilst striving for new perfection.
  2. Stripping the person of all decency. The subject is denied clothes and forced to face the humiliation of being in the nude whilst perpetrators persecute him. He is made to beg for food and water, and asked to complete outlandish tasks, such as standing on one leg and hopping up and down for an hour. This technique reinforces the idea (in the subject’s mind) that he is owned property (a slave) and that to cough, laugh or urinate without being granted permission to do so is a sin and a direct act of defiance, punishable through death.
  3. Enforcing morality and conformity. Using a mixture of positive and negative reinforcement, the subject is rewarded minor praise and gifts for his efforts when his behaviour is deemed acceptable. This means extra recreation time, larger food rations, a clean shower and the acquirement of items like books, pens and paper. In the case of negative reinforcement, the subject is beaten, verbally abused, sexually harassed and tortured using a wide range of arcane instruments. The subject lives by the perpetrator’s rules without questioning them and does what he is told. Out of genuine necessity the subject sees conformity as a means to survival.

Sleep Deprivation

Sleep deprivation arises when captives are denied sleep for two days or more, thereby stifling the nervous system’s ability to function to optimal performance. The manifestations of prolonged sleep deprivation produce, in human subjects, loss of balance, hallucinations, slurred speech, heightened confusion, exhaustion, disorientation, constant irritability and forgetfulness. British agents involved in the interrogation of suspects rely heavily on this method as it makes the extraction of information from prisoners easier.

Torture Techniques

Torture basically incorporates any act used to cause pain and suffering of a captive with the intent of orchestrating severe punishment, obtaining a confession, coercing individuals to take on a given viewpoint or enforcing behaviour modification. Torture is an ancient technique often favoured for its aid in interrogations. Usually the inflictions made on an individual result in bruises, weeping wounds or breakages to the skeleton. MCs, for obvious reasons, felt that prisoners of war could effectively be coerced into disclosing intelligence information through fear for their lives. The torture of enemy troops has always been deemed beneficial because even the smallest details of information can turn a war around and gain the captor a substantial advantage. Strategies utilised included the following.

  1. Stretching. Parts of the body are pulled and strained beyond their full range of motion, causing uncontrollable spasms of pain within the joints and muscles. This can be achieved using the old-fashioned rack, placing ropes on the wrists and ankles so the body is fully suspended and taut.
  2. Cutting, piercing, burning and scolding. This is a slow form of torture where the pressure of discomfort is gradually applied under verbal interrogation. Naked flame, hot coals, heated iron rods and a range of instrumental knives and pins are applied to sensitive parts of the body. Skin gradually sizzles and cuts fester, leaving flesh raw and splotched. Cutting and burning are century-old techniques, valued because the instruments used are cheap and easy to come by, and most British soldiers carry matches and knives as a basic utility. MI6 don’t value this highly as a preferred technique because permanent marks of disfigurement are clearly noticeable and wounds caused by cutting and burning, if left uncleansed, turn sceptic.
  3. Starvation. The captive is denied food and water. The body left without basic sustenance begins to deteriorate. Within one to two weeks the captive is desperate to divulge information that the captors have requested; anything to relieve the demoralising, painful and desperate suffering of dehydration and malnutrition.
  4. Electrocution. Electrocution is utilised because it doesn’t leave cuts or abrasions to the body, and the intensity can be amplified and decreased using a remote control. The use of electrocution as a torture technique is illegal in most nations but is utilised on civilians in the form of an electroshock stun gun or taser gun by American and UK police forces.

Hypnosis

Hypnosis is a state of mind which is induced using concentrated focus and thought aided by the guidance of an interrogator’s reassuring and convincing voice. Visual stimulation, physical movement, external noise and environmental influence are restricted so that verbal suggestions are easily assimilated into the target’s subconscious mind. It is hoped that, once the target leaves the hypnotist’s presence, the information assimilated into the subconscious mind will be recalled by the brain at relevant intervals. The target then believes the knowledge/information which pops up from his subconscious is the ultimate truth and follows this truth as a gut reaction without questioning its logicality. MCs often administer drugs to help induce heightened hypnotic states.

As with all mind control techniques, it is the careful mixing of various applications, i.e. LSD, hypnosis and torture or sleep deprivation, brainwashing and concentrated interrogation, which makes mind control a worthy adventure.

MCs have managed to unravel an entire realm of questions and answers regarding humans and behaviour. They have divulged the great possibilities empowered to civilisation if the brain is controlled right down to the minutest components.

If mind-control scientists succeed in their technological pursuits, society will undoubtedly have to make way for these new developments and evolve with them. Over a period of countless centuries, MCs will manipulate human-being behaviour using a range of artificial devices, biological technology and social conditioning to create the British government’s ideal harmonious civilisation. MCs will also utilise this same technology to bring down populations and foreign armed forces to the brink of destruction. Mind control is a developing science, which is becoming ever more sophisticated as greater numbers of contract-funded intellectuals join the rat race.

ELECTRONIC HARASSMENT AND IMPLANT TECHNOLOGY

(Mind Control in Practice)

Alien Abduction and Medical Exploration

Human beings throughout the twentieth century have always claimed to be victims of mind control technology. Aliens from outer space have arrived in UFOs and whisked them away to unknown planets and subjected them to endless routines of torture. Implants have been surgically affixed to the ears and sinuses, and biological mechanisms have been monitored on a frequent basis. Some individuals claim to have been abducted more than twice and believe they suffer continuous harassment from their alien antagonists.

Dr Helmut Lammer, author of the book ‘MILABS: Military Mind Control and Alien Abduction’, brings to attention his analysis of implant technology and the alien abduction saga. The doctor claims mind control practice is rife, and pays particular attention to the CIA and global-warfare history, both past and present. He suggests that some alien abductees are disillusioned subjects of CIA-funded research and, in rare circumstances, have remembered what atrocities have befallen them. He backs up this theory with case studies of abductees who have proof of medical tampering, and the unauthorised deployment of treatments which physicians haven’t mentioned in the consultation room. Brain implants in particular (of various designs) are most commonly discovered by chance due to a patient’s persistent pursuit of a competent doctor and satisfactory diagnosis. The implants themselves are detected by MRI (Magnetic Resonance Imaging) and x-rays, and can be as small as a grain of rice.

He claims the existence of aliens and their extraterrestrial implants are, therefore, not a reality, rather some fabrication of the truth brought into existence by mind-control professionals attempting to quash suspicion and hide illegal activities.

Dr Helmut Lammer alleges implant technology was developed sometime after World War II due to increased global military competition, and that the research conducted encompassed aspects of ESB, radio communication and telemetric monitoring. Electrodes relay information from brain activity to a computer. The correlations of biological activity are in eventuality decoded into actual behavioural manifestations, allowing the subject’s lifestyle to be understood and analysed. The doctor states that the similarities between alien implants and man-made telemetric devices are uncanny, and follows the assertion that the implants abductees refer to are readily available and marketed to research professionals across the world. Coincidentally, Dr Delgado (clinical biologist) was the specialist responsible for the telemetric implant called the ‘stimoceiver’, which he designed in the 1960s.

The stimoceiver is an implantable device used for direct communication with the brain. The instrument is fitted with electrodes, which monitor the electrical emissions occurring within different parts of the skull and, most importantly, can send electrical signals to defined parts of the brain to produce involuntary actions and mental states. The bio-feedback from the stimoceiver is relayed to a computer for analysis. The doctor used his stimoceivers on psychiatric patients undergoing treatment and surmised that he could block the thinking process, inhibit speech and movement, and produce fear and hallucinations. The doctor engineered research which helped establish the fact that correlations of electrical activity within the brain directly correspond with specific types of behaviour.

Modern stimoceivers are often referred to as acute probes and have been miniaturised to a mere 4mm in size. The acute probe is still in its early stages of development and, on a legal medical note, is being used to treat illnesses like dystonia and severe depression in suicidal patients. University students and lecturers also utilise them (usually in the operating theatre and in animal experimentation) for scientific inquiry.

The alien-abduction conspiracy follows the assertion that humans are experimented on: first, as a means to impregnate them for racial mixing; and second, to cause the eventual downfall of the human race using a strong concoction of biological warfare and space-age technology. It appears that in twenty-first century Britain extra-terrestrials have some mighty stiff competition from a growing number of laboratory technicians and medics.

The Human Body, Radio Communication and Electromagnetic Stimulation

Since the mid-1990s the World Wide Web has become a major player in global communications and hosts a wide range of forums, clubs and privately run chat rooms where conspiracy theorists converge and exchange information. Mind-control websites are in clear abundance and victimisation claims of electronic harassment highlight that MCs are using a number of prevalent tactics and techniques.

Audible Voice to Skull and Microwave Hearing

Voice to skull is a form of radio communication, which enables MCs to transmit conversation directly to the brain. The sound (as described by victims) appears to radiate from behind the head, the soundwaves transmitting verbal conversation like a walkie-talkie. The sound distance and intensity of radio signal remains the same regardless of the head’s orientation.

The hearing of voices in the head has always been associated with the onset of schizophrenia but military science suggests the transmission of spoken word to the brain isn’t an enormous impossibility, and that the science behind its application is coveted by MI6.

The truth is that humans can hear themselves think in spoken word and perceive sound without the aid of their external ears, and it is the complexity of the brain which empowers this. When human ears detect acoustic sound frequencies from external sources the sound waves are funnelled via the external ear, hit the eardrum and are translated into nerve impulses, which travel to the brain and are decoded by the brain as sound/verbal speech.

When MCs transmit voice to skull, they speak into a microphone, which transforms verbal speech/sound signals into encoded electrical pulses. These radio-frequency pulses are directed at the auditory nerve (bypassing the human ear) directly to the brain, which decodes the electrical pulses into understandable spoken word and sound. Ensuring the encoded electrical pulses hit the auditory nerve directly guarantees that only the intended victim hears the contact and, like radio DJs (Disc Jockeys), MCs may increase or decrease the volume and communicate with a subject many miles away.

Academics Joseph C Sharp and Dr A Frey were actually the first scientists to transmit voice-modulated microwaves at the auditory nerve during their time at the Walter Reed Army Institute of Research. The transmission of sound via the auditory nerve has been practised since the mid-twentieth century and has proven successful even in hard-of-hearing subjects. The employment of ESB enables targeted subjects to perceive sound depending on the frequency and amplitude of stimulation. The auditory symptoms include those of constant buzzing, clicks and what is called ‘ringing in the ears’. If utilised for extended periods of time the loudness and variation in noise causes lack of concentration, distress and high irritability.

Rumour has it that voice to skull was intended for soldiers, ensuring headquarters had unlimited communication, thus enabling the abandonment of conventional earpiece/microphone headgear, which is a visible target on the battlefield.

Voice to skull brings into focus the growing number of psychics, alien abductees, witches and psychiatric patients claiming they can speak to extra-terrestrials, can contact ghosts and liaise with the devil on a frequent basis. The realisation that MCs may effectively talk themselves into a human being’s life and pose as supernatural powers seems blasphemous. What is clear is that intelligence agents and medics have tried hard to master this skill and that there are a growing number of MCVs confirming its deployment.

Electromagnetic Torture – Involuntary Motor Movements and Actions

A brief consultation with any practising neurologist would confirm that the brain is primarily responsible for all voluntary movements and the co-ordination of a vast number of muscles within the body. The fluid movements and precision of muscle control executed by break dancers and gymnasts are very much representative of the brain’s capability. Neurologists can map the functional areas of the brain in diagram form, enabling them to pinpoint the regions most responsible for independent movement. The motor cortex, for example, is responsible for muscle control within the shoulders, arms, hands, eyes, lips, tongue, fingers and thumbs.

MCVs have long claimed that MCs have the capability to physically torture them irrespective of global whereabouts. Interestingly, the manipulation of bodily functions, inexplicable muscle movements, pain and weeping wounds MCVs claim to endure are profoundly symptomatic of the acute probe and the electrical signals it produces to cause involuntary actions.

MCs aren’t content with the medical profession’s notion of brain stimulation as consultants utilise electromagnetic research primarily to improve health, not damage it. MCs are interested in the acute probe as an intelligence aid, so it helps to know what happens when levels of brain stimulation are increased beyond the brain’s natural capacity and capability. Unsurprisingly, increased exploration of electromagnetic waves has led to the understanding that ESB may realistically be used as a torture weapon that surpasses conventional methods.

MCs, for instance, may inflict muscle spasms (fasciculation) and cramps (muscle shortening contractions) within the human body by applying variations of electrical stimulation, causing pain as the muscles and tendons are strained beyond their maximum range of motion. This form of torture is useful, the main advantage being that sensitive areas of the body, like the genitals, eyes and tongue, may be isolated and afflicted independently. The acute probe’s electrical signals travel from the brain into the spinal cord and stimulate the nerves and then the muscles; the muscle tissue then contracts. In general the severity of pain and wounds inflicted is dependent upon the longevity and levels of stimulation targeted at the brain and spine.

Symptoms of Electromagnetic Torture:
Severe pins and needles Prickly burning sensations
Heightened body temperature Increased heart rate
Back strain Chronic headaches
Involuntary hand, finger and toe movements Stomach cramps
Spot blanking of memory Harassment of the auditory hearing with ringing, clicking and buzzing
Repeated spasms and contracting of muscles and tendons within the body Bleeding and discharge from the nasal cavity

Electromagnetic torture is unique as it is performed without the necessity of incarceration, so MCs needn’t be in close proximity. The victim may, in fact, be over 5,000 miles away on a distant continent. The greater advantage is that the victim can’t escape his tormentor without appropriate medical intervention, i.e. surgical removal of the implant.

The Implant Specialists

The culprits responsible for the upsurge in implant technology are unsurprisingly not alien invaders but human beings. Implant Specialists (IS) are MCs whose research is specific to implant technology and for the sake of espionage work for the British government under the umbrellas of MI5 and MI6. They are reflective of the modern warfare practitioner in the sense that, by preference, enemies are fought not in the field using guns and bombs but through utilising electronic-communications technology. This way they may collect information, analyse it and aid counter-intelligence operations, both covertly and overtly, limiting the potential number of casualties lost in battle. Implantable devices are just one of the many sophisticated communications products British security forces employ, and they are granted ample funding because they are multifunctional devices favoured for the following three reasons.

  1. Tracking. Tracking devices are inserted within the human body in a variety of places dependant on their exact function, and enable researchers to establish the whereabouts of their target using a receiver that detects the implant’s transmitter signal. This scientific technique is frequently used on mammals like sharks where their movements are tracked within the vast open seas. Conservationists, as a result, are able to locate their shark many miles away and monitor its feeding and migration habits. Modern designs of transmitter are so incredibly small now that they have permitted scientists to keep tabs on the smallest of creatures, like Harvest Mice roaming wild and cultivated fields.
  2. Recording and Monitoring. Implants are designed to act as interactive devices offering a direct link between the human body and computer, like electrocardiograms. These devices enable researchers to study the intimate functions of the body closely by monitoring organ activity and reactivity. They are frequently used in the monitoring and assessment of mental illness, heart activity and brain dysfunction. From an intelligence agency’s perspective, monitoring devices may reveal the biological affects of drugs, dehydration, physical exertion and chronic depression. This type of research is essentially useful to the MoD (Ministry of Defence) as these common conditions often influence soldiers and their performance on the battlefield, interfering with perception, physical co-ordination, eyesight and, ultimately, performance.
  3. Manipulation and Control. These implants are probably the most controversial of all as they are both intrusive and obtrusive to the human body. They empower an external party to influence the thoughts, functional body parts and behaviour of another. The devices themselves are often telemetric instruments and are frequently inserted into laboratory animals undergoing behavioural testing, e.g. a remote control enables researchers to send painful electric shocks to a dog’s brain every time the animal disobeys a command. The dog quickly learns via association and negative reinforcement that if he doesn’t sit when told to he’ll be harmed.

Implants are attractive in the sense that they are hidden from view within the body and are difficult to detect and remove without professional intervention. One would have to gain access to sanitised operating equipment, x-rays, anaesthesia and a skilled surgeon.

Bearing in mind the surveillance perspective, the possibilities are vast for intelligence agencies: audio equipment may be inserted under the skin, possibly within the face or arms, and enable operatives to eavesdrop on all of an implanted subject’s verbal conversations. This tactic surpasses all opportunities offered by phone tapping and roof surveillance, which are limited once the subject leaves his bugged household. Interaction with strangers and associates in the street is also acquirable without operatives having to rely on second-hand information from bystanders and culprits who may deceive. The most advanced implantable device is undoubtedly one which incorporates all five features of tracking, monitoring, manipulation, audio technology and radio communication.

The Gaffer

Perhaps the easiest way to understand the IS strategy is to view the entire operation as a business where there is a clear, identifiable organisational aim and staff hierarchy; a unified, cohesive workforce of multi-talented professionals working a nine-to-five shift to ensure there is twenty-four hour monitoring of a victim’s life.

Project Co-ordinators

Mind-control operations always involve an appointed project co-ordinator. The co-ordinator is the strategic driving force behind the operation and is often in control of funding initiatives, equipment, staffing levels and the distribution of workloads. The co-ordinator knows his department and subject area well, and may spend precious time holding talks and presentations throughout Great Britain at renowned universities, such as Cranfield. He is a well-paid specialist and more often than not has a Masters degree or PhD title to his name. As the head co-ordinator it is his task to be on the lookout for new opportunities to market, network, expand and spread the word about his work and team. Primarily the co-ordinator services the government but, dependant on the political environment, secrecy acts and commercial influences, expertise and implantable devices are granted deployment by private institutes and overseas military forces. A project co-ordinator’s investigations, for example, may uncover a way to cause temporary paralysis in implanted victims without the use of drug administration but using electromagnetic stimulation. This research is likely to remain classified for the immediate but, eventually, could be used for mob-management strategy on a global perspective. The traditional utilisation of police batons, tear gas, dogs and horses to calm rioting crowds would be replaced with an electromagnetic beam (transmitted from portable transmitters and receivers), which would hit all human brains within a ten-metre radius. The beam would cause immediate paralysis in marching rioters, making the booking and arrest process considerably easier. This strategy would lessen the damage to property, decrease the number of police casualties and relieve pressure from emergency services. An electromagnetic beam like this transmitted from a tank could also be utilised on the battlefield to incapacitate enemy forces without killing them, instead rendering them too sick to fight.

Consultants

The consultants comprise an invaluable team. Like the project co-ordinator, they are high-flying, wealthy academics – the best and brightest specialists Britain has to offer. They are the intelligence scientists who oversee projects and advise on all aspects of the mind control scheme.

The development of an implant in general requires the full attention and expertise of many consultants, some of them foreign if absolutely necessary. They comprise of the following.

  1. Neurologists and associate medical staff who understand the brain and its complicated activity.
  2. Engineers and medical/pharmaceutical establishments who can design and work the circuitry for miniaturised implants to be tested on animals and, eventually, humans. These implants must be easy to insert, hygienically clean and safe to use on a permanent basis.
  3. Sociologists and statisticians who understand human culture, economic trends and factors that influence them, e.g. birth rate, life expectancy, educational standards, the British population’s health, racial ratios, religious persuasion, class and finance, migration rates and gender studies.
  4. Factory contractors who can mass produce implant technology in secret and at a reasonable price.
  5. Psychologists and psychiatrists who can predict human behaviour under diverse environmental influences and produce behavioural models based on induced mental states.
  6. IT and telecommunications staff at GCHQ who can produce customised communication systems, software and interactive devices to enable the safe, covert detection, monitoring and transmission of information over vast areas of space quickly.

Without appropriate input from consultants to advise, research, direct observations and analyse data, the project co-ordinator and the rest of the mind-control team are completely lost in their pursuits and lack the skills to forward the project to greater heights.

Field Agents

Field Agents are the mind control administrators. Their role is primarily concentrated on interacting with the victim in liaison with the project co-ordinator and consultants’ requests. They ensure the close monitoring of the victim’s life and the networking of information between internal staff.

Field agents must find an effective way to induce and nurture the behaviour that the consultants wish to observe in the victim. This means attempting to control the environment and anything else that may influence the victim’s behaviour. Harassment revolves around the victim’s lifestyle and identity, which may be split into two major areas of activity.

  1. Home Life and Recreation.
  2. Work Life.

Where home life is concerned, field agents concentrate on family relations and activities. In this arena agents make frequent contact with the subject’s kin, flashing law-enforcement badges to establish authority. A study on depression and trauma, for instance, requires that the subject be depressed for extended periods of time, and sometimes chronic depressive states have to be induced to acquire the necessary electrode readings. Family contacts ensure the subject is spoken to at necessary intervals and treated accordingly to aid the research process. This may entail boosting the subject’s self-confidence or lowering it using instructed verbal communication, physical body language and inclusion/exclusion tactics. Families are more often than not happy to comply with demands, especially if led to believe that co-operation may improve their loved one’s welfare in some way.

Observation of the employment work-place routine enables agents to familiarise themselves with the layout of the building and environmental psychology – the lunch room, toilet facilities, common rooms, entrances and exits, and so on. This is so they may quickly identify where the victim’s work station is situated and how he will move in and around the office on a daily basis. Agents endeavour to create an artificial environment where the victim’s every move is interacted with, controlled and manipulated on cue to produce prolonged depressive states. Work associates and managers are spoken to in attempts to ensure the environmental psychology is in the correct balance and remains so for the duration.

Field agents work in numbers of two or more and, in cases of voice-to-skull harassment, it’s the radio communication from these agents which victims hear. They are also active networkers who keep intact the sourcing of contacts like the local GP. Victims suffering electromagnetic torture are likely to visit the doctor more often perhaps than average. The subject will convey information to the GP about his health, which may be of extreme interest and aids the research gathering process. In this event, field agents ensure the victim is sent to the relevant specialist and receives meticulous medical examination. Copies of the results are forwarded to the IS who, upon receipt, will understand the influence their electronic harassment is having.

Field agents are great believers in economic sabotage, which is often utilised in attempts to force a victim’s lifestyle to diversify in accordance with research expansion. Great Britain, for instance, is run by hundreds of different governmental authorities who as a collective help manage citizenry and divvy up benefits. Agents understand that the careful, orchestrated withdrawal of these services can both damage and improve human welfare relatively swiftly. The following two theories identify the key ideologies behind economic sabotage.

Employment = Pay Cheque

The ‘employment = pay cheque’ concept surmises that human survival in Britain comes down to career prospects and financial status. The capital raised from employment ultimately dictates the quality of lifestyle and opportunity a subject may pave for himself. This encompasses educational advantage, his stake in the property market, travel capability, nutritional diet and size of family he may comfortably afford, investment opportunities in the stock market, recreational activities and the possession of commodities like cars, computers, digital TV and telephones. Using their law-enforcement status, field agents illegally force subjects into substantial bouts of employment and falsified redundancy to best accommodate their mind control project.

Welfare State = Public Welfare

The ‘welfare state = public welfare’ theory surmises that partial aspects of a British citizen’s welfare aren’t necessarily dictated by individual financial status. The welfare state and tax system ensures funds are allotted to those who most require them as this strategy creates a sense of equality and inclusion amongst the classes. Most importantly, the minimal human requirements of food, water and shelter are met because British citizens are granted access to a number of statutory public services. Organisations like the Home Office, NHS, Social Services, Citizen Advice Bureaus, city councils, police forces and legal aid firms are instrumental to this welfare strategy. In this arena the field agents’ aim is to manipulate the advice, welfare service quality and customer care that the subject receives in a way which meets project criterion. The ‘marginalisation’ of the victim within society is most essential; it is important that every aspect of the subject’s life is under magnified analysis and is controllable down to the minutest components.

Experimental Subjects – Locating Specimens

Acquiring subjects to serve as guinea pigs for research has never been easier for the IS. The NHS (National Health Service) has an ever growing waiting list of citizens scheduled to visit consultants for a vast variety of ailments and treatments. Registered citizens across Britain have an allocated NHS number and medical record, which enables security forces to identify individuals by:

Name and address Date of Birth Gender
Medical History Height Active Treatments
Family Relations

The IS search the NHS medical-file databases for potential victims of relevant identity, and also have access to medical departments within prisons, military bases and psychiatric institutes to maximise catchments.

In this arena, operating-theatre staff are sworn to secrecy under security act legislation. This isn’t to say, however, that medical staff are acutely aware that the patient concerned might be molested while under the influence of anaesthesia.

  1. In a realistic scenario how does a surgeon tell whether an acute probe is designed for medical intervention or for surveillance and torture?
  2. If a doctor does, in fact, suspect foul play, how does he deny an agent access to a patient without falling foul of the law himself?

Doctors have no jurisdiction over their patients’ welfare where security forces are concerned. Security forces still retain the legal right:

  • to transfer a patient to another hospital against his wishes;
    • to extradite a patient without medical treatment; and
    • to administer whatever medical intervention to a patient they so wish, with or without his consent and knowledge.

Looking at the ‘experimental subjects’ theory, it’s easy to understand how MCs ‘pick to order’ their subjects and distribute implants to so many.

The Design, Testing and Analysis of Implants

There are six essential stages to the IS testing and analysis strategy.

Research

Design

Testing and Refinement

Implementation

Analysis

Conclusion

Where Research is concerned, consultants analyse the success of bygone experiments as well as appreciate the modern. This entails briefings with professionals of the relevant field and scouring the bookshelves of medical and military libraries for data-collection purposes. Case studies will be sought and investigated (depicting both success and failure) to highlight potential complications and spark innovative ideas. Foreign intelligence, if available, dictates the plans of action and overall development of implant design, which must be competitive on a global scale and outperform those already in circulation.

Using all the relevant research the consultants have collated, they must then Design a strategy that will help them achieve their objective. They will have to decide whether or not it is feasible to conduct the project overtly or covertly. In the case of a proposed experiment on a human being, the individual’s identity, age, race, class and occupation will be important. It will be decided whether or not the experimentee is consenting or unwitting, and how one is to go about finding an individual who meets the criteria and specified characteristics. The IS work in networked multi-disciplinary groups, so at some point relevant participants like doctors, military men and psychologists will meet and discuss the options available, and the feasibility and funding of the proposed operation. Various implant designs are sought and their properties investigated.

A pilot study will be performed for Testing and Refinement purposes. Obviously there is the chance of the project design being flawed; it may be that newly programmed equipment is faulty, staff aren’t sure of their role or invaluable resources and funding are withdrawn or dwindled away too quickly for the study to be concluded. Mistakes are corrected at this point and extensive adjustments made to the overall scheme of things. It is possible in rare circumstances that the entire project is abandoned and that the IS decide to start anew. At this point in the testing phase they have a vague idea of how the study will pull together, the budgeting costs, the risks involved and the quality of research likely to be acquired.

At the Implementation stage the team have ascertained where and when the research will be conducted. They will have acquired a number of human subjects who they may tap for research at relevant intervals. Surveillance and monitoring equipment is set up and professionals who can translate the output are hired. Telemetric data is recorded and archived whilst undercover field agents are deployed to subjects’ places of domicile to cover environmental and social influences. The manipulation and sabotage of the subjects’ lives will commence only if deemed crucial to the objective.

The Analysis and Conclusion involves the dissemination of research. Dependant on the surveillance systems used, results may be sent away to laboratory scientists who test and analyse data. The majority of scientists approached aren’t necessarily part of the IS team and are unaware that the research has been acquired illegally.

Once the reports are compiled, the IS set about building a picture of individual case files and eventually incorporate the information into a larger overview. They can look for common correlations and patterns of behaviour in the data and statistics. How the data is analysed will obviously vary, dependent on whether the study was to offer investigative, interventive or preventive insight.

The experimentees don’t have faces; they are simply part of a statistic, which is extracted from a computer database for intelligence committees to scrutinise. The final conclusion basically encompasses all the information based on the extensive analysis. If the experiments proved successful there is the option of pursuing research further or remaining content and assessing ways of incorporating the intelligence into future operations.

From a military perspective the IS have made substantial headway with implant technology. They have come to the realisation that the human body is a magnificent weapon in itself, and that all they need do is add a few refined capabilities.

  1. Radio Equipment. Surgically implanted sound-sensitive microphones enable operatives to eavesdrop on the verbal interactions occurring within their target’s physical range. This replaces the often favoured ordeal of bugging household premises. Voice to skull (microwave hearing) also enables field agents to speak to their target by transmitting electromagnetic radio frequencies directly to the auditory nerve.
  2. Electromagnetic Stimulation of the Spine/Brain. Permanently implanted electrodes can inflict serious illness, physical wounds and pain. This replaces the common requirement of torture instruments.
  3. Self-destruct Equipment. Throughout military history it hasn’t been uncommon for captives to carry poison pills as a means to commit suicide in the event of capture. Nor has it been uncommon for agents to plant bombs within buildings to kill VIP adversaries at close range. A miniaturised bomb may be implanted within the target’s body and detonated on cue. This way bombs get through Customs undetected and may be carried into high-security establishments, such as the Pentagon.
  4. Tracking Implants. Operatives may locate their targeted victim on a global scale and ascertain their whereabouts by country, borough and street name.
  5. Telemetric Monitoring. Devices implanted in the right regions of the brain or body would alert operatives to their target’s general state of health, like levels of pain and sleep patterns. Operatives are also able to ascertain, from bio-readings, psychological state of mind, stress, body temperature and breathing, etc.

Realistically a surgically implanted intelligence agent could infiltrate the most dangerous of terrorist groups, identifying culprits and hierarchy, how the terrorist group forms and disperses, and where funding and resources are sourced. The agent may sabotage the operation from the inside whilst adding to Her Majesty’s Secret Service’s wealth of intelligence.

MCVs engulfed in the design, testing and analysis strategy are simply pawns on a chess board. The implants they carry are the early indicators of the British government’s ‘Big Brother’ nation. Mind-control implants are primarily designed to be carried by British spies and dissidents (for covert-surveillance purposes) to track and annihilate the operations of terrorists, criminals and other enemies of state. MCVs are, therefore, the unfortunate casualties of the government’s experimental testing phase, not the long-term ultimate targets. Civilians are the safe alternative to testing on the real thing where, if the outcome is disastrous, the knock-on effects are limited.

To deploy a bugged British spy to the Pentagon and be rumbled would be a catastrophic embarrassment to the British government and could, in extreme circumstance, damage American and British relations. The Americans would detain the spy, torture him for intelligence and demand a full explanation from the British. If a suitable explanation wasn’t forthcoming, they would consider the death penalty if their security had been compromised. Preliminary testing phases are only extended to those whose identity is inconsequential. Only once a technique has been tried and tested over and over with guaranteed results will it be used on an enemy of the state.

The IS are repeatedly committing crimes in attempts to enhance the safety and security of their country. In this vicious game of silent warfare all casualties are expendable.

THE HUMAN BODY AND PRIVATE HOME IS A SACRED TEMPLE?

Mind-control developments bring into question a number of moralistic issues, which are fundamental in preserving the British legal system and human rights.

Britain has willingly signed up to the European Convention on Human Rights, United Nations Universal Declaration of Human Rights and, of course, created the British Human Rights Act 1998. The British constitution believes:

  • everyone has the right to life, liberty and the security of person;
  • no one shall be held in slavery or servitude – slavery and the slave trade shall be prohibited in all their forms;
  • no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment;
  • no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honour and reputation – everyone has the right to the protection of the law against such interference or attacks;
  • everyone has the right to work, to free choice of employment, to just and favourable conditions of work and to protection against unemployment;
  • no one shall be subjected without his free consent to medical or scientific experimentation;
  • everyone shall have the right to freedom of expression – this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice.

The Right to Privacy, Freedom of Thought and Health

The right to privacy grants citizens to live in domestic domicile without interference from the government. Citizens may develop close relationships with whom they wish whether they be social or sexual. The right to undress and bathe oneself in a dignified fashion goes without debate.

Humans are private creatures and in their element when they have unlimited control of their environment. They may control who enters their house, may divulge information about themselves in private conversation, and dictate what they wear and eat. The privately owned house and the goings-on which occur within it give the individual an impression of territory, ownership and power.

Brains enable humans to be independent thinkers; to thrive on the freedoms and opportunities free thought provides. The right to personal autonomy, to develop personal interests, dictate direction and seek stimulus are major components of a healthy, balanced mental state.

MCs work hard to challenge the longstanding assertion that a man’s home environment is sacred ground, that his physical body and psyche are inviolable, and that any proposed manipulation or violation is an unholy adventure. They believe the following.

  1. It is dangerous for humans to have freedom of thought, as it isn’t always in check with government idealism.
  2. Humans shouldn’t have a right to privacy if it distorts truth. Who knows what information the average human is concealing?

Agents want to live and breathe (in real time) the target’s domesticated lifestyle to ultimately investigate and understand it. They have so many questions regarding human behaviour and must violate human privacy to make way for their research team of prying eyes and surveillance equipment. Only by accomplishing this will they learn how a human personality is formed and understand the intimacy of relationships.

Unfortunately for the victim, betraying every private thought and intimate moment with government agents is highly likely to traumatise him to the point of severe depression and humiliation and, in an extreme scenario, provoke suicidal thoughts.

Victimisation

Mind control is a form of brain rape and torture; whether the affliction is caused by drug administration, electromagnetic stimulation, brainwashing or the nurture of personality disorders, the end result remains the same. The target is forced to endure continued harassments. IS mind control, in particular, is likened to slavery because the target’s brain and mind are tapped for research against his will. He is helpless to prevent the intrusion and resist the brain’s physical and mental reaction to electrode stimulation.

To date the American Guantanamo military base displays the most public flagrant disregard for human rights where systematic mind control is highly prevalent. Freed captives have accused the CIA of utilising sensory-deprivation and sound-technology techniques to install in them fear and hypnotic suggestions. They’ve been denied physical exercise, exposed to severe temperatures and prevented from prayer and conversation. When captives have disobeyed they have been beaten, kicked, stripped naked, sexually harassed and threatened with dogs. On the odd occasion captives have been doused with urine and threats have been made towards their families if information wasn’t forthcoming in the interrogation room. Slowly but surely the restraints which have kept the human brain and mind inviolable are being eroded by science.

So long as it remains national policy to protect the security of the British nation and its interests, the government will strive to produce mind control techniques that are ever more invasive and efficient. Mind control is such an integrative component of military warfare now that research pertaining to its use is highly classified.

The government, of course, denies that Mind Controllers exist. Exposure of their antics would prove undoubtedly that the government is committing criminal acts against the people it is sworn to protect. Exposure would also make folly of the laws which govern civilised society.

The answer to the problem is certainly clear; MCs are criminals and should be prosecuted as such. Greater openness and education regarding mind control will help aid the legal process and eventual conviction of the perpetrators who wish to make political and financial gain from the suffering of others. It is especially important that those involved in mental health understand mind control methodology and find ways to effectively treat and reverse the prolonged physical and psychological effects endured by victims and their families.

Bibliography

  1. Andrew, George (2001). MKULTRA: The CIA’s Top Secret Program in Human Experimentation & Behavior Modification, Healthnet Press.
  1. Chavkin, Samuel (1978). The Mind Stealers: Psychosurgery & Mind Control, Houghton Mifflin Company.
  1. Delgado, Jose (1969). Physical Control of the Mind: Towards a Psychocivilized Society, Harper Colophon Books.
  1. Frank, R & Vernon, Mark (1970). Violence and the Brain, Harper and Row.
  1. Lammer, Helmut & Lammer, Marion (1999). MILABS: Military Mind Control & Alien Abduction, IllumiNet Press.
  1. Lifton, Robert J (1989). Thought Reform; the Psychology of Totalism, University of North Carolina Press.
  1. Marks, John (1979). The Search for the Manchurian Candidate, W W Norton & Company.
  1. Scheflin, A & Opton, Edward (1978). The Mind Manipulators, Paddington Press.
  1. Victorian, Armen (1999). The Mind Controllers, Vision Paperbacks.
  1. Weinstein, Harvey (1990). Psychiatry & the CIA: Victims of Mind Control, American Psychiatric Press.

Glossary

  • MCs – Mind Controllers

Government-funded agents who conduct mind control-research.

  • MCVs – Mind Control Victims

Human beings who are used for human experimentation.

  • IS – Implant Specialists

Mind-control agents who specialise in implant technology.

US Citizen Corps Harassing Other Citizens/Immigrants

Before I begin, two paragraphs to put this in context:  This has to do with a secretive group receiving money to use emerging technologies (see footnote 1. and others ) to experiment, and able to sanction crimes. They have sought and succeeded in making most all people I associate with,  controlled in regards to me, for negative and illegitimate purposes. This includes strangers, who have on average, fill destinations or places visited, present offensive jestures or harassment in my presence, and have been involved in stealing from anything that may be carried by me, ie: printed material, contents of backpack, important personal items or documents.

One has to question what sort of recruitment is involved in this locally, and elsewhere this has happened.

US Citizens Corp data base of citizens:

From the Operation TIPS (Terrorist Information and Prevention)

quote: “Each file or entry contains an interested individual’s name, mailing address, e-mail address, and Volunteer Program area of interest. The database contains and tracks names of each individual and the date of expression of interest, type of interest expressed (e.g., Community Emergency Response Team, Neighborhood Watch, Citizen Corps
Councils), and similar information.”-[Federal Register: May 7, 2002 (Volume 67, Number 88)] http://www.citizencorps.gov/downloads/txt/news/02-11253.txt

The experience I have daily, with evidence in names of businesses, from the Mid West to the current location, is the use of an enormous pool of people, to arrive before, the same time, or after, I do, at almost all destination, daily, for purposes stated below. In one area, over a hundred people on call, so that differing people are used each time.

There should be investigation as to whether this system is being used to create pools of people in all the country, for the purpose of assigning them to harassment for emeriging technologies experiments. There has been many people daily for 4 years, that in all locations, daily, fill to one extent or another, all spaces occupied by myself. This takes many people in that there are different people used, to harass, distract for theft, taunt, play on associations for criminal ends. Police in all locations are aware of this, and used. Offices, like FBI or Attorney General, when approached for concerns regarding incidences or crimes that fall within their respective juristiction, are sometimes informed before I call on their offices, and have been ordered to confront me in particular ways, never claiming the seriousness of what I attempt to report.

It takes a vast database to come up with people for specific tasks, from stalking or harassment to serious crimes, over long distances.  I have been met with in airports en route cross country by groups who evidently have been coached for specifics in harassment.

Here are some quotes from the Citizen Corp website, regarding Operation TIPS:

”This new system of records contains information gathered by the Citizen Corps, which is part of the USA

Freedom Corps established by President George W. Bush under Executive Order 13254, January 29, 2002.”

‎2002: Pursuant to the Privacy Act of 1974 (5 U.S.C. 552a),

The Federal Emergency Management Agency (FEMA) proposes to establish a new system of records entitled “Citizen Corps Database Tracking System..http://www.citizencorps.gov/downloads/txt/news/02-11253.txt.

Operation TIPS found in Report by Lawyers Committee for Human Rights 2002.

I have placed below as a footnote quotes and link from Lawyers Committee for Human Rights Report mentioning Operations TIPS, from A Year Lost, Reexamining Civil Liberties Since September 11. (footnote 1.). A data pool to outsource actions of crime and harassment, trained and coached, is indeed a real thing.

Harassment using many citizens Sometimes more than 100 citizens per day are used to fill cafes, restaurants, mob at every outing to a mini mart. People have been placed on airlines for this purpose, with seating arranged beforehand. I have evidence of this in records, though all boarding passes for 2006 have been stolen from me.

How these citizens are instructed to do:

Cruel attention includes cutting hair from behind, tampering with backpack, stealing anything I carry, instructing stores to short change when others distract, and malicious tricks using seeming friendly people, etc.. They even use children to steal from me, mob and stalk, etc.

There is mobilization daily, filling destinations, day to day places, vehicles used as well.

There is never any short supply, and no one seems to have a conscience. This is right out of Nazi play books.

If one checks the internet Google: gang stalking; covert harassment, you will find misinformation, a flood of it. Nothing regarding gang stalking, or the internet people claiming to be victims can be confirmed.

Thus stated, a structure similar to Operation TIPS (http://www.citizencorps.gov/) is used as a pool of people, all ages and classes, so that sadistic exercises using emerging technologies, can pervasively fill the subjects every moment with intrusions, some playing on themes, psychological conditioning.

And if you ever wonder why police stations look like a sealed ticket booth at a theater, well, it has some advantages in denying a subject of what is referred to here, access to police for reporting crimes from felony to malicious acts.

“Federal Emergency Management Agency (FEMA) proposes to establish a new system of records entitled “Citizen Corps Database Tracking System..

http://www.citizencorps.gov/downloads/txt/news/02-11253.txt

Part III: Mental Firewalls

Part III: Mental Firewalls
Allen Barker, Feb 17, 2002

 

This is the third of a three-part series of essays on mind control.  As the earlier essays explained, “mind control” is the term commonly and historically used to describe clandestine operations to alter human behavior and thought.  The series focuses mainly on high-technology techniques involving, for example, surveillance devices and electromagnetic weapons — though victims of all sorts of mind control techniques have common experiences and sequelae.  The first essay of the series, “Motives for Mind Control,” dealt with some of the reasons that mind control harassment, torture, and exploitation happens and why it continues.  The second part, “Resisting the Mind Control State,” dealt with ways to protest and resist mind control abuses in a supposedly “free” society.  In this final part, I explore some of the methods and techniques that victims have developed to help them resist these ongoing human rights atrocities committed every day against their bodies and minds.  In a sense we are going to have a look at mind control torture from the torture victim’s point of view, from “inside” the mind of the victim.

This essay is written from the point of view of someone experiencing real torture from externally induced mind control phenomena, including induced voices in the head, surveillance, harassment from various sources, and nonlethal aversive jolts.  While I make no secret of the fact that I have personally been subjected to a similar sort of mind control torture, this is not my story.  Of course it is influenced by events I have experienced, but the essay is a composite from my interactions with many mind control victims (and provocateurs) over the past few years.  I will save the actual details of my own experiences for my lawyers or for prosecutors when that time comes, or perhaps for other writings I might choose to make public.  Thus, in keeping with the earlier parts of the series, you do not even have to believe me about my having been tortured — though it all happened.  There are many people in the world, including many American citizens, who have experienced very similar things.  You can even think that all of those people made it all up, and still have to be concerned despite your Holocaust denial.  The technology undoubtedly exists right now to carry out the sorts of torture operations described in this essay, and will only become more advanced with time.

I cover a lot of different techniques and possibilities in this essay, but keep in mind that the truth is bad enough.  What we already know and can document is bad enough, and is only the tip of the iceberg.  In the spirit of mentioning all the possibilities, though, let me briefly discuss mental illness here.  There truly are some people with mental illnesses which occur naturally.  There are also people with mental illnesses which were externally and purposely inflicted, for example by harassment operations.  And there are mind control victims who are completely normal except that they have undergone years and years of some of the most hideous torture imaginable — in a lying, despicable society that denies it, ignores it, and further tortures the victims.  We know this from documented sources; what the government has admitted is bad enough.  I hope this essay will prove helpful even to victims who suffer from true mental illness.  I call them victims also because the cowardly U.S. government has hidden behind the skirts of the mentally ill to commit some of the worst atrocities imaginable, and the truly mentally ill are victimized by this as well.  The mentally ill are also known to have been used as guinea pigs in mind control experiments precisely because they would tend to be disbelieved and are relatively powerless victims for torturers to experiment on.  Some victims may have been poisoned by drugs engineered to cause them psychological problems — and I do not mean ordinary street drugs.  Others have had psychosurgery, microwave harassment, etc., which can cause organic problems in addition to psychological problems.  And of course, the mind is really not separate from the body and psychological torture is just as bad as direct physical torture.

Most people are still free to think what they want — to the extent that that still means anything — and some will try to second guess the victims and provide armchair diagnoses of the victims’ problems.  People who try to dismiss true torture victims as just mentally ill will receive and deserve the utmost contempt from the victims and from those decent people who know what is really going on.  And we will remember.  For the reasons described in Part II, the psychiatric and psychological “communities” cannot be trusted, except for a few actual healers here and there.

Much of this essay contains a sort of analysis that it is fashionable among the pseudo-intelligentsia to dismiss as just black-and-white thinking.  These people have their sixth-grade epiphany that not everything is black-and-white, and for the rest of their lives go around justifying anything convenient with this amoral relativism.  They never realize (or it just does not suit their lies) that while nothing is black-and-white, some things are close enough that they might as well be.  I will be writing about Nazi pigs, and I mean this in the sense of “Mengele the Nazi pig,” not any other cultural pig association.  Those who dismiss this sort of thinking perhaps would think differently if they had ever experienced real torture or were capable of the slightest bit of empathy.  There is no doubt that this sort of thinking has been misused and misapplied at various times, but I cannot worry about how every moron might misunderstand or misapply what I write.  People may well misapply things I have written here, or use them to create some propaganda distraction from what I am actually writing about, but I am describing it the way it is.  If you don’t call a Nazi a Nazi you end up with Nazism by some other name.

Every victim has had to develop his or her own method of coping with the torture.  I am not trying to impose my methods on anyone.  A religious person under torture finds strength in his or her religion, so some Zen Buddhist philosophy may necessarily be apparent in my writing.  In the ignorant U.S. there are still people who will blame a victim for being Buddhist, a major world religion.  Of course Mengele the pig tries to justify and rationalize his acts of torture in any and all ways possible.  There are the usual myriad ways of blaming and smearing the victims and rationalizing away the acts of the torturer.

I hope that this essay will help some victims.  I know that I have benefited from the work of other victims who had the courage to speak out about their experiences.  Much of this essay deals with the mental “game” of mind control, which is of course not a game at all to the torture victims.  You can compare it to having to face mock executions each day.  There is also the physical intimidation many victims experience.  As a victim might put it, if it is all in my head then who harassed me on the highway?  Why did my mail all arrive opened?  Why did my phone regularly ring twice a day with hang-up calls?  Why did many of my internet posts stop propagating anywhere?  Why did a police car pull up beside mine every time I talked about China, on the drive to my honeymoon?  The unfortunate reality is that the victims have to develop their own methods to deal with the constant, credible physical threats of death or worse.  I wish I could help there, but I do what I can.  This is a barbaric and savage nation.

What is a Firewall?

For the purposes of this essay, let me digress a bit here and describe the concept of a firewall.  A firewall, in the historical sense, is a wall built between connected buildings and specifically constructed so that a fire in one unit of the structure will not spread to the other units.  In a more recent sense, a firewall is a device on a computer network that keeps nodes of the network separated, for instance so that a hacker attack on one node of the network cannot spread to connected nodes of the network.

For our purposes, we can consider all the computers on a network to be like houses on a street.  (Network engineers, please bear with me.)  Each house has several doors into it, which correspond to what are called ports on a networked computer.  A computer actually has thousands of ports, but the principle is illustrated by considering a house with several doors.  All the houses have inhabitants in them, who send out messengers to the other houses:  But some houses send out the equivalent of burglars also.  When the inhabitants of one house want to communicate with the inhabitants of another, they send a messenger to a particular door of the house they want to communicate with.  The messenger knocks on the door.

Now, the inhabitants of the house can either open the door and let the messenger in or ignore the knock.  If they let the messenger in, they can restrict what he is allowed to do while in the house.  The messenger may, for example, pick up a piece of paper and carry it back to his house.  This would correspond to a file transfer over a network.  If the inhabitants of the house accidentally leave a door open, though, a messenger may be able to come in the house without permission and do whatever they like, again without permission.  (There are many doors because a messenger occupies a particular door the whole time he is “in the house.”)

A firewall, in this analogy, would correspond to a complete facade built around a house (or group of houses, to be picky).  The actual house is not even visible from the street.  The doors of the original house are only visible to messengers if the inhabitants of the house build corresponding doors in the facade.  To enter the house in this scenario, a messenger would have to first knock at some visible door of the facade, be allowed in, and then knock at and be allowed into the actual door of the house.  In this way the security of the house is greatly increased from unwanted intrusions.  (And you can have a collection of trusted houses “inside the fort” which are less protected from each other.)

The title of this essay, “Mental Firewalls,” comes from an article by Timothy L. Thomas which appeared in the Army War College journal Parameters in Spring 1998.  It was titled “The Mind Has No Firewalls.”  The Army has an often honorable tradition going back to the Revolutionary War, the minutemen, and so forth.  But it also has had and still has some treason in its ranks.  This is just the “ground truth,” the “facts on the ground.”  An army that tortures the domestic population is an occupation army.  Treasonous Nazi pigs, in this real sense rather than some spin machine crap or some pathological liar’s bullshit, must be dealt with accordingly.  This holds for all branches of the military.  This holds for law enforcement as well.  It holds for all intelligence agencies also.  It holds even when they pretend the torture devices “don’t exist.”  Even if the victim does not realize what is happening to him or her, it is still torture.  Informed consent must be truly informed.  Torturing an American citizen is at least as treasonous as selling the nation’s top secrets to a foreign power.

Thomas’ article was in fact entered into evidence as part of a lawsuit by Harlan Girard of the International Committee for the Convention Against Offensive Microwave Weapons.  The article’s central metaphor is that human beings are like the computers on a network, except that they do not have the ability to control the information traffic entering and leaving them.  Their ports, or doors, are wide open.  This sort of analogy was prevalent during the military “information warfare” buzzword phase, and illustrates the sort of thinking that was going on at the time.  [On a note of caution, not all of Thomas' article should be taken literally; whether purposefully or not there is some likely disinfo there.]

Deception Operations Against the Human “Biocomputer”

What is it that corresponds to your reality?  What do you perceive, and how do you make your decisions?  You receive information through your eyes, ears, and other senses.  You read the information from the writers you choose to read, and listen to the speakers you have access to — very often these days from TV, radio, or the internet.  You think to yourself, in your private inner voice.  You visualize and imagine.  In information warfare against individuals all of these are thought of as nothing but information channels that can be blocked, censored, co-opted, faked, forged, impersonated, or otherwise controlled to manipulate an individual.  If you can control all the information an individual receives then you can control their whole perceived reality.  Like the hypnotized subject who does something which violates his ethics while being persuaded to imagine he is doing something else entirely, the information warfare subject is acting in a fantasy world created precisely to manipulate him to do what his controllers want.  This is known as a deception operation.

Such complete control, as far as I know, is not yet possible, but the principles still hold for whatever approximation can be achieved.  And the principles have been put into practice.  Of course “information warfare” is a buzzword and most of it is just a take on the ages-old practices of propaganda, lying, and manipulation.  But a new buzzword generates funding, and perhaps more importantly serves to morally distance the new “clean” practices from the dirty, filthy business of amorally manipulating human beings like pawns, with complete disregard for unalienable human rights.  What was new at the time of information warfare was 1) the internet as a widespread societal force, and 2) the wider development of neuroinfluencing and so-called nonlethal weapons that can directly influence people’s brains.

As medicine and technology develop ever more advanced prosthetic devices, people will increasingly become cyborgs — as is already happening.  Because of this trend these issues will become increasingly clear with time.  That is, it will become increasingly common to have computer devices implanted in one’s body.  If someone hacks into your home computer and steals or manipulates your data then a crime has been committed and you should rightly be angry.  But if someone hacks into your physical body, brain, and mind the violation is incomparably greater.

The Basic Modern Mind Control Torture Operation

In this section I will describe the basic torture setup used against our hypothetical, composite mind control torture victim.  The focus is on the effects that the victim experiences, not necessarily the particular technology that is used to inflict it.  Remember in all of this that the torture any individual receives can vary.  It will vary according to the torturers’ motives and technology, but will also be tailored to the psychology of the victim.  What might bother one person would not bother another.  The “professional” torturers will start according to how their torture manuals say to go about torturing someone with your profile, but almost all torturers will refine the torture to the individual if they can.  As they learn what bothers you they can focus on that more and more in their torture.  As you read this, keep that in mind.  These torturers are not any different from the sort you might read about in Red Cross literature, who shock the genitals of victims, etc., except that they have access to abuse the most advanced technology and hide behind an evil U.S. government which sinks to the lowest common denominator of the torturers it protects.

First of all, the victim is under constant surveillance.  The victim is harassed overtly and covertly, on the street, on internet, etc.  All forms of taunting and goading tend to occur.  For example, there is a “Marco Polo” type of “can you catch me” taunting.  Any and all sorts of high-tech and low-tech harassment are used.  (Just because it is sophomoric or pathetic does not mean they will not do it.  In fact, this increases the likelihood that the victims will be ridiculed if they complain.  Remember the shoe powder to make Castro’s beard fall out?)  The victim soon has to wonder about everything that breaks or goes wrong in their lives.  The harassers use their surveillance to see what troubles the victim is having and then try to “take credit” for causing them.  The torturers are often arrogant and even incompetent at their vile torture “jobs” despite using the most advanced technology to commit treason.

The victim is purposely isolated.  People close to them are threatened or deceptions are created to make the victim suspect those closest to him or her.  Deceptions are launched so victims will blame innocent neighbors for the harassment.  (Unfortunately, in the despicable circles of mind control torture, it sometimes is a neighbor or even a close family member that truly is responsible.  There might be an out-of-control “safe house” next door, for example.)

The victim is zapped inside his or her home (or a deception operation is launched so the victim thinks this is what is happening).  Heart rhythm palpitations induced by remote technology can cause terror to an individual inside his or her home.

The victim’s mind is under assault with voice projection, voice cloning. The Village Voice, in an article from July 2001 titled “Psycho Warfare,” described an Air Force report uncovered by Nick Begich.  Quoting from the article,

…the technology may be able to create high-fidelity speech in humans, “raising the possibility of covert suggestion and psychological direction.” It may be possible to “talk” to selected adversaries “in a fashion that would be most disturbing to them.” This is exactly what they do, and there are several different technologies documented in the open literature which can achieve this.  Some victims may be test cases for such psychological harassment techniques, or the method may already be “perfected” and in covert operational use.  [They don't mention this in psych textbooks or in movies about "schizophrenics," do they?]

Twenty-four hours a day, the victim is subjected to commands, ridicule, and distractions inside his or her private mind.  How would it feel if you heard a voice in your head asking, “Can you hear this?” as if someone were calibrating a torture device?  The brain wants to respond; it was never meant to be violated in these ways.  Interrogation.  What might bother you?  Any secrets, etc., the pigs might tease out and harass you with?  Anything that would insult you they could focus on?  Anything that might distract you they could keep you distracted with?

Finally, the victims’ supposedly private, subvocalized thoughts are somehow read, or inferred and analyzed.  There are various levels at which this can occur, from remote heartbeat and eye gaze analysis all the way up to brain implants telemetering EEG signals.  Not all victims report this level of surveillance, and certainly just the other harassment techniques mentioned above result in a grotesque human rights abuse.  But many victims discover that even their supposedly private thoughts are being violated and manipulated.

Living with Constant Harassment

How do you deal with “ordinary” social interactions with the pigs harassing you constantly in your mind?  Do you act “ethically” and warn everyone you interact with that their privacy is also being invaded, by way of you, against your consent?  People you interact with either believe you or they don’t, but either way the social dynamic is completely changed.  The pigs invade the privacy of everyone around you, by using you, even that of your spouse and children.  They may also impersonate anyone you see, in your mind, to make it seem as if that person is the one “contacting” you.  They try to make it seem like everyone can hear your private thoughts, that you are “broadcasting” to everyone.  (Of course some victims might actually be doing that; if they can read your thoughts they could then broadcast them wide-field or local-field…)

What sort of career are you “allowed” to have in a system where your intellectual property is stolen the minute you think it up and where you have to cope with both “regular” harassment as well as harassment in your mind?  All this is in addition to the ordinary stresses of the job — and not to mention that some jobs require actual mental concentration.  How sociable are long-term harassment victims with serious cases of Ongoing Traumatic Stress Disorder?  In American society there are also plenty of vicious jerks who, while not Nazis or torturers, are quick to sense perceived weaknesses in people and home in on them.  The Nazis can often just wound a person and then throw him or her to the sharks, bleeding.

It is natural for humans to think about other people.  It is even natural to run a mental simulacrum process to imagine and empathize with other people.  Monkey see, monkey do, air guitar, “I was just thinking of you…” etc.  The rapist pigs try to turn this against the human beings they torture.  Sex is also a natural process, as is farting, masturbation, defecation, burping, spats with people, fantasy, and so forth.  The rapist  torturers try to turn this against their victims.  They constantly attempt to demean their victims.  Worrying and anxiety are also normal human emotions.  The torturers, though, try to turn all of these human properties against their victims.

One technique the Nazi pigs use is to try to reinforce anything you might worry about or feel anxious about.  It is like taking a dynamical system and driving it at its natural frequency in order to purposely destroy it.  Of course this is not to say the idiots know anything about dynamical systems.  If you ever read Lord of the Flies in junior high school you know about the level that these pig idiots operate at, but when they rape your brain to inflict such ridicule and hatefulness it sets up positive feedback processes in the brain that constitute torture.  (If I am teaching these idiots anything by this, then you had better watch out because they have already tortured me.)  They will purposely injure you and then pick at your scabs if you start to heal.

This process also happens because you know damn well you are under surveillance and the pig ridicule squad is there to taunt you.  Try not thinking about something you are conditioned with “cattle prods” into knowing will result in harassment.  You know the torturers will zap you — that is why they goad you with triggers at times — but it is like not thinking of a pink elephant on command.   Yins produce yangs, so to speak.  Transcending the yins and yangs is hard enough without the torture.

The torturers treat your personal, private, internal speech as if it were your public speech.  They try to subject you to all the ignorance and “political correctness” and everything else that someone at a podium in a public place might be subjected to.  The sadist nanny state is not just concerned with what you say in your own home, they want to regulate what you think inside your head also.  That can really cause your “moron anticipator” thought pattern to distract from your normal private thinking, because you cannot even think your private thoughts without knowing they will be “reviewed” for you by rapist morons.

The Possibility of Magician-Like Illusions to Deceive Victims

The technology for thought inference does exist, but it is important to keep in mind the ways in which magician-like deception operations can be applied to a person to make it seem to them that their mind is being read.  While some victims’ thoughts are read, all of these techniques have likely been tested on nonconsenting American citizens.  The classic example is where the “magician” first subliminally “inserts” a thought into a victims brain and then later the magician “reveals” what the person was thinking.  By waving his hands and strongly suggesting to the victim that his thoughts are being read, the victim sees the phony “evidence” and tends to believe that is what is happening.  The outrage, indignation, and terror responses the victim is feeling will also tend to interfere with his or her reasoning processes.  Advanced profiling and prediction, based on standard surveillance techniques, is another possible means for deceiving a person into thinking their mind is being read.  While some victims have undoubtedly had such deceptions inflicted on them, the black budget torturers — before they will admit the true extent of technological advancement — will likely try to claim this is what was done in all cases.  Purposefully setting up the illusion of mind reading on a victim, though, is every bit as despicable and criminal as actually doing it.

The setup for the elementary example above can be carried out with only a basic voice-to-skull projection device with the victim in range for some period of time.  Suppose you wanted the victim to think about blue violets, for example.  You could beam at the victim very quiet suggestions of “blue violet.”  You could send them a song that they thought just got stuck in their heads.  You could use voice cloning technology and try to fake their own voice in their head.  Another technique is to transmit a word or phrase that is closely associated with what you want the victim to think about or do, and let their brain’s associative memory do the rest.  Now, after the subliminal send, the tension and drama build until the sadist magician culminates this particular deception operation against the mark (a.k.a. human being).  The magician sends an email to, say, a public mailing list the victim is known to read.  In the text of the message the magician works in the phrase “blue violet” — perhaps combined with a subtle threat.

Multiple Victims, Multiple Perpetrators

The above example is only the most elementary, of course.  What if two victims were interacting, how could a pair of them be manipulated?  The variations include two nonconsensual victims, or a consensual harasser messing with a nonconsensual victim.  There are also witting and unwitting victims; some have figured out parts of what is going on (intended or not) while others have not.  Some have been purposely duped into misinterpreting what is going on – they may think they are psychic, for example.  What about wide-field projection devices?  If two interacting people are given the same subliminal stimuli, how might they interpret it?  If you weren’t paying close attention, would you know if you were the sender or the receiver?  Especially if the manipulation continued for a long period without your awareness, perhaps even from childhood.  When PTSD is purposely induced, the victim is that much more susceptible.  Then you can consider the case where there are far more than two victims interacting:  a society of would-be slavemasters and those they would hold as slaves.  The general situation involves multiple victims and multiple perpetrators, all interacting.

There are many, many different scenarios.  I even considered writing an academic paper on the topic, something like “Mind Control Games People Play.”  Suppose you assume a particular set of technologies is available.  What logically follows from that?  It is like science fiction except that the reality these days is beyond science fiction.  The military might call it wargaming.  It is amazing the hideous sorts of operations that are possible with only your basic secret video/audio surveillance of an individual.  Now assume that a targetable voice projection device exists.  What could the people controlling it do in the worst case?  What sorts of deceptions could they carry out?  What countermeasures could be adopted?  When it really does exist and the consequences are so far-reaching, isn’t it unconscionable to leave the public in the dark about it?  Could a politician resist abusing this secret power?

For the purposes of the rest of this essay I will assume our composite victim has been “injected” or implanted somehow with a “brain bug” that transmits tracking information as well as audio and video of the sights, sounds, and internal subvocalized “thoughts” the nonconsenting victim experiences.  This is something like an advanced form of the CIA’s “Acoustic Kitty” project from the 1960s, where a cat was wired up as a motor-controlled listening device to be used in spying.  The difference is many years of technological refinement — integrated circuits were not even available then, let alone nano-scale devices — and the obvious difference that a human being is being tortured.  I assume that this device can also inject sounds which the victim perceives as if he or she “heard” or “thought” them in internal speech.  This is somewhat less control than what some victims report experiencing, but nonetheless is sufficient to illustrate most of the methods.  Even if such devices are not available to some particular group, variations of most of the techniques can be created by lower-tech methods like standard surveillance devices and external “zapping” or voice projection devices which are publicly known to exist.  The point is not the particular technological implementation, but what the victim experiences.

The Realtime Idiot and the Autopig

The term I use for an external voice projected into a victim’s mind is the realtime idiot.  For an illustration of what the realtime idiots “seem like,” consider a secret studio like at a radio station.  The “DJs” in this case are the rapists “monitors” who sit and listen to the violated thoughts of the victim.  These torturers also have microphones where they can “converse” with the unfortunate victim in realtime.  The victim hears these transmitted voices in his or her head.  Perhaps the rapists also have a virtual reality computer display of everything the victim is doing at the time, or even a display of exactly what the victim “sees” through his or her eyes.  Any thoughts the victim has, the realtime idiots try to pretend it is like a conversation with them.  You could not think a rhetorical question to yourself in your own private thoughts without the realtime idiot’s comments.  You could not pause for a moment of silent mental reflection.  They comment on things, they harass, they goad, they distract, they try to issue “commands,” they attempt to demean the victims (“Go brush your teeth”).  This all while the victim tries to live his or her regular, “ordinary” life and interact in the phony society.

At this point I have described the technique whereby Nazi pigs beam words and voices into the mind of the victims in order to harass and torture them.  This requires too many low-level Auschwitz guards, though.  These dumb sadists may get drunk and start talking, or they may get religion and try to expose their former activities.  The need for personnel also limits the number of victims, or “subscribers,” who can be controlled by the system.  The American answer, of course, is to use technology to automate the process and increase productivity.  This results in a device I call the autopig (or the Cameron/Delgado memorial autopig).

The autopig at its simplest is just a digital recorder that sends fixed “messages” to the victims at random times.  This is very similar to Cameron’s psychic driving torture that he inflicted on people coming in for psychiatric health care.  I sometimes call these random “pulses” Bergeron pulses after Vonnegut’s short story “Harrison Bergeron” (not the movie, which is good but different from the short story).  In the story all people were forced to be “equal” by handicapping those with exceptional abilities, and strong thinkers had to wear a device which would periodically emit a loud tone designed to disrupt the their thought stream.

Of course an autopig could also be used as a computer-aided torture device so that a single human torturer could switch between victims, secure in knowing that none of them was being left alone in their “private” minds.  The Delgado part comes in when the device gets feedback from the victim’s brain and sends an “appropriate” message.  That is, the sensor system analyzes the brain rape data, an AI-like algorithm decides what sort of response to send to the victim, and then the digital voice simulator constructs it and sends it.  Thus each victim has his or her own “electric fence” or something like the invisible fencing they use on dogs but more technologically sophisticated.  (You can consider things like stateful autopigs and stateless, or memoryless, autopigs, and so forth.  It is basic engineering.)

Besides realtime idiots and autopigs, there is something I call a Delgado button.  A Delgado button is a button the harassers can press and which stimulates some part of the brain.  There may be many Delgado buttons, for example, and the harassers learn what each one does empirically by observing the victims.  To the victim a Delgado button would just feel like some sensation, experience, or emotion came over them all of a sudden.  It might occur at a particularly inappropriate time, for example.  It might also serve as a distraction when the pigs wanted to stop some particular thought train you were having.  It might be difficult to notice; some subjects in published research would rationalize such induced behaviors and say that they just decided to do whatever behavior the buttons evoked.  A Delgado button also need not literally be a button and a brain electrode, it could also be something like a microwave beam at a particular frequency and with a particular modulation aimed at a person.  Metaphorically there can also be conditioned “software” Delgado buttons in addition to the hardware wired-in electrode buttons.

Data Analysis Under Torture

Now that I have described the basic mind control operation, in this section I consider the problem of data analysis for a victim of such crimes.  Don’t blame the victims; try to understand the hideous position they were thrown into and which they in no way got to choose.  Naive science-dude has probably not spent 5 minutes considering what victims are forced to agonize over for years.  The situation is closer to game theory with a malicious “opponent” rather than to the usual study of natural science, where natural phenomena are considered to be repeatable (or at least indifferent).

The victims must rely mostly on their own sensations and introspection; that is just the nature of this sort of advanced, secret torture.  This is not to say that evidence of the “ordinary” sorts of harassment should not be collected, or that a breakthrough will not occur and someone will learn how to detect whatever signals or devices are used to inflict the mind control torture and make it available to the victims.  The first challenge for the victim, though, is just to figure out what is really going on.  Many do not even have the language to describe what is happening to them.  They have to see beyond the stagecraft (“tradecraft”) of the Nazi technical illusionists.  The victims need to live their lives each day with whatever mental firewall countermeasures they can adopt in their minds.  Beyond this they can gather evidence to convince other people or for a lawsuit.  They will discover, though, that for the time being the court system, like the psychiatric system, is part of the problem.

How many times does someone have to beam a clearly external voice into your head before you have to question all your thoughts?  Not too many times, once really.  Some victims of this “one-shot” voice projection mind control may still suffer for years.  When will you believe they are not reading your thoughts or that they are not trying to manipulate you?  When the truth commission reveals the crimes?  No, you will never believe them again once you know how the pigs operate.  Most victims suffer from far more than just one voice projection experience, though.

Internal and External Thoughts and Sensory Inputs

Inside the mind, the torture victims really are human beings just like everyone else (even though they are treated worse than anyone would treat a dog).  They see with their eyes, hear with their ears, etc., have internal dialogs thinking about things, sparks of intuition, and all the usual features of the human mind.  As mentioned earlier, these are the processes the mind controllers attempt to hijack.  For the victims we can consider that their thoughts fall into three categories:  internals, conditioned internals, and externals.

An internal is a normal, natural thought grounded in external sensory input that the person consensually engages in.  The usual thought model that most people have the luxury of believing is that all of their interactions are consensual and that their private thoughts are actually private and not tampered with.  That is, they only experience internals.

An external is a nonconsensual input, like Cameron’s psychic driving where a person is strapped down and forced to listen to manipulative recording loops.  In the modern sense, the externals are the voices projected into a person’s mind from an external source.  (You can theoretically have consensual externals, even of this sort, but the victims certainly never saw a consent form and you’d be a fool to consent to having the pigs the victims are familiar with have anything to do with your mind.)  The signal from a programmed autopig chip in the head would also count as an external.  An external could also be an email from a Nazi that is based on mind-raped data.  Any normally consensual interaction becomes an external when mind-raped data or psychological triggers are purposely embedded there.

A conditioned internal, in the sense being discussed here, is an internal thought process that is a direct result of the torture by externals.  The mental “fruit of the poisoned tree,” so to speak.  After a week or so of having “you are a good marine” drilled into your head from nonconsensual externals, then when the machine is turned off there will likely still be the tendency to hear the phrase.  (Besides whatever other damage such harassment causes.)  This is especially true if the conditioning was specifically focused on certain stimuli — though random stimuli also become conditioned in the same way that a bell ring is associated to the bowl of food by the salivating dog.  A similar-sounding phrase, for example, can serve as a trigger for a conditioned internal.  Conditioning during trauma is also strong and long-lasting and can bring back vivid feelings of the original torture experience.

The manipulators can probably get some unwitting victims to march around their own homes like controlled robots.  People’s sensitivity to what is internal or external “in their head” would vary according to the person.  Age, length of abuse, and the particular technology and techniques used would also influence who becomes “witting nonconsensual.”  Perhaps this is a part of what determines who they harass and try to “break” and who they secretly control.  Those susceptible to hypnosis might be especially vulnerable, and some victims may be influenced only while they sleep.  (Is it terrorism to call for blowing up a Nazi torture center that “doesn’t exist”?)

The Protocol

A way to verify that a signal is purely external is via the protocol.  This protocol assumes you have a cooperative person on the other end of the external channel you wish to authenticate.  In practice, what you learn is that if there is such an external channel you do not have a “friendly witting” on the other end.  (And victims know from long experience that there is such an external channel.)  That is, the protocol is a way that a “friendly witting” could authenticate to you the existence of an information channel that supposedly “doesn’t exist.”

If you have visual, auditory, or tactile contact with a person the protocol is easy.  (It is better if they cannot see or hear you, since that constitutes another, uncontrolled data path.)  Suppose you can hear a person talking.  Then the protocol is to think to yourself something like, “say 4533.”  You may wish to choose something else they could say without attracting attention, if that is a problem, but be sure it is something which is very unlikely without a mental send.  Count, say, five seconds for a response.  Either they hear your thoughts or not, and they either respond or not.  In this case the channel is specific to a person and may not exist or the person may not be a “friendly.”  For visual contact the situation is similar, you can think something like, “hold up three fingers.”  Notice that this protocol also works for something like listening to a realtime broadcast such as radio.  A similar protocol works for written media, think “write the number 6423″ and email it to me or put it in your newspaper column.  Note, though, that in all cases there may still be a hidden “man in the middle.”

You can actually verify a pure external send and receive without visual, auditory, or tactile contact.  Just the “mental” contact.  This applies to anyone and everyone who can hear your thoughts and send a reply.  It requires that you have a calculator, and a cooperative person with a calculator on the other end of the channel.  The protocol is, “What is the cosine of 1999?”  The first four digits after the decimal, in radians, one at a time.  If the pigs cannot send that data they are either retarded or engaging in a conspiracy.  There are a couple of other possibilities, including pure internals, but the point is to have a cryptographic authentication challenge to verify a pure external send and receive.  Anyone can punch the buttons 1, 9, 9, 9, cos on a calculator.  I do not know the answer, but I can check it easily.  [You should change the number 1999 to something else for your own protocol, since you want to be able to conclude a pure external read and send.  The number is something you only think "to yourself," and choose a new challenge number each time you check a response with a calculator.]

They never send valid four-digit numeric data, let alone the correct answer.  They do send numerics, though, and could presumably program the answer into the autopig.  And they get sloppy sometimes and you get a good strong piece of data that indicates external reads and sends, even though they do not send the protocol.  This is one reason such a protocol is useful:  It illustrates what the ideal data would look like for a remote read and send, and can help clarify more ambiguous situations.  But keep in mind possible magician-like deceptions as were mentioned earlier.

The Calibration Problem

In evaluating uncertain data in the real world, including that from hostile sources, it is important to calibrate the expected level of background noise.  If you are reading the torture between the lines, you also need to keep your head and not go off on too much unconnected symbolism.  Keep this in mind when reading items that truly could not possibly relate to you or your situation.  This gives you an idea of the basic background level for symbols, etc., to appear.  Keep a threshold and discard any questionable data.  The good data points tend to be frequent enough, and at some point even they do not tell you much you do not already know.

As an example, suppose you cursed the pigs, just in your head, sometimes.  If you get them angry they sometimes screw up.  Say you were taunting them by asking them whether they picked up your thoughts in Niger (as an random example of a far-off place).  By the way, you can taunt them all you want in your head, since it is only you and the Nazis there.  Likewise, curse the pigs that bug your house all you want.  They just do not seem to understand that if they reveal anything they know about your private mentation or private conversations in your home they cannot call you crazy.  It would be like entering the FBI tapes of Martin Luther King saying the FBI was out to get him as evidence that he was paranoid.  “The voice in my head said I was crazy.”  Back to the Niger example, suppose you then get email from someone claiming to be a victim, who has a name very similar to yours, and who claims that he went to Niger and could not escape the harassment.  That seems pretty unlikely for a coincidence.  Then the question is, is the person a witting or unwitting harassment agent, i.e., is it another victim manipulated into harassing you or is it a cointelpro agent?  How many people have been to Niger?  Many victims are understandably afraid to talk about such experiences, though.

Reasoning Under Uncertainty

One thing that the mind controllers do — and which manipulators and propagandists have done for all time — is to exploit weaknesses in human reasoning.  The brain is a fantastic, beautiful organ of the human body; no human being on the earth should ever be tortured.  But humans also tend to have some weaknesses in evaluating data compared to, say, a mathematical algorithm.  One difficulty lies in dealing with uncertainty.  The mind control victim is literally overwhelmed with uncertainty and must sort things out as best as he or she can.  The victim has to consider every weird thing that has ever happened to him or her, whether it is related, and knowing that the mind rapists will see this thought process and try to reinforce any misconceptions.  Another difficulty is dealing with distractions, especially when they come in on a hostile “channel” that the brain was never meant to be accessed on.  Proportionality and scale are another difficulty, and people tend to think binary rather than continuous, and one-dimensional rather than multi-dimensional.  People often have a tendency toward superstitious thinking.  Finally, in a social sense, people are very bad at dealing with big lies, i.e., conspiracies of liars.

Understand aggregate statistics.  You can sometimes reason better with them.  As an example, you know that there are some people in the world you can trust; you just don’t know exactly which ones they are.  You can often estimate aggregate statistics better, since if you get one wrong here or there it all averages out.  Suppose you estimate, based on a great deal of data, that posters on some mailing list are, say, 40% agents and provocateurs, 35% real victims and activists, 15% who probably consider themselves scientific, nonsuperstitious thinkers looking for the truth, and another 10% who are unclassifiable.  There are some who you are sure enough about to not worry with percentages, but in general any particular person on that list is “suspect.”  Nonetheless, the list can still function as a way to reach and connect the 35% of mind control victims and activists.  It may also serve as a way to convince and educate some of the actual open-minded decent people who are not mind control victims.  Another use of aggregate statistics is to reason from historical records.  We know that there are thousands of mind control victims in the population, at the least.  We just do not know which particular people claiming to be victims are the actual victims (or which still unwitting people were/are victims).  Never forget the humanity of the real human beings involved in the statistics, though.

The Asymmetry of Dignity

You are a human being with unalienable human rights.  Unalienable means that they cannot be taken away.  They can be violated, infringed, ignored, and even legislated away, but the acts of a tyrant do not change the fact that you are a human being with unalienable human rights.  This means that the tyrant is always a tyrant, and remains a tyrant, to meet the fate of tyrants.  The same holds for the lackeys and collaborators of tyrants.  This is a fundamental asymmetry between the citizen and the tyrant.

Torture demeans the torturer.  The dignity of the torture victim cannot be taken away by the torturer, but the act of torture destroys the dignity of the torturer.  This is not enough punishment for such hideous crimes, but gives cause to pity the torturer even as you work to hang the pig.  Let me explain about what I mean about justice for the victims of these treasonous Nazis, who commit crimes against their fellow American citizens in peacetime which would be war crimes even against an enemy in warfare.  Under a legitimate government such people would receive life sentences in a humane prison system.  That would be my preference, but the United States currently has neither.  So when I talk about hanging the pigs I am referring to whatever justice-type processes can be set into motion.  That was the subject of Part II.  Get the right ones.  We will not forget, and when these pigs are 75 years old they are still Nazi pigs and still serve the rest of their worthless lives in a humane prison cell if such exists.  The legitimate government treats mind control torture like the true crime it is, even when government agents are involved in committing the crimes.

You have absolute free mentation in your brain and mind.  Your freedom of thought is unalienable.

The Nazi Pig Theorem

The adjective, “Auschwitz-level,” to describe these crimes, is not hyperbole.  If you do not feel like you need to vomit, you probably do not really understand the full sickness of mind control crimes.   Gordon Thomas wrote in the introduction to his book Journey Into Madness: The True Story of CIA Mind Control and Medical Abuse: “In working on this book I have had to come to terms with my own emotions — disbelief, bewilderment, disgust, and anger and, more than once in the early stages, a feeling that the subject was simply too evil to cope with.  Nothing I had researched before could have prepared me for the dark reality of doctors who set out to deliberately destroy minds and bodies they were trained to heal.” Torturers can never blame their victims, though they invariably try.  These torturers are the sorts of people who will repeatedly hit a bound and gagged victim with a stick and then try to claim the victim caused it.  They’ll steal from you and then complain about the property they stole; they’ll rape you and sneer at the quality of the “sex.”

This brings me to what I refer to as the Nazi Pig Theorem (NPT).  Strictly speaking it is a metaphorical axiom, but it can be very useful to the torture victim.  It basically asserts that if you act like Mengele then you are a Nazi pig.  Then there are a few obvious conclusions that are also part of the “theorem.”

The Nazi Pig Theorem (NPT):  

Anyone who nonconsensually violates your brain/mind/mentation using Mengele-like methods is a Nazi pig.

 

You do not care what a Nazi pig thinks.  You do not care about a Nazi pig’s opinions.  You do not respond to a Nazi pig ridiculing you, threatening you, trying to distract you, or otherwise trying to manipulate you.

You work to get a Nazi pig hanged.


Isn’t that obvious?  Don’t you believe it?  Then remember it and act like you know it.  NPT is as sharp as a razor.

The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not raping your brain.  So you can think anything about anyone; it’s just you and the Nazis in your mind, and their opinions do not matter at all.  If you have a passing thought about someone and the Nazis try to harass you with it or make you feel guilty about it, it does not matter.  The Nazi pigs’ opinions do not matter (unless they somehow help to get the pigs hanged).  If you think some thought about someone who really is raping your brain, then you have some worse things to think about that Nazi piece of human garbage than what floated through your brain originally.

One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are being tortured and you know the true, evil nature of the society you are living in.  Spend some time each day working for justice in the physical world, and the rest of the time try to ignore the Nazi pigs and get on with your life as best as you can.  My philosophy is basically to wish people well, and any differences I have had with people are all water under the bridge after not too long.  But atrocities never, ever pass under the bridge.  The victims never forget, and never should forget.  Of course any victim is free to choose to forgive his or her torturers, but for torturers to lecture their victims about forgiveness is the “Christianity” of the oppressor.  Forgiveness also does not preclude justice.

The unfortunate reality is that when dealing with anyone, they are either a Nazi or a non-Nazi.  Torture makes it that clear.  This is the top node of the decision tree for the torture victim, and it is a stark split.  The following diagram illustrates the split:

That is clear enough.  Of course the difficult part is that you do not know exactly who is a Nazi pig and who is not.  So you might start off with a reasonable benefit of the doubt and collect evidence from there to update your current assumptions.  But how do you deal with someone you think has a 10% chance of being a Nazi pig?  How do you deal with someone you think has an 80% chance of being a Nazi pig?  That is your own utility/decision function and it is not easy.  People have to make decisions based on imperfect information all the time, but this purposefully inflicted torture pushes it past what people are accustomed to have to deal with in ordinary situations.  Nonetheless, the government is accountable for the aggregate situation where torture occurs regularly and systematically in American society.

The NPT is your firewall.  As a corollary, the external firewall theorem states that you do not care in the slightest bit what Mengele thinks.  Analyze the external incomings for nature and source, as well as for other evidence if you choose to, and then send them straight to your mental /dev/null.  Then work each day to get the pigs hanged in the real world, in the best way you can figure to do it (see Part II).  There is also an internal firewall theorem:  Your brain is your own to think whatever you want with.  Simply invoke IFT and think about something entirely different if you are thinking something that you don’t want to be thinking about.  Train yourself toward that, at any rate.

Some Suggestions for Thinking about the Harassment

The way to think of a nonconsensual external is as an advanced cattle prod that can be modulated in various ways to cause you pain.  The modulation happens to be with words or clicks, but that is secondary.  It is a modulated cattle prod.  Notice it and try to get a feel for the nature and source of the signal.  Where does it seem to be coming from?  What is the quality of the signal?  Later you can analyze the psyop sentence the pigs modulated onto the cattle prod signal if you feel like it.  (This may reveal more about them than about you; the modulation is based on “you” reflected off of their filthy Nazi distorting mirror — with their intention being to cause you harm.)  You might keep a rough histogram count on the autopig phrases, for example.  Does the signal ever have a foreign accent or speak a foreign language?  Probably not.  But basically understand that the Nazi pigs are complete, pathological liars.  If they flatter you one second they’ll kick you in the head three beats later, you can almost count on it.  Pathological liars only tell the nominal truth as part of a larger lie, and the purpose is to destroy your mental well-being and your life.

Source before semantics (signal before semantics).  The source is where the signal comes from, both the “person” sending it and the sensory input method by which you receive it.  The semantics is the meaning of the signal: it is the interpretation of the signal and its modulation.  For example, the semantics of a signal will often be its interpretation as an English sentence.  If the signal comes in on a rape channel, do not even give it a semantics except perhaps as part of an evidence-gathering process.  It is just a sensation you feel from the external cattle prod.  The presence of the nonconsensual external signal itself is torture and is the only real information, since the modulation is by pathological liars whose intention is to cause you harm.

Don’t debate the autopig (or the realtime idiot).  Even if it’s easy.  (Unless you feel like it.)  They hate it when you ignore them.  Go on with your ordinary life, meeting people, etc., and especially speaking out and working for justice in the real world.  You can only really ignore them when you know what is going on, though.  Some of the people who they march around their own homes like robots probably think they are just ignoring it.  There is a big difference between an experienced victim deciding to ignore future signals and some well-meaning advice-giver who has never been tortured telling you to “just ignore it.”

If it is indistinguishable from an autopig, treat it as if it were an autopig.  With some basic voice-recognition type software applied to raped subvocalized thoughts, I could write an AI-like program that sounded just like the repetitive, simple-patterned Nazi pigs I am familiar with.  In this sense, the realtime idiots do not even pass the Turing test.  Actual people (who are not torturers) have names, they do not repeat things endlessly, they think things other than harassing you and commenting on your thoughts, and they can push a few calculator buttons.  For instance, why do you never hear someone driving their car down the street thinking “use a turn signal, you asshole”?

Don’t explain your thinking to the Nazi pigs, it is better if they misunderstand what they rape from you.  By default you are only ever thinking to yourself.  Work toward the rapid extinction of the Nazi conditioning imposed on you, at least as rapidly as you can manage.  Try to extinguish your conditioned responses and replace them with only an awareness of the triggering sensation.  Some are random events acting as triggers, while others are purposely inflicted.

It may help to write about what you experience or keep a journal.  There are pros and cons to this, though, since the pigs will have access to what you write also.  It might provide them with feedback to help them torture you or others.  If you complain about something they will almost surely start doing it to you more.  You have to weigh whether writing about it helps you to deal with it, like when you can share it with other people or when you see how stupid it really looks when written out.  Stupidity is no barrier to the torturers, in fact it is part of the torture.  For example, if you make a self-deprecating joke it will not be long before the pigs are goading you with the subject of that joke for real.  Of course much of the torture is never anything clever the torturers do, but your own knowledge that these people who do not even know you nonetheless hate you enough to violate your mind and then go to a great deal of effort to try to inflict serious harm on you — often seemingly for their own entertainment.

Try tuning out the pigs like you might cure yourself of hiccups.  It might work, or at least help you train yourself to ignore the pigs.  Notice the nature and source of the signals, the mental gnats meant to annoy you.  Parasitic mind fleas.  If you think like the monkey, you’ll be as dumb as the monkey.  If you watch that TV too much you’ll be as dumb as the morons on it.  They will entertain you right into digging your own grave.

How Can a Society I Detest Defile Me?

How do you deal with a secrecy-bred society of dumb-as-cows “innocent” people, Nazi pigs, and victims?   Or the collaborators, apologists, and profiteers?  What about the people who idiotically ask, “Why are you ongoing torture victims so obsessed with your torture (and human rights, etc.)?”  The social system where no one can talk about the elephant in the living room, even though many people know at least that something is there.  Did people not get born with tongues to speak with?  Or is this a conspiracy of idiots and cowards?  What the hell is wrong with these people?  What kind of people complacently live in a society where torture regularly and systematically occurs, pretending it doesn’t?  Is it still that old pig slaver mentality, or the ability to look away from such abominations as an everyday thing?  For centuries it was forbidden to teach slaves basic skills like reading.  Is it better if you can read but only have access to lies?

Every day for the mind control victims, it is like the rape victim who has to go out and interact in the society where her rapist is still at large.  The difference is that there is a whole conspiracy of rapists and they rape the victims each and every day.  So perhaps it is closer to what were euphemistically called “comfort girls.”  How do you think it feels to wake up with a pig in your head?  Is that the only alternative to being dumb as a cow and wearing a gag in this society?  The “consensus reality” of the average citizen is far, far from the real truth on the ground.

Americans are the best liars and biggest hypocrites on the planet.  They will probably even be flattered by that description.  They love being number one, after all.  Hypocrisy is like lies, in the sense that there is ordinary hypocrisy and there is big hypocrisy.  If you credibly call an American a big-sense hypocrite they will often start spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling someone their new haircut looks bad.  Americans want to be both peepers and prudes, they want to rig the game and call it free enterprise, and they want to be known for freedom and liberty regardless of any domestic atrocities they commit.  You can never un-torture someone.

If people are capable of outrage there will be far fewer outrages.  How dare those pigs do that to anybody.

Part II: Resisting the Mind Control State

Part II: Resisting the Mind Control State
Allen L. Barker April 29, 2001

This essay is a compilation of thoughts on methods to resist governmentally and societally supported mind control torture, repression, and exploitation.  It is part II of a series of three, and deals only with social and political issues.  Part I, “Motives for Mind Control,” describes some of the motives for mind control and why it continues.  Part III of the series, “Mental Firewalls” deals with the techniques and methods that survivors of this torture have developed to resist having their very mentation tampered with, their bodies and lives violated, and their minds turned into battlefields.

The purpose of this essay is not to try to convince anyone of what is truly going on, but rather to analyze the situation and consider what can be done about it (after you know well enough what is going on and are willing to act as if you know it).  I have talked to a good number of mind control victims over the past few years, and many ask me what we can do about the situation.  That has been a difficult question. There are many possible actions to take, but ineffective actions only waste time.  It is a complicated and disgusting situation in the U.S. with regard to mind control abuses, and it does no good to pretend otherwise or mince words.  This essay is perhaps part of an answer, such as it is, to those questions.

A Brief Description of Mind Control Torture

First, I should explain what I mean by mind control.  Some so-called “rebuttals” of explanations of mind control harassment and technology focus on narrow semantic interpretations of the term, for example by setting up the straw man that any mind control technology must be able to completely control someone’s mind.  I am using the term in the more general sense that is now the common usage.  By mind control I am referring to covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing. I am especially dealing with situations where individuals are singled out for campaigns of influencing and harassment using advanced technology.  I am not referring to such things as everyday TV commercials trying to convince you that you need the latest shampoo — unless the commercials are being used in a way deeper than this surface level such as with the inclusion of subliminals and triggers.  (For more details and descriptions, see for example the Mind Control: Technology, Techniques, and Politics web site at http://www.datafilter.com/mc .)

The technology is rooted in surveillance devices, such as audio and video bugs, through-the-wall and remote sensing devices, and biosensors both remote and implanted.  This provides the feedback for the influencing, as well as any “entertainment” value for voyeur/sadists and intellectual property theft for thieves.  Coupled with the surveillance is some sort of “effector” or feedback path for influencing an individual.  This may be as simple as spreading rumors and gossip based on the surveillance.  It may include acting out “street theater” to the individual, letting them know they are under surveillance and putting them in bizarre situations to see what they do or to cause trauma and disorientation.  This may even include spreading the information for use by “assets” in the newspaper, television, radio, and advertising businesses and on the internet.  In some individuals hypnosis may have been used to condition certain reactions and behavior to be triggered by later cues.  The use of technology ranges from using harassing phone calls coupled with surveillance-based feedback to provide aversive stimuli in a person’s home, to abusing the media and the internet as a means for harassment, to the use of pulsed microwave beams to cause pain, anxiety, or heart palpitations, to the use of brain implants to record and affect the brain directly, to…

Thus there are several categories of mind control operations, for example covert druggings, hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks, and ongoing feedback control setups for long-term torture and exploitation of victims, to mention a few.  What they have in common is the attack against the mind of the victim, as well as the deniable and denied nature of the attack.  The exact means being used in any particular case are beside the point here.  These techniques do not just violate one or two of what everyone knows are fundamental human rights:  In one fell swoop they violate almost every fundamental human right a person has.

Standing Up and Resisting

I am sure that most if not all of the strategies I will discuss in this essay have occurred to people involved in the area of mind control for any length of time. I hope this essay will prove useful by collecting these various ideas together and providing a big-picture overview of some possibilities. I have tried to cover the whole range of possible actions, including violent action. I know the torturers and their apologists may take this as some sort of propaganda coup, and that these state-sponsored terrorists may go around shouting “terrorist,” but the list would not be complete if I did not include those possibilities.  Thinking about all the possible reactions can yield insights into seemingly unrelated matters.

Some people’s response to ideas for action is to criticize the person putting forth the ideas. Remarks like, “what have you done,” “why didn’t you do this or that,” and “what is your hidden agenda” are to be expected, indirectly if not directly. I am confident enough about my efforts over the past years to expose and stop these human rights violations to not let that bother me — whether or not someone else might agree with my approaches. Developing a thick skin against smears and dirty tricks is necessary in American politics in general these days, and especially when trying to expose horrible atrocities carried out by well-funded and secretive groups.  Everyone has his or her own skills, abilities, and situation, and knows if he or she is making his or her best effort in the circumstances.

I am coming out and saying a lot here, and I have given it a lot of consideration.  Some people might argue that incremental progress is the way to present things, to preserve some notion of “credibility.”  To me, preserving “credibility” means to point out what I know is the case after I know quite well it is the case.  There have been denials every step of the way, even of technology that definitely exists like microwave voice projection and implanted tracking devices.  Does that not impugn the “credibility” of the deniers, or the professional liars who are known to have tortured American citizens for decades?  Why should anyone think that such programs of torture ever stopped?  They have not.

The signers of the Declaration of Independence pledged their lives, their fortunes, and their sacred honor.  I present this essay in the same spirit.  If people are afraid to say that they are being tortured in the U.S. then the torturers will be free to keep on torturing.  As the song goes, “it starts when you’re always afraid.”

I have already been subjected to torture-level extrajudicial surveillance and harassment by “my fellow Americans,” inside my own home and mind, for the past four [now six] years.  This has sharpened my awareness in some ways, and I have seen quite directly how this stinking society and culture operate.  So I know something about how these pathetic, juvenile and barbaric rapists work — though it is difficult to imagine and it would make you feel sorry for them if it weren’t for their many victims.  So yes, I will write it.  I will stake my credibility, career, family, and life on it because I know damn well it is true and there is no real alternative but slavery.

(Why didn’t the colonists “prove” in a corrupt and controlled court that the soldiers of King George III oppressed the citizens of the colonies?)

The Actual Situation

This is a very brief rundown of the current situation in the United States today. Similar situations exist in other “advanced” countries, but my focus in this essay is on the U.S. (Though other countries have adopted or will adopt the American model of repression.) The situation has been described at length in other essays and books by various authors, so this is just a summary.

The United States is, for all practical purposes, a military/intelligence police state.  This reality is hidden behind a facade of representative government and media psyops and lies.  The evil empire had an evil twin.  Citizens can be selected at random for horrible experimentation and abuse.  Those who seriously challenge the corrupt system face covert harassment and abuse.  Collaborators, apologists, and profiteers.  Our elected representatives have no real power at all over the military/intelligence complex in the United States.  They are generally bought and paid for by groups interested only in making ever more money, in any way possible.

There still are many decent people in the United States.  At least that is what little faith I have left in America.  The stated principles of this country still stand strong, even as they are ignored.  That might be some slight hope for the country, but I hate this country now.  I hate the United States.  Read this paragraph again from the beginning.  I hate the phony culture of lies and exploitation.  I hate its stinking loudmouth hypocrite “rulers” and their goon squad torturers.  I hate its ongoing atrocities and its phony veneer of “civilization” pasted over its blatant barbarity.  The fourth reich is alive and well in North America, Americanized with lawyers, PR men, marketing, and advertising.  The death camps are kept well-hidden as they continue operating for decades, as slaves are taunted with lies of freedom, free enterprise, and a “strong economy.”

Great masses of people are not knowingly touched by this repressive system because they do not need to be:  They are kept “blissfully ignorant” (or pretend it out of expedience).  They think they are living in the phony nation the propaganda advertises, and are compliant subjects for their hidden and self-determined overlords.  This might be called government from underneath a rock.  The persecutions and exploitations are just as vile, if not more vile, because they are hidden.  The entire culture suffers, but no one seems to notice the absence of real dissent or fresh ideas or leaders coming from outside the corrupt two-party system.  It is like Disneyland, where everything is a facade.  The difference is that in Disneyland everyone knows it is a facade, and people are not being tortured back behind the facades

American marketers might even portray this new feudal and repressive state as some sort of advance.  For greedy fascists without consciences and who can manage to stay on the exploiting side rather than becoming one of the exploited it might be a real “paradise.”  I hope historians for centuries hence will see the current American leadership as the Vichy government it is, collaborating with and profiteering from crimes against humanity.  These leaders are either real fools or they know damn well what is going on in their repressive nation.  Look at them on TV.  They want to condition you to feel some phony nationalism and well-being at their slick lies;  condition yourself instead to feel revulsion and disgust at propaganda reels.  That box in your living room lies constantly, and to personify it further, it is one of the biggest and most culpable collaborators in American atrocities.  Always another lie, always blaming a victim, always spinning this way and that, always an excuse or rationalization.  Keep your mental distance from this mind poison and see it for the controlling tool it is (as well as for what it could be and could have been).

Let us assume a counterfactual for a moment and suppose that the U.S. government is not involved, that it is “only” private groups or foreign governments attacking and exploiting American citizens.  In that case the U.S. government is still guilty and complicitous.  They have kept the technology secret, have helped in the repression and discrediting of victims, and have done essentially nothing to stop the abuse.  They have failed in the most basic functions of government.  These are serious, serious crimes we are talking about here: literally torture and enslavement.  (Should, say, Russian or Chinese government agents be free to mind control torture American citizens here in the U.S.?  Should organized crime groups?  Should industrial espionage agents or “friendly” intelligence services?  Obviously not.)

It really is that bad: evolved torture techniques, a neutron bomb that destroys the person from within while society can ignore it.  Understand, this is known stuff and much is admitted by the government; but still no actions are taken.  While the government has only admitted a grain of sand in the desert of its atrocities, what we know is bad enough.  And still nothing happens and the politicians go on grandstanding, pretending nothing is wrong, and stuffing their pockets.  If someone came into your home and did this to you or your family directly you would  be completely justified in shooting them dead — and any jury in the country would agree with you.  But when government agents do the same things, its Nazi pigs are protected and the victims are further smeared.  If there is any use for “Old Sparky” it is to fry these torturing, treasonous, Nazi pigs.

The Community Against Mind Control

The community against mind control is a varied one.  There are researchers who have uncovered mind control abuses (and then encountered the mind control coverups), there are victims and their families and friends, and there are other citizens who have heard and seen what is going on, recognized its truth, and acted on it.  There are a few organizations set up to resist mind control, and several researchers and activists who have worked on the issue and with victims for many years.  I will not name them here to avoid leaving anyone out.  Fortunately or unfortunately, there is no real unified leadership fighting mind control in the United States, not to disparage anyone’s work in the area.

First of all, being an outspoken critic of American mind control atrocities is not helpful to one’s career, finances, or health.  Things may get better as the atrocities gradually come more and more to light, but harassment and surveillance are to be expected.  People working against mind control, especially when they are victims themselves, must deal with the fact that they are being watched and their every move (and even thought) is being analyzed.  The criminal factions can move to thwart or counter any move even before it happens.  Remember, these are atrocities committed against men, women, and children for years on end, committed by vicious and amoral people with powerful connections and funding sources.  They will threaten, blackmail, harass, and murder to conceal their crimes.  The lie of American freedom serves them well as cover for their fascist tactics, but also makes them especially fear exposure for what they are and what they have done against their own people.

Mind control victims themselves can be somewhat difficult to work with, and for good reason.   They have survived and are still coping with almost unimaginable torture experiences and the associated psychological and physical trauma (these would be called torture sequelae, but the torture generally has not stopped and is ongoing).  They have been betrayed in the worst way imaginable by their own people.  They have been exploited and been put through experiences meant to demean them.  They have been slandered, blackmailed, and threatened.  They have had their minds repeatedly violated and often their bodies as well.  They have seen provocateurs disrupting anything that looks like it might achieve something and know all too well about infiltration.  They have watched their society and seen how pervasive this modern-day system of torture and exploitation is in the United States.  They tend not to be financially well-off, for obvious reasons.  They have often had such incredible and hard-to-believe experiences on an ongoing basis that they do not even mention the most outrageous ones, knowing they will face ridicule enough for describing their other experiences.

There are victims of various sorts of mind control experiments and operations, from childhood induced trauma and conditioning, to hypnosis abuses, to electromagnetic harassment, to covert drugging, to implanted devices, to street theater to…  In short, any sort of mind control technology and technique the government has wanted to test it has tested on its unconsenting citizens.   Thus there are many different experiences, or clusters, of mind control victims.  The people themselves have varied backgrounds and have as an unfortunate commonality that for whatever reason they were singled out and tortured.  There are some victims who have suffered brain damage and severe psychological problems as a result of their torture.  There also are truly mentally ill people, true kooks, and provocateurs impersonating both to help discredit the real victims.  Many victims have a history of some connection to the military or to an intelligence agency, which is sad but not surprising, and thus face realistic suspicions that they are agents or plants.  Altogether these factors point to why mind control victims are reluctant to trust anyone, much less someone claiming to be or touted as their leader.  Thus there is currently a sort of leaderless resistance to mind control, which I hope can be more effective than it currently is.

Mind control victims are very much like prisoners of war who have been tortured.  The difference is that they generally do not know why they have been tortured, they do not have their own army or support system, and they have been tortured by citizens of their own country.   That, and the torture is generally ongoing and has not stopped.  Rather than any sort of sympathy or respect for having “served their country” by being selected for exploitation and torture for the sake of what is billed as “national security” or “freedom,” these veterans of mind control abuse are subjected to ridicule and abuse.  The psychological torture, and often the physical torture, is ongoing.

The torture victims are supposed to second guess the reason for their torture.  Why were they selected?  What is so special about them?  Their being selected for torture might even be portrayed as some sort of flattering attention that needs a special explanation, lest they be accused of having delusions of grandeur.

State and Societal Methods to Continue and Conceal Ongoing Mind Control Operations

The primary method used to conceal and continue ongoing mind control operations is secrecy.  The weapons used are highly classified, and those who abuse them to summarily torture American citizens benefit from a conspiracy — as defined in the dictionary — to conceal their crimes.  Secrecy is the American passion; it is the way the United States institutes fascist repression against its citizens while pretending to be a democracy respecting human rights.  Secrecy has only grown more entrenched in the U.S. since some of the mind control abuses against citizens were exposed in the 1970s.

The psychiatric and psychological communities are also used as tools in the repression and torture of American citizens.  Sometimes wittingly, sometimes unwittingly, mental health workers aid in and help cover up mind control operations in the United States.  First, these communities aid in the repression by advertising mental illnesses and their symptoms while ignoring technological means for inflicting the same symptoms.  They ignore the reality of government harassment campaigns and nonconsensual experimentation on the public.  This lays the groundwork for mind control victims to be labeled as mentally ill and dismissed, or for some half-educated person to think they are helping by suggesting the victim “get psychiatric help.”  Deniability is one of the first principles of covert action, and inflicting torture which mimics the symptoms of mental illness is not especially novel.  The deniability is preserved by publicizing mental illnesses while denying mind control technology and harassment techniques.

Secondly, the mental health community aids in repression by directly diagnosing and even institutionalizing against their will people who claim to be mind control victims.  This is nothing short of the former Soviet system of using psychiatry to discredit and silence dissidents and others, though with a typical American spin involving layers of lies and secrecy.  There truly are mentally ill people, and their illnesses are unfortunately used as cover lies for torture. This is just another sad reflection on a profession sworn to “do no harm.”  Aside from a few trusted practitioners, the mental health community and system should be considered collaborators in American repression, at least until their diagnostic manuals have entries for electronic and other mind control, nonconsensual experimentation, and trauma and torture sequelae due to harassment campaigns like those the U.S. government has carried out for years against its own people.  The psychiatric community is used to enforce belief in the socially demanded delusion that the U.S. government does not engage in extrajudicial torture and harassment of its own citizens (and the delusion that the psychiatric community does not have years of mind control blood on its hands).

Next, there is the American press.  These liars participate in coverups of all sorts of intelligence community atrocities, while at the same time preaching about freedom of the press and their mythical watchdog roles.  A recent canonical example is provided by the mainstream papers’ attempts at discrediting and smearing the few journalists who dared to report CIA knowledge of Contra drug trafficking — even though it was already known from Senate hearings years earlier.  [In an interesting two-birds scenario, at the same time this cocaine was being imported the zero-tolerance just-say-no campaign was going full force, and our prisons were being filled to world-record levels with inner city users and sellers of some of this same cocaine.]  Even when the CIA finally admitted as much in its own reports, the press would not report it accurately, let alone apologize to the actual reporters they had smeared.  This is what the dictionary and the law define as a conspiracy.  Most media outlets in the U.S. are de facto propaganda outlets for the government, especially for the intelligence agencies.  The shameful refusal of the press to cover human radiation experiments by the government for almost a decade after the information was released by a Congressional committee is another canonical example, perhaps even closer to the case of mind control torture.

Not only will the press not openly report ongoing mind control abuses and torture, many in the press act as apologists for it and even as participants in the torture.  Many mind control victims have become very familiar with the way that symbols and codewords are used to both let the victims know they are under surveillance and to attempt to smear and discredit them.  This coded and between-the-lines speech is apparently standard issue in the intelligence and diplomatic communities, while ordinary citizens tend to scoff at the notion of basic “English 101”-type symbolism being used by journalists and spies.  Deniability is the principle.  Have your cake and deny it too.

The techniques for deniable smears include making the smears either be so specific or so general that they can be denied — and these deniable smears can be distributed across the entire media spectrum like other concerted propaganda campaigns.  An example of the specific sense would be what the victim ate last night or what the victim’s  spouse said during sex (intended to harass and goad).  The general smear could be general stories about things the victim has recently done or been interested in.  These are deniable, though the victim knows, and is supposed to know, but cannot say or do much for fear of being called insane.  This is combined with symbolic and between-the-lines “stories” dealing with the victim in a deniable way, smears by juxtaposition, soundalike phrases, and the whole bag of psyop tricks and ways to communicate (or in this case harass) between the lines.  [When you start to pick up the messages between the lines, be aware that there are often more lies between the lines than on them.]  Some of these smears are so stupid that you would laugh in the torturer’s face if the smear did not reveal human rights violations against the victim or you did not know the absolutely vicious intent the torturer had.

The press techniques used mirror some of those reported to have been used by the CIA in manipulating South and Central American populations via psychological operations carried out through the media.  It is no surprise at all that these techniques would have been brought back and diffused into the U.S. covert political reality.  Who is watching the spies and national security complex in the current political climate?  The American press consists of some of the most arrogant, manipulative, thin-skinned, and provincial people imaginable, always rationalizing away their own criminal complicity in crimes against humanity.  The few exceptions know who they are.

To discredit mind control victims, the media will play them up as schizophrenic kooks.  Acts of physical and psychological terror by the government are ignored, while those speaking out against such terror are ridiculed.  The United States is so transparent in its propaganda it is amazing anyone is gullible enough to believe it, except that it is so pervasive.  Many Americans fall for the lies and misinformation because they have been so inundated with propaganda and lies for all of their lives that they cling to their adult Santa Clauses and refuse to confront differing facts.

In a larger sense, the press engages in what Jeff Cohen has called propaganda from the center.  I would modify that by saying that the press and the government engage in both propaganda and terrorism from the phony center.  The phony center is the place where the system works.  It is the place where no human rights violations happen within the U.S.,  and where everything runs smoothly so businesses and corporations can go on making money.  It is not Republican or Democratic.  It is the status quo minus all the unfortunate and ugly realities and events that might cause ripples.  Crime and crime coverage fit right into the phony center, though, because this gives the system some bad guys to chase and catch, showing how the system works and even polices itself.  State crimes are almost never mentioned, and white-collar crimes are not mentioned often.  It is mostly crimes by people who are in what might be called the lower classes, except that in the phony center there is no such thing as class in America.  Crime coverage also serves very effectively to scare the public, so they will willingly accede to authority and, increasingly of late, surrender more of their liberties.  (There are also the high-profile “entertainment crimes” which can displace real news for months.)  Terrorism from the center is any act of terrorism that tends to reinforce the impression of the phony center.  It can serve to discredit “extremists” as well as to terrorize dissidents who might threaten the power of the elites.  This terrorism might include public acts to be misreported on the news or cointelpro actions secretly carried out against people and groups.

In the service of the phony center, the press also utilizes a “triangulation strategy” to soften and minimize the most egregious atrocities taking place in the country.  If there were a chance that people might learn of the secret government literally holding people as electronic slaves in distributed concentration camps created from the victim’s own homes and minds, the CIA would be portrayed as fighting the slave trade overseas.  See, I cannot argue with fighting slavery overseas.  It is a good thing, assuming it is real and not just more PR propaganda.  But now it has purposely distracted from the domestic abuses.  The general rule is to triangulate by emphasizing something similar to the domestic problem except that it is not quite so bad or is committed by bad criminals the government is chasing or by foreign groups or governments.  It masks the most serious abuses (people can only concentrate on so many things).  Someone not familiar with the idea of masking by triangulation might even think someone in the press was trying to help but, gosh, here at least is a watered-down something.

Triangulation here is similar to the “limited hang-out” strategy so often used by intelligence agencies when they fear worse exposures of their crimes.  That is, they admit a few abuses that are bad but hardly the worst abuses or the bulk of the abuses, play up those admissions for a time, and then declare that “it’s time to move on.”  Amazingly enough, after a few years they often begin denying and hiding the few admissions they actually made and we have what Robert Parry has called lost history (though most of the actual history was never revealed anyway).

Finally, in denying and covering up mind control crimes there are witting “assets” and collaborators in all parts of society.  To say it is Stasi-like is not going too far.  Some are profiting directly from this exploitation and enslavement, while others profit indirectly or hope to not become another victim by collaborating.  Too many Americans are just plain cruel and barbaric.  There are “assets,” apologists, and collaborators in the advertising and entertainment businesses, in academia, in science and engineering, anywhere you might look.  Some are likely just following the cues of the unspoken dialogue and symbolism, while others are directly connected.  Some may be mind control victims themselves, aware of it or not.  This is a real, live conspiracy of the sort that Americans love to ridicule others for pointing out. I do not put anything past people who would participate in systematic torture, including manufacturing news “events” for distracting, discrediting, and as a launching point for their desired spin.

Consider that the Church report only scratched the surface of the abuses then, and that things got worse through the 80s and 90s, and you may get some inkling of the true situation.

Methods of Protest and Resistance

This is a listing of various possible methods to protest and resist the crime against humanity that mind control torture really is.  They are listed very roughly in order of increasing severity and confrontation.  They are not mutually exclusive, of course, and several or many could and should be employed at once.  I would urge people not to act in rage, especially on some of the more extreme actions.  Acting in rage may result in your being manipulated by others.  Any actions should be undertaken with premeditated thought and understanding of the implications.  On the more extreme actions there is no rush (unless you feel like it, with your true free mind).  Be prepared from the start for the long term, and keep your eyes on the prize, so to speak.

Contacting law enforcement, like the FBI. This is typically the first thing someone does when a violent crime has been committed.  (It may take a mind control victim some time to realize what is going on, and that such vicious mind manipulations are in fact being directed against him or her in a concerted manner.  That is, it may take some time to realize that it can and does “happen here” even though we do not see such crimes openly reported in the paper or on the evening news.)  In the case of mind control and electromagnetic harassment crimes this option has proved to be of no value whatsoever.  I do not know of one case where this resulted in any investigation or anything other than polite dismissal, at the very best.  Some mind control victims are afraid to contact the authorities.  This may be because they fear further abuse or fear that any investigation will turn against them when back channels are utilized by their torturers.  Psyops typically employ such threats, including blackmail threats based on anything observed over years of torture/surveillance, physical threats against loved ones, and purposely instilled distrust of anyone who might be able to help.

There is also good reason to believe that the FBI is in fact directly involved as the harasser in many cases.  Historically, the FBI has made both a study and a practice of targeting and harassing American citizens.  The FBI without a doubt knows about the sort of electronic weaponry that many victims say has been used to harass and torture them.  They have held classified conferences where they discuss such weapons and plan for sharing this technology with other law enforcement agencies — yet they still deny that the technology exists.  These would be called secret police tactics in most other nations, but the perception management of the American citizenry requires that such descriptions not become commonly used here.

Legal actions. When the authorities are no help, many people turn to the judicial system for relief.  First, one has to find a lawyer willing to take the case.  This can be difficult in itself, as many lawyers either refuse to believe the victims or else want nothing to do with challenging the secret government.  Even lawyers willing to take the cases may lack the specific expertise needed in national security law.  Assuming a lawyer has been found, there remains the problem of gathering evidence for use in court — evidence of a crime that has been tailored over the years precisely not to leave such evidence.  Surveillance and harassment will be used to attempt to thwart any effective actions of the victim, he or she will not be able to act in private, and certainly will not be allowed private counsel with lawyer-client privilege. Finally, assuming a lawyer has been found and a case put together there remains the problem that the courts are heavily stacked in favor of secret government agencies.

At some point, if any progress is being made at all, there will be a claim of national security and the government will move for dismissal.  If the victim is lucky enough to get to this stage the trial will be dragged out for years and cost hundreds of thousands of dollars — all while the torture goes on and the victim’s whole life is derailed and devoted to regaining his or her fundamental human rights.  (This process in practice reveals what a farce the American participation in international treaties like those against torture and slavery is, since the U.S. claims that its current laws, Constitution, and courts provide implementation of these protections for its citizens.)

A common misconception is that there is no law against what the mind control torturers are doing, that it is somehow “legal.”  While it would be helpful and useful to have new laws on the books to more specifically protect the mind control victims and make people aware of such crimes, there are plenty of laws currently on the books that could be used to stop the torture and punish the torturers.  In American law it a matter of if there is a will there is a way.  (This is illustrated in the selective prosecutions and in the ignoring of the clear crimes of the powerful that happens all the time in American “justice.”)  While this trend that mocks the rule of law usually works against justice, if we can generate the political will we may be able to get some justice.

Letter writing, direct contact with legislators. In a functioning representative government, citizens should be able to contact their representatives when the usual system has failed them.  Mind control victims can indeed contact their representatives, but to little effect.  Some representatives simply ignore or throw away letters from mind control victims.  Others may make a few inquiries that get nowhere and then give up.  The political facts are that most representatives have almost no power when it comes to investigating abuses of the intelligence apparatus (though they do not want to let on that they are powerless in that regard).  Some representatives have been co-opted into the intelligence community and actually run interference for the agencies rather than representing their constituents who are undergoing torture.  This is terribly expedient for them, since they know they cannot be held accountable for actions they take in secret.  (Some representatives may just be naive and fall for the slide shows of lies that spies like to give to representatives in secret sessions, knowing that no one has the chance to counter their misinformation.)  Nonetheless, one can hope that there are some decent people left in government who recognize what is happening.  Phone calls and paper letters to legislators tend to be more effective than email.

Our nation is wealthy and we are continually assured that the economy is good.  The cold war supposedly ended.  If the American political system cannot deal with the nation’s continuing atrocities under these conditions, when can it?

Direct political activity. Voting is only a part of the direct political activities that can be undertaken.  The problem is the lack of candidates and politicians willing to deal with these issues.  Even a few politicians with real spines, not worried about their own reelection but about doing what is right, could start to make a difference.  For now, working at the primary and grass-roots level may be more effective than waiting until the standard Democrat and Republican are selected and presented as a choice.  Third parties can bring new issues to the table.  If we can figure out who in the government is secretly anti-human rights we can work to ensure that those people are not reelected, since they have no place in public government — and if they are themselves responsible for torture they belong in prison.  The barrier here is the abuse of secrecy in government to keep the public from knowing.  If we could get a few roll-call votes on important human rights issues those could be used as a voting guide — but always watch out for phony legislation designed only to give the illusion of human rights support.  The important part of the voting is not just your single vote but to campaign tirelessly yourself and with others against modern-day Nazis hiding anywhere in government.

Appeals to human rights organizations. Mind control victims have appealed to human rights organizations for years, trying to get them to focus their attention on domestic, covert human rights abuses.  For years they have been rebuffed or ignored.  Human rights organizations, many based in the U.S., freely point their fingers at human rights abuses overseas while ignoring domestic human rights abuses and victims.  Recently, though, there has been some progress made in getting a few organizations to begin to address these abuses.  It is only a small step so far, but at least it is something.  As far as I know no organizations have dealt directly with the issues of mind control victims (even those acknowledged by the government).  The World Organization Against Torture, USA, did recently discuss human experimentation without consent in its report on American compliance with the Convention Against Torture.  Continued appeals to other groups to follow this lead and to deal directly with mind control issues may be productive.  Remember, though, that the setting up of phony front organizations, groups, and “charities” is a long practiced way to co-opt, control, and neutralize opposition.

Appeals to the press. The American press has already been discussed at length in this essay.  Nonetheless, there are still a few decent people in the press acting as real journalists who may have the ability to get the truth out.  People should also support those decent journalists if the propagandist media turns on them, and remember who the propagandists are.  Support press organizations who tell the hard but important truths.

Appeals to churches, religious organizations and other groups who might be sympathetic. You can appeal to your minister, priest, rabbi, roshi, etc., and the congregation, sangha, or whatever the congregants are called, in the name of whatever God or spirit or force or practice the religion worships or advocates.  Most religions at least give lip service to human rights.  It might help.  You cannot have freedom of religion without the freedom of thought, and some religious people have the sense to understand this.

Some victims can also be helped, at least helped to cope with the torture, by practicing whatever faith they still follow or believe.  It is important to always know that this has nothing to do with the Nazi pigs playing at God and trying to steal away human dignity and free will.

I have thought for some time that mind control survivors might benefit from contact with Holocaust survivors, if only to hear how they have coped for so many years with the knowledge that their fellow human beings and countrymen tried to exterminate them. How this lasting scar affected their families and views (after their torture ordeal was actually over).  I would hope they at least see that these are Auschwitz-level atrocities, being committed for decade after decade here in the U.S.  But not everyone you think ought to understand something will, and we are all embedded in a lying propaganda society.

Teaching and educating the public. One thing mind control victims can do is to try to teach and educate the public about the sorts of abuses that have taken place in the past, as well as those which are ongoing.  The media and standard educational systems barely touch on these abuses.  Much of the technology involved in some of the abuse is actively denied, even that which is definitely known to exist.  There is no corresponding lack of education regarding mental illnesses, which tend to be used to dismiss and ridicule claims of mind control abuse.  Possible methods are leaflets and flyers, web sites, mailing lists, bumper stickers (“Visualize Domestic State-Sponsored Terrorists in Prison”), and so forth, as well as just broaching this forbidden topic in polite company.  Trying to inform and work with scientists, engineers, psychiatrists, historians, decent military people, real journalists, etc., could be helpful.

Teach the young, if no one else, that their elders and societal leaders — and in some cases their own parents — are stinking hypocrite liars who are in league with Nazi-style criminals and torturers.  Teach them what “adulthood” really means in a sick society based on lies.  This is the case just from known and acknowledged facts, though one has to dig a bit to find them out in our information-controlled society.  Think about when and how, in the process of growing up, some people “put on the swastika armband” — and how it can be prevented.

Do not back away from mental illness just because it has been used as a cover lie for experimentation and abuse.  This Soviet-style repression is a reflection on American society and not on the unfortunate people repressed in that manner.  The truly mentally ill have it bad enough without their government and society using their illnesses as a cover for torture and repression.  Not to mention the psychological scars inflicted by torture on its victims.

If nothing else, record what has happened and what is happening for the sake of history.  Ethical standards were not “different back then,” when back then is now (a favorite excuse of apologists).  Make it so that years from now any historian looking back will have to evaluate the lies and speeches of the current politicians taking into account the vicious atrocities they are complicit in.  People so small as to support slavery and exploitation, implicitly or explicitly, in the twenty-first century — not the 1850s.  “Never again” as an empty slogan (or referring to historical Nazi conditions that are never likely to happen again exactly) is worse than nothing, especially if it helps in dismissing current atrocities that can “never again happen” but really are happening.  Or if it gives a misleading and false sense that someone might care and take some action when new atrocities arise.

Researching mind control technologies and techniques.  Gathering any and all evidence and information on mind control harassment and technology is a very positive thing, and I encourage it wholeheartedly.  One should not, though, mistake this for some preliminary step that must be “completed” before any other action can be taken.  The main problem now is a political one, not a technical one to show that the covert harassment and devices exist.  That it exists is clear to anyone who has really looked into the situation.  Those with a vested interest in denial will deny forever if they have the chance.

Art. Various artistic media can be used to help people understand, feel, and act.  It can also help victims heal somewhat from the ongoing abuse.  But government propagandists can form rock bands, paint paintings, etc., too.  Perhaps more importantly, the propagandists can help market any artists who are willing to sell their souls to torturers for some fame and money — or whose messages unwittingly happen to fit in with the propagandists’ current campaign.

Formal lobbying. These days in Washington it takes money and connected lobbyists to get anything done.  If the money became available to a person or group involved in resisting mind control abuses it might be worth hiring a professional lobbying firm.  That firm would have the connections to at least get the message heard in the corridors of power that American citizens are being tortured and perhaps we should stop it.  I do not see such large sums of money materializing anytime soon, and mainly this is a cynical and true comment on the U.S. government up for sale.  (Slaves forced to buy their own freedom?)

Publicity stunts. Sometimes it can take outrageous stunts to get media attention.  News is entertainment, after all, and sometimes entertainment and ratings can be productively leveraged against the prerogative of protecting the national security establishment.  (Perhaps I should say phony national security establishment, since “national security” is only a buzzword that has long been rendered meaningless and divorced from anything of the sort.  Like “sources and methods” it is a magical incantation that means “I am not telling you anything, and watch out if you push it.”)

Greenpeace used to use publicity stunts to excellent effect.  One can hang huge signs, for example.  Vietnam war protesters used to claim that squirt guns full of water actually had LSD in them, or they would “levitate” the Pentagon.  How about spamming millions of people to alert them to human rights abuses, rather than try to sell them the usual ripoff?  A problem with this approach in resisting mind control fascism is that it might play into claims that it was just some nutty schizophrenic acting up:  “We can laugh at it and get some ratings points, but we all know that it is just some poor deluded mentally ill person.”

Something like a hunger strike is hardly a “stunt,” but it can bring attention to the matter and make clear what a life or death situation it is.  In the callous culture of the U.S. today a hunger strike tends not to have much effect on the public at large, and will even bring on ridicule.  It does inform the hunger striker’s family, friends, and acquaintances, in a very painful way (that sometimes is necessary).  Unfortunately, a mind control victim has to consider that he or she might not even be allowed the freedom to starve to death: claims of mental illness might be used to forcibly stop the hunger striker at some point as well as to discredit the powerful protest.  (This might even be done by a “well-meaning,” ill-informed, or complicitous family member, supposedly for the victim’s “own good.”)

Appealing to world opinion and international organizations. Organizations like the World Court can be petitioned for redress against the United States.  The U.S. ignores international law, of course, unless it suits American interests, so any progress here would be strong but largely symbolic.  The U.S. also manipulates international organizations in myriad ways and with lots of money.  One can also appeal to foreign governments, but they are not likely to respond openly for fear of the U.S. or because they have an interest in the continuation of the mind control abuses and secrecy.  Appealing directly to citizens of other countries may be helpful, because their media may be freer to report on American abuses and they may be freer to speak out and take actions to help the mind control victims.

Calls for boycotts. Boycotts could be called against any companies known to be involved in producing mind control equipment or in covering up the ongoing atrocities.  This might include weapons producers, newspapers, psychological organizations, etc.  Beyond this, there could be a general call for people around the world to avoid buying American products and traveling to the United States.  Tourists could be asked not to indirectly support the current repressive regime in the U.S., and warned that they might take home more than just memories in their heads.  As with all boycotts, if they are successful some innocent people will be penalized.  Some economic hardship hardly compares to the suffering of the victims of the criminal American government, and segments of American society that profit directly or indirectly from this ongoing crime and repression that they ignore.  (Perhaps I should not say that, since in the United States profits trump all suffering, torture, and exploitation.)  To be successful, of course, a boycott needs to be well-advertised and have a number of people willing to keep promoting it.

Street protests. Taking to the streets with signs and chants is a classic means of protest.  Citizens who pass by wonder what is going on, and can be given literature.  A large demonstration may get some notice in the local press.  This could be an effective method for drawing more attention to the problem.  It does take some organization to put together a demonstration, and investigation of local laws for conducting demonstrations.  A fair number of people need to be in the same geographic area or willing to travel there.  The government has also in the past few decades studied and refined techniques  to disrupt and discredit street protests, and developed a whole new generation of crowd-control weapons.

Building demonstration weapons. One technique to get beyond the denials that mind control technology exists is to build demonstration weapons.  If someone were to build a microwave voice projection weapon and publicly demonstrate it, it might get some publicity and might make people aware of the very real threat that such weapons pose.  This still might not get through to hard-headed types with no imagination or empathy who cannot understand — or pretend not to understand — the extreme violation of having one’s mind tampered with even when inside one’s home, potentially at any time of the day or night.  That is, the horror of not being able to trust your own thoughts, of being aversively conditioned by nonconsensual behavior modification inside your home, and of knowing that your tormentors are purposely inflicting psychological damage on you.  All this taking place in a society that pretends it is not happening, where the economy is good so everything must be all right, and where the rhetoric all drips with mention of freedom, liberty, and human rights.

On the positive side, it would not take especially advanced technology to demonstrate to people the basic capacity to turn someone’s home into a personal concentration camp.  Basic electronic surveillance coupled with an aversive stimulus generator like a targetable microwave beam able to interfere with heart rhythms would suffice.  One could throw in devices based on the microwave hearing principle for good measure.

On the negative side is the money and expertise required.  Most victims, like most citizens, are not technically trained and even those who are may lack the specific training to design and construct such specialized devices.  Testing would also be necessary, and unlike the government’s methods I do not think randomly selected people should be used as guinea pigs.  As a matter of safety I might suggest testing a microwave voice projection device on dogs who were trained to obey spoken commands.  If they would perform their tricks with no other cues than the microwave induced commands played from an audio tape it could reasonably be assumed that they heard the command (or at least perceived the microwave stimulation if correct responses to the microwave signals are reinforced).

An added benefit of this animal testing, or of stating an intention to do such testing, is that it would generate outrage.  Americans can be totally indifferent when human beings are being systematically tortured for years on end, but let them hear that you might fry a dog’s brain and they would suddenly be outraged and appalled.  [We are human beings interacting in a human society; that is why human rights are so important.  For example, if animal rights activists were to begin to make serious progress in their cause, and were then seen as a threat rather than as a useful but harmless distraction for people who might otherwise seriously challenge the state, they would soon find their human rights to speak, associate, and organize to be in grave peril.]  Practically speaking the frequencies for dog skulls may differ from those of humans.  And of course these weapons have already been tested for years both on animals and humans by their developers.

Another negative to demonstration weapons is that even after all the demonstrations the public may still be indifferent.  The usual naysayers would say that now you have demonstrated this one method, but that it still does not explain effect X or Y that a given victim has experienced.  Or else they would say that now all you have to do is shield against microwaves or measure them to get tangible proof.  But microwaves used in this fashion are only one small (and perhaps long obsolete) part of the arsenal of electromagnetic and acoustic weapons that can be used in mind control operations.  It is a losing proposition for a few poorly funded citizens to attempt to re-engineer all the results of literally decades of research on which billions of dollars have been directly or indirectly spent.  Building demonstration weapons might further the proliferation of these denied weapons, but they are out there already.

As far as getting attention, imagine the following scenario.  Suppose someone built, or simply claimed to have built, a subliminal influencing device capable of subtly influencing a whole town full of people — perhaps by generating some form of modulated ELF radiation.  Suppose they then claimed that they were going to turn it on full blast on the day before a general election.  That might at least get people thinking about the fragility of democracy (and with truly advanced technology the farce of democracy) when such weapons are shrouded in secrecy and used on the general population.

Leaving the country. I am sure that most people who have been victimized by state-sanctioned terror here in the United States have thought at some point about leaving the country.  Others who know what really goes on here have probably thought about it too.  There is some resistance to being driven out of one’s homeland, especially when you only want your fundamental human rights.  This is especially true in the United States where we enshrine the Bill of Rights while at the same time having secret torture squads to covertly trample it.  Most people have family and friends in their country and region, if the torturers do not succeed in isolating the victim like they try to do.

One problem with leaving the country is where to go.  Where does the long arm of U.S. covert action not reach?  Where do satellites not pass overhead regularly?  What country would the U.S. not carry out covert actions in, even if the local government were opposed to it?  Going overseas might even make the harassment and surveillance legal under U.S. law (for what that is worth since those laws are either ignored or have been rendered impotent anyway).  On the other hand, some places might provide more freedom to live, work, and think, and to continue working against the U.S. mind control tyranny from exile.

Currently, most countries would probably not grant official political asylum since it would be a slap in the face of a powerful and vengeful United States government.  While other governments surely know of the technological advancements in mind control technology, they also participate in the denials of its existence.  In some sense, there is a conspiracy of governments and intelligence agencies around the world against the ordinary citizens around the world.  Some countries are as repressive in other ways as the United States is to its mind control victims, and so one would hesitate to leave one form of fascism for another — depending on the level of torture being imposed.  [Morons like to use this as some sort of excuse for American atrocities:  ``See, we are not the absolute worst country in the world.''  Worst or not, Americans are the biggest hypocrites and rank right up there with the worst torturers.]

There is uncertainty about whether there is any place one can go to escape the torture and surveillance.  There may be psyops aimed at keeping some victims from leaving the country, especially if they might obtain something like MRI evidence of what was done to them here or if their exploitation is considered especially valuable.  There may also be psyops aimed at getting other people to leave the country if they are making too many waves here.  In the ways of American society, one might be subjected to playground taunts for leaving, like you are “running away from a fight,” and so forth.  Playground taunts mean nothing compared to having ones mind, life, and family constantly violated and I would not hold it against anyone if they took the next plane out.  I may yet do the same.

Civil disobedience. Historically, civil disobedience has included actions like people chaining themselves to doorways, blocking traffic, and trespassing on government property to protest its policies.  Other possible actions might include painting anti-mind control graffiti on walls, buildings and monuments.  Civil disobedience might also include using the judicial system in ways to purposely slow it down and interfere with its normal operation, as a protest against its unwillingness to deal with government atrocities.  I have wondered at times about the engineering feasibility of putting a cable around the neck of the Lincoln monument and pulling its head off with a pickup truck.  (Not as a protest against Lincoln or emancipation but to tear down a symbol of stinking American hypocrisy.)  You know how Goebbels will portray this.

Tax revolt.  This is essentially a form of civil disobedience, to refuse to pay taxes to the illegitimate government that tortures and holds its own citizens as slaves.  Having to pay the torturers’ salaries is like adding insult to injury.  Morally there is nothing wrong with a truly conscientious decision not to pay taxes to an illegitimate occupation government, but practically speaking this may not be the best way to resist.  Setting people up for politically motivated audits is an old American trick, and if there is something there for auditors to catch it is that much more effective.

If the IRS agents cart you off to jail for tax evasion you will likely not get out the message you would have wanted to.  Tax collectors, like law enforcement officers, would also still be necessary under a legitimate government.  In a sense they are the pawns of the people really calling the shots (which is not to excuse knowing abuses by such officials).  The people calling the shots would love to incite a proxy war between, say, police officers and demonstrators because they then have discredited the demonstrators, hardened the police citizens and other citizens against the cause of the demonstrators, and gained a platform for more militarization of law enforcement.

Economic sabotage. The ancient Egyptians would not free Moses’ people until a host of plagues was called down on their kingdom. Human nature has not changed since then, and Americans have a long and sad history of clinging to blatantly exploitative practices at all costs — while always pontificating about freedom.  Some people might decide that if they are not allowed to receive equal benefits in a society then those who implicitly or explicitly benefit from their exploitation should not have the fruits of that exploitation.  The idea of economic sabotage is to disrupt the economy and cost it money. Americans, at least those in charge, simply do not care about the cries of domestic torture victims.  What they do care about is money.  The idea then is to make their repression and torture cost them money.  In some sense this is the same philosophy as in calling for boycotts, but more direct.  This is the first of the ideas on the list that the American state-sponsored terrorists and propagandists would likely shout “terrorist” about.

To conduct such economic sabotage it first has to be clear to those in charge (and preferably to the public at large) what was done and why it was done.  Let me describe an example where one or a few people can incur huge costs.  It is only an example, of course.  Suppose someone were able to obtain a quantity of toxic waste, for example several drums of PCBs.  Suppose they then drove around a major city at night spreading those chemicals and then announced to a newspaper, to authorities, and on the internet what they had done it and why.  Publicity is important here because otherwise the government could ignore it like it does so many other things.  It could then take literally tens or hundreds of millions of dollars to clean up that toxic waste.  The idea is to cost money, and not to harm people, so this particular plan would have to be tailored for that.  As for environmentalists who might react with horror to this very suggestion, I feel about the same to them as I do toward animal rights activists who are horrified that a dog might be experimented on:  There are human beings being subjected to systematic, long term torture.  I’ll take their outrage too, as preferable to their indifference to vicious ongoing atrocities. Environmental activists have been the target of enough cointelpro actions that they should be in a better position than many others to understand something about the daily torture inflicted on mind control victims.

Various economic sabotage methods have been perfected and practiced by covert organizations like the CIA for years. If nothing else, this is telling about how segments of the U.S. government think.  One can obtain good insights into these methods by studying the methods the U.S. used to destroy the Cuban economy covertly (thus “proving” the Cuban government a failure). For example, introducing a crop pest into a major growing region can ultimately cost hundreds of millions of dollars.  Much of the American infrastructure is vulnerable, from power stations to gas lines to water supplies.

Even though these are tried and true CIA methods, used on peasants and ordinary men, women, and children around the world to incite unrest against their governments, a drawback is that the American propaganda machine will portray these as terrorist acts rather than as acts of freedom fighters.  If these acts so much as cause the hair on someone’s head to get ruffled, the film crews will roll and the same media that would not touch years of systematic domestic torture will have a field day empathizing with and pointing out the ruffled hair inflicted by those horrible terrorists.

One predictable consequence would be for those feeding at the trough of government to write neat little proposals to obtain money to strengthen and defend the infrastructure — with the implicit but always unspoken purpose of “defending” from possible attack by other Americans fighting against domestic U.S. state-sponsored torture.

Direct violent action. This option is often considered taboo to even mention, but years of American principles actually support the right of the people to resist tyrants who would enslave them.  These principles mean something to me, if not to lying hypocrites who think the Constitution is just a big poster to put up behind themselves at a photo op.  Sometimes it is a time for war, especially in self-defense against those who would enslave you and violate your home and family.  People like to cite Martin Luther King, Jr. as an example of non-violence in practice.  First of all, as much as I respect King, I suspect he might not have been nearly as successful as he was if there were not more extreme elements that the elites could consider him as a moderating influence to.  Even so, the power elites attempted to replace him with their own puppets, they harassed him, they placed him under surveillance, they spread around embarrassing tapes of him to the press and to their friends attempting to discredit him, and then he was shot dead.  The elites finally decided that the day of overt repression and exploitation had passed.  So, rather than ending, such exploitation “went black” behind a wall of lies, secrecy, and propaganda.

As an example of direct violent action, suppose someone developed a demonstration weapon like a portable microwave beam weapon, and set out to use it against legislators, government officials, and journalists who were deemed to be collaborators or apologists for the torture of innocent American citizens.  If nothing else these people would get a good idea of the sort of fascist torture they directly or indirectly support against other Americans.

Thinking along these lines you realize that the secret government already poses such a threat to these people, and that the secret government’s weapons are more advanced and can be employed more subtly.  This very threat, with or without the blackmail that spies are known for, may be enough to keep these collaborators in the fascist camp.  A critical mass of cowards and expedient, greedy, amoral fascists.  An aversive directed energy experience in the middle of the night might serve as a “wake-up call.”

One problem with direct violent action is where and against whom to direct that action.  A fortified base or command and control center involved in coordinating or conducting mind control operations, even if its location were known, is not likely to be very vulnerable to anything a regular citizen could muster against it.  Any attack would be symbolic at best and quite likely result in the death of the attacker.  (Then again, someone driven to suicide anyway by being harassed and tortured might reason that it is better to take one or two of the torturing Nazis with him or her rather than to die alone in misery.)  Of course someone under constant surveillance anyway is not going to have the element of surprise.

Beyond these problems, though, there are active efforts by the torturers to conceal the guilty parties and to confuse and misdirect the victims.  They would probably think it was really funny to goad someone into attacking a completely innocent person — or better, a person who for some reason they wanted to see hurt.  Suppose a mind control victim took a gun to a government building and shot some people he had determined were complicitous in some way with his torture.  First, we all know how the press would play it: a lone nut schizophrenic went crazy and shot someone.  His claims of being mind controlled would be held up as supporting that.

Now, the targeted people or organization might be the actual mind controllers, or the person might have been tricked by what is called a deception operation.  Suppose the victims were not directly involved, but that they had plenty of collaborator, profiteer, apologist blood on their hands and were easier to get to than cowardly torturers hiding in a fortified bunker.  Suppose the mind control victim were crying out from torture to send a message.  Would the targeted organization or society at large get the actual message?  They might, or they might get another message entirely.  They might consider that the person was goaded and directed by the mind controllers into attacking them, and take this as an implicit threat by the mind controllers that they had better not cause any trouble because there are more Manchurians out there.

Besides the direct propaganda use, there would be a greater tendency for members of society to develop a fortress mentality and barricade themselves against the “ordinary people.”  For example, after targeting a known pseudo-journalist propagandist and torturer, the resulting propaganda storm might be used to drive even the few decent journalists into high-security enclaves and further accelerate their separation from ordinary people that has been going on for some time.

Even assuming that the targeting of directly complicitous torturers could be done correctly, the use of direct violence might be counterproductive.  A standard propaganda technique to distract from protest and resistance is to highlight (or create) instances of unpopular groups like racists engaging in similar resistance tactics.  The usual propaganda war…

For all these reasons and more, violence is a last resort.  When it is realistically the only way to possibly secure fundamental human rights within a tangible time period, though, it is a way that must be taken.

Summary and Conclusions

First, I will re-list all of the possible methods for protest and resistance given above.  After having read the descriptions above it may be helpful to now see just the paragraph headers all together.

  • Contacting law enforcement, like the FBI.
  • Legal actions.
  • Letter writing, direct contact with legislators.
  • Direct political activity.
  • Appeals to human rights organizations.
  • Appeals to the press.
  • Appeals to churches, religious organizations and other groups who might be sympathetic.
  • Teaching and educating the public.
  • Researching mind control technologies and techniques.
  • Art.
  • Formal lobbying.
  • Publicity stunts.
  • Appealing to world opinion and international organizations.
  • Calls for boycotts.
  • Street protests.
  • Building demonstration weapons.
  • Leaving the country.
  • Civil disobedience.
  • Tax revolt.
  • Economic sabotage.
  • Direct violent action.

Believe me, I know the sorts of reactions that this essay may cause, both from people who know it is true and from the sorts of people who just cannot believe that their TV would actually deceive them and lie to them.  Nonetheless, it must be said and actions must be taken.  A current euphemism is that the government is developing non-lethal “weapons of mass protection,” but the reality is that these are weapons of mass enslavement.  We either arbeit for our freedom or we arbeit for our slavemasters.  This is not a short term thing, and all citizens need to be made aware that their remaining freedoms are at risk.  No one is going to “do it for us,” but if we all do what we can and get others to join in we can change things together.  A million small actions can bring about a large positive change; a million wrenches in the works can shut down a corrupt machine.

Everyone has their own special talents, opportunities, and situation, and can focus on what he or she can best do to start setting things right.  It can help to form alliances, but beware of alliances that are meant to tear down or discredit real human rights movements such as those against mind control abuses.  We cannot afford to tie our demands for basic human rights to anything trivial, though of course I would not put down people for working on other causes too.  This is a long term problem which will require a commitment to keep pushing for freedom and justice, so people need to also live the their “regular” lives as best as they can at the same time.  But focusing only on the equivalent of a highway beautification project in Nazi Germany is not truly a “good cause.”

We need to try to form alliances with other groups working for fundamental human rights, or who recognize how such rights underlie our entire society.  You cannot build any sort of civil, legitimate society without the foundation of human rights.  Good people can disagree on many things, but fundamental human rights is not one of them.

It’s the torture, stupid.  The sorts of things that are being done to people in the U.S. cannot be tolerated in a civilized nation (or any nation).  Phony American “human rights,” which are only propaganda campaigns for the U.S. to wage against its enemies while ignoring its own abuses, and any others it finds expedient to ignore, are one of the biggest obstacles to actual human rights in the world.

Part I: Motives for Mind Control

Part I: Motives for Mind Control Allen Barker, June 13, 2001


This essay is the first in a series of three on mind control.  It discusses some of the motives for mind control and why it continues.  Part II of the series, “Resisting the Mind Control State,” describes some methods to protest and resist mind control abuses and atrocities.  Part III, “Mental Firewalls,” discusses some of the techniques victims have developed to survive the ongoing torture operations.

For the purposes of this essay, mind control refers to any method used nonconsensually on a victim to covertly and deniably attempt to control or modify that person’s behavior.  This occurs in settings where a person has a reasonable expectation not to be violated, such as in his or her home or in his or her private mentation.  It is this sort of violation that differentiates a mind control crime from an ordinary social interaction, just as the lack of consent turns sex into rape.

Consider “street theater” as an example.  Street theater refers to a form of harassment where a group of torturers act out little skits, either literally on the street or on the internet, in the media, etc., intended to harass and disturb an individual or to otherwise modify the victim’s behavior.  So if a group of people act out “street theater” to a random person to disturb him or her then, while this might be a crime, I would not necessarily call it mind control.  It is when surveillance is combined with the “skits” to both track a person over time for harassment and to obtain personal information about a person to be used in the harassment that I would say a mind control operation is being carried out.

Of course there are many sorts of mind control operations, but they all tend to have this sort of feedback setup: violate a person with extreme surveillance and use that surveillance information to target the influencing.  It is a classic sort of feedback setup that might be described in terms of the mathematical and engineering fields of control theory, at least in the abstract sense.  The surveillance devices can range from phone taps, audio and video bugs in a home or car, internet monitoring, and basic tracking devices, all the way up to advanced satellite surveillance methods, super-sensitive electromagnetic sensor systems with computer analysis, and devices implanted in people’s bodies without their consent.  The “effector” or the control variables can range from harassing phone calls, street theater, rumor spreading, power-line dimming, and internet messages all the way up to harassment with microwave devices, acoustic weapons, messages in the media such as TV and newspapers, projecting “voices” to a person that only he or she can hear, and direct brain stimulation and manipulation.

Other mind control methods use techniques such as hypnosis and drugs to influence people, but the methods all have the common thread of the denied and deniable attack against the mind of an individual.  The purpose of this essay is not to specifically describe the methods of mind control.  More specifics will be given in the later essays of this series, and one can consult books and articles by various authors for the documented history of mind control technology and operations in the U.S.  See, for example, the articles at the Mind Control: Technology, Techniques, and Politics web site at http://www.datafilter.com/mc.

Even if you do not believe that all of this is currently happening — though it is — you should still be concerned.  Based on public, open sources it is clear to almost anyone that the technology will be available in the near future.  But there are victims now.  You do not even have to think the U.S. government is doing this, but it is.  “Our boys” will be targeted with these sorts of weapons in future wars.

For the purposes of this essay, I assume that the reader has a general grasp of the type of mind control manipulations being discussed and I consider possible motivations a harasser, monitor, or controller (or group thereof) might have to commit such vicious crimes.  Because this essay is intended to get people thinking, the possible motives will not necessarily be linked to any particular technological method, but the reader with some common sense will see what methods might be used in each case and will no doubt be able to think of combinations and motivations not directly mentioned here.

To spoil the rest of the essay, the reasons boil down to money and power.

Technological Equivalent of the Atomic Bomb

Many items appear on the list of motivations for mind control abuses, but the one primary reason why the technology was developed is because it is a weapon.  This is the first motivation and why billions of dollars have been covertly spent on the technology.  Of course, once the technology and techniques are developed they tend to proliferate.  Other application tend to be found, depending on the level of corruption in a society, and organized crime groups other than the government tend to obtain such weapons and techniques.  But the primary reason such devices were first developed and tested is that governments were and are developing and testing weapons.

A recent Air Force Times article about a microwave crowd control weapon being prepared for deployment described such weapons as “perhaps the biggest breakthrough in weapons technology since the atomic bomb,” and the particular weapon they were describing is far, far from the covert cutting edge.  Indeed, a government would be negligent if it did not investigate such technology.  But using the technology on people without their consent, either in testing or in applications, is either an act of war if committed on foreign individuals or an act of treason if committed on domestic citizens.  It is almost always an act of torture.

It is important not to confuse the real motivation with the rationalizations or the cover reasons.  Terrorists, terrorists, terrorists, and pedophiles are the currently popular rationalizations for usurping citizens’ inalienable liberties now that the cold war is over.  A week of American TV would convince any unindoctrinated viewer of that.  There is also the phenomenon I call “spreading the blood around.”  This is the idea that the more people who can be made to take part in some way in a large-scale atrocity — to get some of the blood on their hands — the more political support that can be generated for continuing the atrocities.

Some differences between the atomic bomb and mind control technology need to be pointed out.  First, mind control technology is meant to be used covertly and deniably.  It is not meant necessarily to kill, though it can, but rather to ultimately control a human being like an automaton.  Secondly, mind control technology is designed for use against the domestic population, rather than just against foreign targets.

Who Would Want to Rule the World?

At some level it is stunning that an essay such as this is necessary at all.  People have always wanted to “control men’s minds” — not to mention women’s minds.  But people historically have also been manipulated again and again, by one group of people followed by another, by one big lie followed by another — often convinced that it cannot possibly be happening now.  There is also a “moral big lie” where decent people cannot imagine that anyone could have the capacity to carry out such heinous atrocities and conspiracies over long periods of time, because they could not imagine themselves doing it.  They have minor moral lapses like everyone (like ordinary people tell small lies) but they just cannot grasp the notion of the big moral atrocity because they would never consider such abominations.

There always have been and always will be people among us who yearn for nothing but to be tyrants over other people.  Let us be clear here on that point and never forget it.  There will always be someone who wants to be the next Stalin — to choose one historical example from countlessly many — and who will stop at absolutely nothing to achieve this.  This also means that there are Americans among us now who are just this sort of person — or a lackey for such a person — living among us in our society.  Do not let the big lie and ubiquitous American propaganda fuzzy your thinking.  The threat is more likely to come from within the government than from someone’s garage.  Eternal vigilance is indeed the price of liberty.

Motives for Mind Control

We finally come to the list of possible motivations for mind control.  It is important to remember, though, that it is not the responsibility of the torture victim to second-guess the reasons the torture was committed.  In this sense the “reason” for the torture is generally that the torturer had the opportunity to commit the torture and thought he or she could get away with it.  Nonetheless, it is useful to examine more mercenary or mercantile sorts of possible motivations to better see why mind control torture is happening, why it continues, and maybe gain some insight into how it can be abolished.

Remember that in any group of people there is politics.  This is also the case with the people involved in the conspiracy of mind controllers.  So when considering questions such as “why don’t they just kill everyone who speaks out at all” or other such questions — which can be useful to consider even if you cannot know the exact answer — it is important to keep this in mind.  Mind control conspirators tend to come from the same culture and live in the same society with the victims.  When they leave the underground bunker — literally or metaphorically — they go to live in homes and with families among us.  [The low-level mind controllers, like Auschwitz guards, probably do not know the whole mind control system either.  Also, with advanced electronic sorts of harassment the harasser could be half a world away with a good connection, but presumably still lives in a community among some decent people.]

Many interrelated motives are mentioned on the following list, but that does not imply that exactly one listed motive is the true motive in any case, or that the list is exhaustive.  A useful comparison for how a victim might be used is a comparison to a slaughterhouse, where an animal comes in and is cut up and almost every usable scrap that can be used for anything is used.  To use a slave auction analogy, if one slaver has a slave that is good for X but needs Y, and another slaver has a slave that is good for Y and wants X, then perhaps they can strike up a commercial transaction on their human chattel.

Some might object that publicizing this list will only give new ideas to harassers.  It might, but the only alternative is to keep the people uninformed and to allow the atrocities to continue.  I also suspect that the people with access to this technology for some years have already thought of (and applied) all of these reasons, even if they did not express them this way.

Here is the list of motives, in no particular order.

Low-intensity warfare against the domestic population. This has long been the policy of the U.S. government, though it typically is not so directly stated.  Cointelpro actions are covertly undertaken to harass and discredit people who, for whatever reason, are “in the way.”  Frank Donner, in his 1980 book Age of Surveillance, makes this point with example after example.  In his phrase, convert surveillance and harassment has become an unspoken “mode of governance” in the U.S.  So this newer technology simply fits right in as a more high-tech way to continue carrying out this “mode of governance.”  A key concept which Donner points out, and which many Americans cannot quite seem to grasp is that the government does not need to accuse you of a crime or charge you or try you if they can just punish you.  A paranoid government does not even need to suspect that you are committing any crime, wrongdoing, or organizing at all: only that you might do so.  These sorts of programs usually tend to target potential leaders and whistleblowers, though anyone can be cointelproed.

Ideas to mine/steal.  In some sense this is just a form of old-fashioned spying updated with new technology that obliterates the notion of human rights.  Consider what might be the first step on a slippery slope of rationalizations.  Suppose an Iraqi nuclear scientist, or any brilliant “foreign” scientist or engineer, was of concern to the U.S.  Suppose there is now this new technology, that can literally “get inside the head” of such a scientist and watch him or her as he or she thinks and works.  Not only that, it can be used to influence that scientist.  Armed with such a rationalization, the covert action crew goes to work and sets up the massively invasive surveillance.  Then, for years afterward, analysts can study the subject and extract any “intelligence” they can from him or her.

Would such a program, if “successful,” be contained and only be used on foreign scientists?  I do not think so.  It would be used on any people at all, only limited by the cost and the perceived risk of being caught.  Domestic targets might even be more tempting because the risk of discovery could be better “managed.”  You would not even have to be a brilliant scientist, some bureaucrat only needs to think you are, or that you are somehow “of interest.”  If enough people are targeted then almost all levels of scientists and engineers could be targeted.  (If they had a golden goose they’d dissect it.)

Intellectual property theft from scientists and engineers is only listed first because of the slippery slope example above; there are many classes of people who might be targeted for similar reasons.  Einstein is quoted as having said that imagination is more important than intelligence, and imagination is even more important to covert organizations who effectively select against employees with real imagination.

Other sorts of creative people who might be vulnerable are writers (plagiarism), other types of artists or craftspeople, inventors, programmers, etc.  In an economic espionage sense, any sort of innovative or high-volume stock trader or business leader might be a tempting and very lucrative target.  Dialogue and situations stolen from people’s real lives can become tomorrow’s “drama.”  Patents, copyrights, trademarks, and any sort of intellectual property can be deniably stolen from these victims.  This can deny them their livelihoods and makes them literal slaves.

Statistical profiling of a population. This is like using nonconsensual subjects in a focus group, to understand what their likes, dislikes, needs, and trends are.  It might be most effective with unwitting subjects (who have not realized they are under monitoring), but can still be used on subjects who know they are being monitored.  It is like having the ability to take an instant poll of a captive population, who may not even be able to hide what their innermost secrets are.  Anyone who knows anything about modern U.S. elections knows how influential and widely used polls are.  This is just one aspect of the power of being able to statistically profile a large population.  It is the statistics of population control, where some sample of people — which does not even need to be especially large relative to the hundreds of millions in the population — can be used to predict trends in the larger population.

Suppose, for example, that an individual were put under surveillance and found useful to serve as an exemplar of a statistical demographic group, say of 100,000 people.  That is, that person’s perspective, ideas, and reactions could be used to both predict and manipulate the entire social group on a large scale.  This sort of analysis is already known to take place; it becomes that much more effective with a focus group under even more invasive monitoring.  In a commercial sense, the power to manipulate a demographic group is the power to get them to purchase goods and provide a profit.  Every sort of thing is marketed these days.  Advertising campaigns are created to sell politicians, soap, ideas, slurs, and anything else.

Interrogation for secrets. This is another advanced technology application to old-fashioned spying.  People can be “brain interrogated” for secrets they know.  This may be used to reveal critical passwords, uncover blackmailable incidents, and obtain national and commercial secrets.

Psyop BDA.  BDA is the military abbreviation for bomb damage assessment.  In order to most effectively bomb a target you need to know which bombs hit their target and how much damage was inflicted by the bombing.  This feedback is then used to both improve the subsequent bombings and to revisit targets that were missed.  One of Noam Chomsky’s main theses has for years been that “democratic” governments use propaganda similarly to the way direct totalitarian governments use violence.  Therefore, it is important for the cloistered elites to know how well their propaganda “bombs” are playing with the masses.  Like with the statistical profiling use of “maximally invasive surveillance,” nonconsensual monitoring can provide this sort of political control feedback data.

Entertainment freak show. Sadism and voyeurism are powerful motivations for some people.  Mind control victims can provide a live torture-cam of an individual 24 hours a day, and may even allow the sadist to play at the controls and inflict damage or influence the “show.”  It would be like an ongoing snuff film you could participate in.  This may also be a part of “spreading the blood around” by appealing to some of the baser human instincts and then having a person on the hook for having participated (like has been alleged for some “satanic” rituals where people take a small part in a ritual crime so they are inextricably linked to the conspiracy).

To suppress technology they cannot control. Many people believe that you can always be the best if you can harass and put down anyone better.  This seems to be the modus operandi of the U.S. secret sector, where if they do not control the technology then it is stolen, the original inventor or developer (or just student) is harassed, and it can then be developed in secret.  Even if they are not themselves interested in the new technology, the temptation to suppress any possible disruption to the status quo is always there.  There is a law in Washington that there can be no building taller than the Capitol.  When secrecy-bred mediocrity and lack of accountability are taken into account the Capitol becomes a very low building.

Hired harassment squad for billionaires.  It does not take long for some personnel involved in this technology and experienced with these techniques to leave for the private sector.  This opens the possibility for deniable mercenary harassment squads.

Distributed concentration camps. The federal government has historically made plans for “emergencies” which have included lists of people to lock up in internment camps.  With this new technology perfected, the concentration camps can be “distributed,” by turning each listed person’s home and mind into an electronic prison.

Vigilante groups. To control “crime,” or whatever they choose to claim they are targeting people for, a vigilante group can select people they do not like for extrajudicial punishment.  Like most such groups, actually “controlling crime” is just an excuse to pick people for victimization and to rationalize it to the members of the group.

To control a person, like a world leader or assassin (or any sort of leader).  This is probably the ultimate dream of a mind controller (or their own controllers): to take control of a world leader or other important person.  This could even start from a young age, with the person groomed for the position of power and with members of the secret team influencing and increasing the opportunities for the chosen “asset” to reach a position of power.  When trained from a young age an unfortunate child might not even realize that the influencing was not normal (the “secret friend” that is not imaginary).  Subtle advanced techniques could influence an adult without his or her knowledge.  Even if he or she suspected, there would likely already be a pool of blackmail information and powerful psychological levers to employ against the person.

The quest for controlled assassins, or Manchurian candidates, is well-known.  The search for such techniques never stopped and is still ongoing.  Similarly, sexual blackmail operations are an ongoing reality and mind control victims may be utilized in setting up such traps.

If the technology is cheap enough or if you have a wide-field multi-target device you do not even need to target the leaders.  Your army can covertly “capture” more and more of the inhabitants (or flick a switch on a wide-field device) until it can march into town down main street to a hero’s welcome.  Then again, once this is accomplished there is no need to march in at all, just keep milking out “tribute” from the conquered people — who never even knew there was a war against them.  It is easy to parody this as just some sort of “body snatchers” scenario, but to military planners it is a very real thing.

To infiltrate a group. In order to control, influence, or install a puppet leader in a group the controllers do not know much about and really do not understand, it could be useful to monitor a member or leader in order to learn what might be effective responses, ideas, or actions.  For example, a religious sect they wanted to control.  Another example would be for a mind controller to use information gained from the monitoring of a victim in order to better pose as a victim, say on the internet.

Genocide. This could be the implicit or explicit result of a mind control operation.  The group here is whatever group is selected for torture, which may be racial, religious, socioeconomic, or related to whatever other selection criteria is used.  People under long-running extrajudicial torture are not free to just “choose life” even if they wanted to.  People are forced to decide whether they should bring a child into the world to also be monitored and violated every day, without the child’s or the parent’s consent.  They have to wonder about supporting a child when they are under ongoing torture which may intensify at any moment.  They know that, at the least, the life of any child will be threatened in order to further torture them and harass them, and they know that the threat is credible.

As a medical scam for money. These days medicine and pharmaceuticals represent big money.  If the cover lie for mind control abuses is mental illness them some mind control victims will be misdiagnosed as mentally ill (rather than as torture victims) and given (or even forced) treatment and medication.  An unscrupulous company or group of individuals could exploit this fact to make money off the suffering of the mind control victims.

To predict and preempt actions. Besides wanting to just control behavior, a running trend is to want to predict behavior, obviously before it happens.  But the sort of data that is needed to predict behavior in detail is exactly the same as the invasive surveillance data used to control and harass individuals.  Prediction is also a component in more effective control.

We are already seeing instances where people’s rights are infringed upon not because they have done anything but because someone predicted they would do something, based upon whatever methodology.  Much of this prediction is just snake oil and pseudoscience, but that does not change the fact that the rights infringement is very real.  There is also a statistical and scientific methodology to prediction which undoubtedly will improve with time.  If you can accurately predict someone’s actions you can move to preempt those actions even before they are taken.

To train agents to perform any of these actions. As professional torturing scum either retire, move into other sectors, or quit in disgust, new agents must be hired to take their places.  If the system is expanding then new people need to be hired to enlarge the system (or to automate the system with computers so fewer monitors can control more and more people).  These people need to be trained in the special juvenile and idiotic barbarity the U.S. mind controllers love to inflict.  Therefore fresh victims must continually be selected from the population so these sadistic pigs can practice their torture techniques.

To intimidate a population by making “examples” of people. If it were an open secret that people can be selected for any reason for mind control torture, then the population in on the open secret would be intimidated, if not terrified, that any one of them could be the next victim.  This is just a new method of violence by which a regime of thugs can control a population using a long-practiced terror tactic.

To perfect the technology and techniques and make it less detectable. This is the human guinea pig testing of the weapons technology, much like radiation tests on unwitting citizens.  Weapons are built, human subjects are chosen from the population, and the weapons are tested on the nonconsensual subjects.  (Some consensual subjects are no doubt also used, but that is not a human rights violation if the consent was truly informed.)  After these tests, the weapons lab analyzes the terrorized or influenced or manipulated responses of the subjects (in a “successful” test) and refines the weapon system.

A part of this testing also serves to help close all avenues of response and redress which might be open to the human subjects (and which later domestic targets of the weapon might have).  Any response the victim tries to make is monitored, and if it might be successful then this “loophole” in the system of denying justice is closed.  For example, a lawyer might be used to attempt to see what legal strategies he or she might think of so they could be rendered ineffective.  A technical person would be observed as he or she tried to understand, measure, and block the effects of the weapons system.  This would be valuable feedback to the designers, and might even provide them with ideas.  Note that for this particular aspect of the torture it is important that the victim know he or she is being attacked/violated.

Of course a victim has little choice but to try to resist or else to willingly become a slave (which still would not likely stop the harassment).  He or she must constantly think about the “testing” because it is typically ongoing, day and night.  That is just the vicious catch 22 that victims must deal with and is a part of why it is torture.  I am not trying to discourage any victim from taking whatever action they decide is the best course in such a horrible situation.

Various unwitting spy scenarios. Perhaps the best spy is one who does not even know he or she is a spy.  He or she cannot reveal it even under the most extreme torture because he or she does not know it.  Such people can be infiltrated into any group or just selected out of any particular group and “wired up.”  In a domestic social sense, inmates in prisons can be wired up before they are released so their monitors can peep into any criminal underworld activity which they might enter into after being “freed.”  (Of course it is important not to confuse the secret police with the regular police and law enforcement, though there is certainly overlap.)

To steal negotiating strategies or information. Arms control, treaties, business negotiations.

To conceal scientific and philosophical insights into human existence. One of the things repressive societies fear is new ideas and new ways of thinking.  Scientific advances have been made which could revolutionize the ways man views himself (to use the masculine form); but for some people this represents a potential threat to their power.  The new technologies could also potentially help our aging relatives, for example, if used in a humane and consensual way.  But it is a difficult philosophical shift to acknowledge that now our own “silent” thoughts might not be private — or might not really be our own.  This is one of the difficulties in getting people to understand mind control crimes.  (Remember also that mind controllers have no compunction or restriction against using any lies or deceptions or defiling and desecrating any religion in an attempt to manipulate people.)

Human guinea pigs for medical or psychological research. Once people are under ongoing, invasive surveillance they can become guinea pigs for any sort of medical or psychological human testing that needs continued monitoring.  This is a lucrative business now.  For example, if a person were were “knocked out” one day by whatever method and had a patch of skin rubbed with some chemical under development or of concern then the experimenters could watch the person’s own response to the potential poisoning.  Psychological research has even larger potential for abuse.  Real “field testing.”

To maintain the ongoing mind control conspiracy. Because atrocities have been committed, atrocities continue to be committed to conceal them.  The mind control technology and harassment network is used to keep the secret system secret, punish whistleblowers, and of course increase profits at whatever cost to human dignity.

Conclusions

Given that there is a long list of possible motives, hundreds of people (at the least) claiming to be victims of exactly this sort of technology, the known development of the technology, a history of such abuses, and the continued coverups of acknowledged MKULTRA and other mind control victims in the population, it seems reasonable to conclude that nonconsensual testing and harassment is still going on with the latest technology.  The questions are, who are the victims, how many are there, what was and is being done to them, and how can this extrajudicial torture of the domestic population be stopped as soon as possible.

Differences between mental illness and psychiatric injury

Differences between mental illness and psychiatric injury

The person who is being bullied will eventually say something like “I think I’m being paranoid…“; however they are correctly identifying hypervigilance, a symptom of PTSD, but using the popular but misunderstood word paranoia. The differences between hypervigilance and paranoia make a good starting point for identifying the differences between mental illness and psychiatric injury.

Paranoia Hypervigilance
  • paranoia is a form of mental illness; the cause is thought to be internal, eg a minor variation in the balance of brain chemistry
  • is a response to an external event (violence, accident, disaster, violation, intrusion, bullying, etc) and therefore an injury
  • paranoia tends to endure and to not get better of its own accord
  • wears off (gets better), albeit slowly, when the person is out of and away from the situation which was the cause
  • the paranoiac will not admit to feeling paranoid, as they cannot see their paranoia
  • the hypervigilant person is acutely aware of their hypervigilance, and will easily articulate their fear, albeit using the incorrect but popularised word “paranoia”
  • sometimes responds to drug treatment
  • drugs are not viewed favourably by hypervigilant people, except in extreme circumstances, and then only briefly; often drugs have no effect, or can make things worse, sometimes interfering with the body’s own healing process
  • the paranoiac often has delusions of grandeur; the delusional aspects of paranoia feature in other forms of mental illness, such as schizophrenia
  • the hypervigilant person often has a diminished sense of self-worth, sometimes dramatically so
  • the paranoiac is convinced of their self-importance
  • the hypervigilant person is often convinced of their worthlessness and will often deny their value to others
  • paranoia is often seen in conjunction with other symptoms of mental illness, but not in conjunction with symptoms of PTSD
  • hypervigilance is seen in conjunction with other symptoms of PTSD, but not in conjunction with symptoms of mental illness
  • the paranoiac is convinced of their plausibility
  • the hypervigilant person is aware of how implausible their experience sounds and often doesn’t want to believe it themselves (disbelief and denial)
  • the paranoiac feels persecuted by a person or persons unknown (eg “they’re out to get me”)
  • the hypervigilant person is hypersensitized but is often aware of the inappropriateness of their heightened sensitivity, and can identify the person responsible for their psychiatric injury
  • sense of persecution
  • heightened sense of vulnerability to victimisation
  • the sense of persecution felt by the paranoiac is a delusion, for usually no-one is out to get them
  • the hypervigilant person’s sense of threat is well-founded, for the serial bully is out to get rid of them and has often coerced others into assisting, eg through mobbing; the hypervigilant person often cannot (and refuses to) see that the serial bully is doing everything possible to get rid of them
  • the paranoiac is on constant alert because they know someone is out to get them
  • the hypervigilant person is on alert in case there is danger
  • the paranoiac is certain of their belief and their behaviour and expects others to share that certainty
  • the hypervigilant person cannot bring themselves to believe that the bully cannot and will not see the effect their behaviour is having; they cling naively to the mistaken belief that the bully will recognise their wrongdoing and apologise

Other differences between mental illness and psychiatric injury include:

Mental illness Psychiatric injury
  • the cause often cannot be identified
  • the cause is easily identifiable and verifiable, but denied by those who are accountable
  • the person may be incoherent or what they say doesn’t make sense
  • the person is often articulate but prevented from articulation by being traumatised
  • the person may appear to be obsessed
  • the person is obsessive, especially in relation to identifying the cause of their injury and both dealing with the cause and effecting their recovery
  • the person is oblivious to their behaviour and the effect it has on others
  • the person is in a state of acute self-awareness and aware of their state, but often unable to explain it
  • the depression is a clinical or endogenous depression
  • the depression is reactive; the chemistry is different to endogenous depression
  • there may be a history of depression in the family
  • there is very often no history of depression in the individual or their family
  • the person has usually exhibited mental health problems before
  • often there is no history of mental health problems
  • may respond inappropriately to the needs and concerns of others
  • responds empathically to the needs and concerns of others, despite their own injury
  • displays a certitude about themselves, their circumstances and their actions
  • is often highly sceptical about their condition and circumstances and is in a state of disbelief and bewilderment which they will easily and often articulate (“I can’t believe this is happening to me” and “Why me?” – click here for the answer)
  • may suffer a persecution complex
  • may experience an unusually heightened sense of vulnerability to possible victimisation (ie hypervigilance)
  • suicidal thoughts are the result of despair, dejection and hopelessness
  • suicidal thoughts are often a logical and carefully thought-out solution or conclusion
  • exhibits despair
  • is driven by the anger of injustice
  • often doesn’t look forward to each new day
  • looks forward to each new day as an opportunity to fight for justice
  • is often ready to give in or admit defeat
  • refuses to be beaten, refuses to give up

C

CONGRESS ASLEEP AT THE SWITCH AGAIN

Secretly the reality of a totally controlled society has been emplaced. While we were looking at political control, the technological mechanisms for a Big Brother state are being installed, secretly in the hope no one will notice.

Congress once again is at fault, it allowed vast billion dollar “black budgets” to escape oversight control. For decades, research and development on population control systems has been funded by a complacent Congress, and the Intelligence Committees in the House and Senate have allowed these systems to go operational. We are going to give you hard information and hard proof. This is not guesswork, it is reality. And Congress is to blame for lack of oversight.

Fortunately (for the United States), Sweden has applied these control systems overtly to entire segments of the population (in the U.S. apparently only selected individuals are under control.)

Our information comes from a Swedish researcher who has followed the Swedish system of people control i.e., the replacement of individual values, standards and beliefs by state authority.

Our Swedish source says, “We have (been led) out of the industrial society to enslavement in the Information Society” and “there are frightening developments concerning the use of data surveillance, known as biomedical telemetry, mind control, optical electronic surveillance and brain-computer interaction.”

Then comes the clincher:

“The properties of this technology enable the monitoring of mental functions, thought, deed and associated cerebral neurophysiological changes as well as the manipulation of behavior, values and personality from limitless geographical distance.”

These systems form the basis of the Information Society (so beloved by Newt Gingrich) and eliminate the power of the individual to make personal decisions. Maybe Newt Gingrich is not aware of this, but his emphasis on individuality is a fraud so long as control mechanisms exist to over ride individual values and decision making. (We are not accusing Gingrich, he may not know. We’ve spent a lifetime following these developments and only now can visualize the technology emerging.) These are black budget systems hidden from the public and ignored by the leadership in Congress.

Let’s summarize the information we received from our Swedish source, then we can sketch development in the U.S.

Cyber is the science of control. It consists of transmission of electromagnetic wavelengths for cerebral radio communication. The subordinate technologies include brain-computer interfacing, data surveillance, mind control, biomedical telemetry, man-machine interaction, all designed to transmit the basic ideology of the Information Society. (That’s why Gingrich’s mentor Alvin Toffler says the Constitution is “out of date.”)

Telemetry requires transmission of data not normally available i.e., your thoughts and plans. It is a two way communication system enabling remote control of individuals. (Official U.S. terminology-RNM or “remote neural monitoring.”)

This (our source continues) is a global system. (Is that why we have hundreds of satellites up there?) It operates at the speed of light and over any distance.

The surveillance system is operated by implanted transmitters in the head or electrodes in the brain but also injectable microchips, substances or micro transmitters implanted in any part of the body.

These implantations take place “in unwitting patients” during hospital operations, in patients at psychiatric clinics. In Sweden all elderly persons are implanted when “taken into long term care” (ah ha, Clinton’s universal health care!) and in all persons taken into police custody or in prison. Implants are also in the form of dental material and false teeth, and can be mixed into pharmacological products (i.e., medicine.)

Therefore, the Toffler school futurist’s emphasis on nanotechnology–the devices are hardly seen in x-rays.

These implants are, up to now, inserted into persons under state control (i.e., mental patients, prisoners, elderly sick.) This program has been funded, developed and implemented in complete secrecy. Experience has been that when governments hide something, it’s probably not to our benefit.

So how do the systems work?

The implant receives radio signals via satellites. These have known and specific effect on the brain. Many years of research on effects of radio signals on monkey and human behavior is in the open nonclassified literature. The black budgets have generated more advanced systems given the sophistication of the implants we know about.

The returned signals, from the individual brain through the satellite are processed by a central computer and the information presented on a screen to the controller. The technology has advanced to the stage where individual dreams or vision (i.e., mental picture) can be monitored on a three dimensional screen. So that as you read this and have a mental image of Big Brother at a screen this image in your mind can be (or is being) relayed back to a central processing facility.

The Militarization of Neuroscience

When military scientists begin to combine “cognitive engineering” and neuroscience with genetic engineering, we could see a nightmarish new generation of biological weapons and nerve agents that radically alter the minds, emotions, memories and beliefs of everyone on earth.

That’s the opinion of Mark Wheelis and Malcolm Dando, authors of “Neurobiology: A Case Study of the Imminent Militarization of Biology” published September 30, 1995 in the International Review of the Red Cross. See this site for a PDF of the full article:

http://www.icrc.org/Web/Eng/siteeng0.nsf/html/review-859-p553

Abstract: The revolution in biology, including advances in genomics, will lead to rapid progress in the treatment of mental illness by advancing the discovery of highly specific ligands that affect specific neurological pathways. The status of brain science and its potential for military application to enhance soldier performance, to develop new weapons and to facilitate interrogation are discussed. If such applications are pursued, they will also expand the options available to torturers, dictators and terrorists. Several generic approaches to containing the malign applications of biology are shown, and it is concluded that success or failure in doing so will be significantly dependent on the active involvement of the scientific and medical communities.

Translation: The medical community has got to stop sitting on its duff and get some international legislation passed prohibiting the development of these bioweapons NOW.

I would add: An equally serious effort needs to be made to block military application of EM weapons to the human brain. The pretence that such weapons are “less than lethal” is a serious misunderstanding of the immense threat that they pose to the privacy and civil liberties of every man, woman and child on the face of the globe.

Zersetzung (Ministerium für Staatssicherheit)

Zersetzung (Ministerium für Staatssicherheit)

Die Zersetzung als vom Ministerium für Staatssicherheit (MfS) der DDR eingesetzte geheimpolizeiliche Arbeitstechnik diente zur Bekämpfung vermeintlicher und tatsächlicher politischer Gegner. Die im Rahmen einer 1976 erlassenen Richtlinie definierten Zersetzungsmaßnahmen wurden vom MfS vornehmlich in den 1970er und 1980er Jahren in Operativen Vorgängen gegen oppositionelle Gruppen und Einzelpersonen eingesetzt. Zumeist konspirativ angewandt, ersetzten sie den offenen Terror der Ära Ulbricht. Durch gezielte Beeinträchtigung oder Schädigung versuchte das MfS Gegnern die Möglichkeiten für feindliche Handlungen zu nehmen. Als repressive Verfolgungspraxis beinhaltete die Zersetzung dabei umfangreiche Steuerungs- und Manipulationsfunktionen bis in die persönlichsten Beziehungen der Opfer hinein. Das MfS griff hierbei auf das Netz an „Inoffiziellen Mitarbeitern“ (IM), staatliche Einflussnahmemöglichkeiten sowie „Operative Psychologie“ zurück. Durch die Offenlegung zahlreicher Stasi-Unterlagen in Folge der politischen Wende in der DDR ist der Einsatz von Zersetzungsmaßnahmen durch das MfS besonders gut dokumentiert.
Inhaltsverzeichnis

* 1 Begriffsherkunft und MfS-Definition
* 2 Politische und gesellschaftliche Rahmenbedingungen
* 3 Praktische Anwendung
* 4 Zielgruppen für Zersetzungsmaßnahmen
* 5 Gesellschaftliche und juristische Aufarbeitung
* 6 Literatur
* 7 Film
* 8 Weblinks
* 9 Siehe auch
* 10 Einzelnachweise

Begriffsherkunft und MfS-Definition

Neben der chemischen Bedeutung des Verbs zersetzen bezeichnet Zersetzung auch die Zerstörung einer Gemeinschaft, Ordnung oder politischen Partei.[1] Die Herkunft des Wortes im MfS-Gebrauch stammt aus der Militärsprache: „Zersetzung“ bezeichnet eine strategische Maßnahme aus der psychologischen Kriegsführung, um die Kampfmoral gegnerischer Soldaten zu schwächen. Während der Weimarer Republik wurde der Begriff für die gegenseitige Unterwanderung politischer Organisationen sowie der Reichswehr mit dem Ziel ihrer inneren Schwächung gebraucht.[2] Das MfS verwendete den Begriff erstmals umfassend in ihrer als „Geheime Verschlusssache“ eingestuften Richtlinie Nr. 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge (OV). Diese beschrieb auf insgesamt vier Seiten die „Anwendung von Maßnahmen der Zersetzung“.

Eine Definition der Zersetzung einschließlich deren Ziele und Methoden lieferte das MfS im Rahmen der zweiten Auflage ihres 1981 erarbeiteten und 1985 erschienenen Wörterbuchs zur politisch-operativen Arbeit. Die erste Auflage aus dem Jahr 1970 enthielt diesen Begriff noch nicht.[3]

„[Die operative Zersetzung ist eine] operative Methode des MfS zur wirksamen Bekämpfung subversiver Tätigkeit, insbesondere in der Vorgangsbearbeitung. Mit der Z. wird durch verschiedene politisch-operative Aktivitäten Einfluß auf feindlich-negative Personen, insbesondere auf ihre feindlich-negativen Einstellungen und Überzeugungen in der Weise genommen, daß diese erschüttert und allmählich verändert werden bzw. Widersprüche sowie Differenzen zwischen feindlich-negativen Kräften hervorgerufen, ausgenutzt oder verstärkt werden.

Ziel der Z. ist die Zersplitterung, Lähmung, Desorganisierung und Isolierung feindlich-negativer Kräfte, um dadurch feindlich-negative Handlungen einschließlich deren Auswirkungen vorbeugend zu verhindern, wesentlich einzuschränken oder gänzlich zu unterbinden bzw. eine differenzierte politisch-ideologische Rückgewinnung zu ermöglichen.

Z. sind sowohl unmittelbarer Bestandteil der Bearbeitung Operativer Vorgänge als auch vorbeugender Aktivitäten außerhalb der Vorgangsbearbeitung zur Verhinderung feindlicher Zusammenschlüsse. Hauptkräfte der Durchführung der Z. sind die IM. Die Z. setzt operativ bedeutsame Informationen und Beweise über geplante, vorbereitete und durchgeführte feindliche Aktivitäten sowie entsprechende Anknüpfungspunkte für die wirksame Einleitung von Z.-Maßnahmen voraus.
Die Z. hat auf der Grundlage einer gründlichen Analyse des operativen Sachverhaltes sowie der exakten Festlegung der konkreten Zielstellung zu erfolgen. Die Durchführung der Z. ist einheitlich und straff zu leiten, ihre Ergebnisse sind zu dokumentieren.
Die politische Brisanz der Z. stellt hohe Anforderungen hinsichtlich der Wahrung der Konspiration.“

– Ministerium für Staatssicherheit: Wörterbuch zur politisch-operativen Arbeit, Stichwort: „Zersetzung“[4]

Politische und gesellschaftliche Rahmenbedingungen

Während der ersten zehn Jahre der DDR wurde politische Opposition überwiegend als Kriegs- und Boykotthetze mit Methoden des Strafrechtes bekämpft.[5] Mit der Abschottung der DDR in Folge des Mauerbaus wurde ab 1963 auch der justizielle Terror aufgegeben.[6] Vor allem seit Beginn der Ära Honecker 1971 verstärkte das MfS seine Bemühungen, oppositionelles Verhalten ohne Anwendung des Strafrechtes zu sanktionieren.[7] Wichtige Anlässe hierfür waren das Streben der DDR nach internationaler Anerkennung und die deutsch-deutsche Annäherung ab Ende der 1960er Jahre. So hatte sich die DDR sowohl im Grundlagenvertrag mit der BRD[8] als auch mit dem Beitritt zur UN-Charta[9] und der Unterzeichnung der KSZE-Schlussakte[10] zur Achtung der Menschenrechte verpflichtet beziehungsweise diese Absicht bekundet. Da letztere auch im Neuen Deutschland publiziert wurde, stand deren Umsetzung – insbesondere in Bezug auf die beschlossene Verbesserung der Ausreiseregelung – auch innenpolitisch zur Diskussion. Zudem versuchte das SED-Regime, die Zahl politischer Häftlinge zu reduzieren und hierzu die versprochenen Konzessionen durch Repressionspraktiken unterhalb der Schwelle von Verhaftung und Verurteilung zu kompensieren.[11][12]

Praktische Anwendung

Das MfS setzte die Zersetzung vor allem als psychologisches Unterdrückungs- und Verfolgungsinstrument ein.[13] Es nutzte die an der Juristischen Hochschule der Staatssicherheit (JHS) gewonnenen Erkenntnisse der „Operativen Psychologie“ gezielt,[14] um das Selbstvertrauen und Selbstwertgefühl der Opfer zu untergraben. Diese sollten verwirrt oder verängstigt, permanenten Enttäuschungen ausgesetzt und durch Störung der Beziehungen zu anderen Menschen sozial entwurzelt werden. Auf diese Weise sollten Lebenskrisen hervorgerufen werden, die politische Gegner verunsichern und psychisch belasten sollten, sodass dem Opfer die Zeit und Energie für staatsfeindliche Aktivitäten genommen wurde.[15] Das MfS als Drahtzieher der Maßnahmen sollte hierbei nicht erkennbar sein.[16][2] Der selbst betroffene Schriftsteller Jürgen Fuchs sprach deshalb auch von „psychosozialen Verbrechen“ und einem „Angriff auf die Seele des Menschen“.[15]

Wenngleich sich bereits für die späten 1950er Jahre Methoden der Zersetzung nachweisen lassen, wurde die Zersetzung als Methode erst Mitte der 1970er Jahre „wissenschaftlich“ definiert und vornehmlich in den 1970er und 1980er Jahren angewendet.[17] Die Zahl der betroffenen Personen kann nur schwer ermittelt werden, da die Quellenlage wegen bewusster Verschleierung oft lückenhaft ist, die angewendeten Methoden jedoch vielfältig und die beteiligten Abteilungen zahlreich waren. Insgesamt dürften eine vier- bis fünfstellige Zahl an Personen in Gruppen, sowie eine dreistellige Zahl an Einzelpersonen mit Zersetzungsmaßnahmen belegt worden sein.[18] Andere Quellen gehen von etwa 5000 betroffenen Personen aus.[19] An der Juristischen Hochschule wurde eine zweistellige Zahl an Dissertationen zu Themen der Zersetzung vorgelegt.[20] Zudem existiert ein etwa 50 Seiten umfassendes „Lehrmaterial“ zur Zersetzung mit zahlreichen praktischen Beispielen.[21]

Angewandt wurden die Maßnahmen von nahezu allen Abteilungen des MfS, vor allem jedoch von der Hauptabteilung XX des MfS in Berlin sowie den Abteilungen XX der Bezirksverwaltungen und Kreisdienststellen des MfS. Mit der Überwachung von Religionsgemeinschaften, Kultur- und Medienbetrieben, Blockparteien und gesellschaftlichen Organisationen, des Bildungs- und Gesundheitssystems sowie des Sports deckte die Linie XX praktisch das gesamte öffentliche Leben in der DDR ab.[22] Das MfS nutzte hierbei die Möglichkeiten, die sich aus der geschlossenen Gesellschaftsform der DDR ergaben. Durch politisch-operatives Zusammenwirken besaß das MfS umfangreiche Eingriffsmöglichkeiten wie beispielsweise berufliche oder schulische Strafen, Ausschluss aus Massenorganisationen und Sportvereinen, zeitweise Verhaftungen durch die Volkspolizei[2] sowie die Nichtgewährung von Reisegenehmigungen ins sozialistische Ausland bzw. das Zurückweisen an den visafreien Grenzübergängen zur Tschechoslowakei und Volksrepublik Polen. Zu den „Partnern des operativen Zusammenwirkens“ zählten ferner die Räte der Kreise, Universitäts- und Betriebsleitungen, Wohnungsverwaltungen, Sparkassenfilialen oder unter Umständen behandelnde Ärzte.[23] Wichtige Grundlagen für die Ausarbeitung von Zersetzungsmaßnahmen lieferten die Linie VIII (Observation) sowie die Abteilungen 26 (Telefon- und Raumüberwachung) und M (Postkontrolle) des MfS, notwendige Technik beschaffte die Abteilung 32.[24]

Das MfS wendete die Zersetzung vor, während, nach oder an Stelle einer Inhaftierung der „Zielperson“ an. Die operativen Vorgänge verfolgten hierbei in der Regel nicht das Ziel, Beweise für eine strafbare Handlung des Opfers zu erbringen, um ein Ermittlungsverfahren zu eröffnen. Vielmehr betrachtete das MfS Zersetzungsmaßnahmen als eigenständiges Instrument, welches zum Einsatz kam, wenn strafrechtliche Maßnahmen aus politischen oder „politisch-operativen“ Gründen (beispielsweise um das internationale Ansehen der DDR nicht zu gefährden) nicht erwünscht waren.[25][26] In einigen Fällen versuchte das MfS jedoch einzelne Personen bewusst zu kriminalisieren, indem es beispielsweise Wolf Biermann Minderjährige zuführte, mit dem Ziel ihn später strafrechtlich belangen zu können.[27] Als Delikte für eine derartige Kriminalisierung wurden unpolitische Vergehen wie Drogenbesitz, Zoll- und Devisenvergehen, Diebstahl, Steuerhinterziehung oder Vergewaltigungen angestrebt.[28]

Als bewährte Formen der Zersetzung nennt die Richtlinie 1/76 unter anderem:

„systematische Diskreditierung des öffentlichen Rufes, des Ansehens und des Prestiges auf der Grundlage miteinander verbundener wahrer, überprüfbarer und diskreditierender, sowie unwahrer, glaubhafter, nicht widerlegbarer und damit ebenfalls diskreditierender Angaben; systematische Organisierung beruflicher und gesellschaftlicher Misserfolge zur Untergrabung des Selbstvertrauens einzelner Personen; […] Erzeugung von Zweifeln an der persönlichen Perspektive; Erzeugen von Misstrauen und gegenseitigen Verdächtigungen innerhalb von Gruppen […]; örtliches und zeitliches Unterbinden beziehungsweise Einschränken der gegenseitigen Beziehungen der Mitglieder einer Gruppe […] zum Beispiel durch […] Zuweisung von örtlich entfernt liegender Arbeitsplätze“

– Richtlinie Nr. 1/76 zur Entwicklung und Bearbeitung Operativer Vorgänge vom Januar 1976[29]

Mit dem durch Bespitzelung erlangten Wissen erstellte das MfS Sozio- und Psychogramme und wendete diese für persönlichkeitsorientierte Formen der Zersetzung an. Dabei wurden gezielt persönliche Eigenschaften und Neigungen sowie charakterliche Schwächen der „bearbeiteten Feindperson“ – beispielsweise berufliches Versagen, Vernachlässigung elterlicher Pflichten, Homosexualität, pornographische Interessen, Ehebruch, Alkoholismus, Abhängigkeit von Medikamenten, Neigung zu kriminellen Handlungen, Sammler- und Spielleidenschaften sowie Kontakte zu rechtsextremen Kreisen – aufgegriffen, oder diese wurden zur Bloßstellung des Opfers als Gerücht in dessen Umfeld gestreut.[30][31] Aus Sicht des MfS waren die Maßnahmen umso erfolgreicher, je persönlichkeitsbezogener sie angewendet wurden, jeglichen „Schematismus“ galt es zu vermeiden.[30]

Im Namen der Opfer schaltete das MfS Kontakt- oder Kleinanzeigen, löste Warenbestellungen aus oder setzte Notrufe ab, um diese zu terrorisieren.[32][33] Zur Drohung bzw. Einschüchterung sowie zur Erzeugung von Psychosen verschaffte sich das MfS Zugang zu den Wohnungen der Opfer und hinterließ dort offensichtliche Spuren der Anwesenheit, indem Gegenstände hinterlassen, entfernt oder verändert wurden.[28]

Freundschafts-, Liebes-, Ehe- und Familienbeziehungen manipulierte das MfS durch anonyme Briefe, Telegramme und Telefonanrufe sowie (oftmals gefälschte) kompromittierende Fotos[34]. Auf diese Weise sollten Eltern und Kinder systematisch entfremdet werden.[35] Zur Provokation von Beziehungskonflikten sowie außerehelicher Beziehungen unternahm das MfS mittels sogenannter Romeo-Agenten gezielte Umwerbungsversuche.[27]

Für die Zersetzung von Gruppen wurden gezielt (auch minderjährige[36]) IM innerhalb der Gruppe angeworben und eingesetzt. Oppositionelle Gruppen wurden in ihrer Arbeit behindert, indem durch IM permanent Korrekturen und Gegenvorschläge in deren programmatische Diskussionen eingebracht wurden.[37] Um Misstrauen innerhalb der Gruppe zu erzeugen, erweckte das MfS gelegentlich nur den Eindruck, einzelne Gruppenmitglieder seien als IM tätig. Neben der Verbreitung von Gerüchten oder manipulierten Fotos[38] fingierte das MfS hierbei Indiskretionen über angebliche IM-Treffen oder lud einzelne Gruppenmitglieder zu staatlichen Stellen vor, um den Eindruck einer IM-Tätigkeit zu erwecken.[2] Auch durch die gezielte Gewährung von Privilegien – zum Beispiel bei Urlaubs- und Reisegenehmigungen oder der Zuteilung von Wohnungen oder PKW – sollte der Eindruck einer MfS-Tätigkeit einzelner Gruppenmitglieder erzeugt werden.[27] Zweifel entstanden zudem durch die Inhaftierung nur einiger Mitglieder einer Gruppe.[37]

Ferner gehörten zu den Zersetzungsmethoden offene, verdeckte oder vorgetäuschte Bespitzelung, Brief- oder Telefonkontrolle, das Beschädigen privaten Eigentums, Manipulationen an Fahrzeugen bis hin zur Vergiftung von Lebensmitteln, falscher medizinischer Behandlung und strategisch gezieltem Treiben in den Suizid.[39]

Nicht abschließend geklärt werden konnte, ob das MfS Röntgenstrahlung einsetzte, um bei politischen Gegnern gesundheitliche Langzeitschäden hervorzurufen.[40] So starben mit Rudolf Bahro, Gerulf Pannach und Jürgen Fuchs im Abstand von zwei Jahren drei zum gleichen Zeitpunkt inhaftierte, prominente DDR-Dissidenten an Krebserkrankungen.[41] Eine Studie der BStU schloss jedoch auf Grundlage der vorhandenen Akten eine derart vorsätzliche Anwendung von Röntgenstrahlung aus und dokumentierte stattdessen nur einzelne Fälle fahrlässiger gesundheitsgefährdender Verwendung von radioaktiver Strahlenquellen, beispielsweise zur Markierung von Dokumenten.[42]

Das MfS setzte Zersetzungsmaßnahmen auch in Zusammenarbeit mit Bruder-Geheimdiensten anderer Ostblock-Staaten um. So leitete beispielsweise der polnische Geheimdienst gemeinsam mit dem MfS ab Anfang der 1960er Jahre gezielte Maßnahmen gegen die Zeugen Jehovas ein, welche als „innere Zersetzung“[43] bezeichnet wurden.[44]
Zielgruppen für Zersetzungsmaßnahmen

Maßnahmen der Zersetzung wurden seitens des MfS gegen Einzelpersonen und Personengruppen angewandt. Es existierte jedoch keine homogene Zielgruppe für Zersetzungsmaßnahmen, da oppositionelles Verhalten in der DDR vielfältig in Erscheinung trat und das MfS daher differenzierte Maßnahmen zu dessen Bekämpfung ergriff.[45] Dennoch nannte das MfS als Hauptzielgruppen:[2]

* Zusammenschlüsse von Ausreiseantragsstellern
* feindliche Gruppen unter kritischen Künstlern
* kirchliche Oppositionsgruppen
* Gruppierungen von Jugendlichen
* sowie deren Unterstützer (Menschenrechts- und Fluchthilfeorganisationen, ausgereiste und ausgebürgerte Oppositionelle).

Zudem setzte die Stasi vereinzelt Methoden der Zersetzung auch gegen missliebige unpolitische Organisationen wie die Wachtturm-Gesellschaft ein.[46]

Zu den prominentesten Opfern von Zersetzungsmaßnahmen zählten Jürgen Fuchs, Gerulf Pannach, Rudolf Bahro, Robert Havemann, Rainer Eppelmann, Reiner Kunze, die Eheleute Gerd und Ulrike Poppe, sowie Wolfgang Templin.
Gesellschaftliche und juristische Aufarbeitung

Sofern ihnen dies bewusst wurde, versuchten DDR-Oppositionelle wie Wolfgang Templin zum Teil erfolgreich die Zersetzungstätigkeiten des MfS über westliche Journalisten öffentlich zu machen.[33] Der Spiegel veröffentlichte 1977 die fünfteilige Serie Du sollst zerbrechen! des exilierten Jürgen Fuchs, in der er die „operative Psychologie“ der Stasi beschrieb.[47] Das MfS versuchte derartigen Veröffentlichungen entgegen zu wirken, indem es Fuchs in Redaktionen als Stasi-Paranoiker diskreditierte,[48] sodass der Spiegel und andere Medien davon ausgingen, Fuchs leide an Verfolgungswahn.[49][33] Dies konnte erst durch die Einsicht der Stasi-Akten nach der politischen Wende in der DDR widerlegt werden.

Im Wesentlichen gelten Methoden der Zersetzung auf Grund des Rückwirkungsverbots auch nach 1990 als nicht strafwürdig, eine Beteiligung an der Planung oder Durchführung von Zersetzungsmaßnahmen zog daher in der Regel keine juristischen Folgen nach sich.[50] Da ein eigener Straftatbestand der Zersetzung nicht existiert,[51] müssen Zersetzungsmaßnahmen einzeln zur Anzeige gebracht werden. Handlungen, die auch nach DDR-Recht Straftatbestände waren (etwa die Verletzung des Briefgeheimnisses), hätten bereits kurz nach der Tat bei DDR-Behörden angezeigt werden müssen, um einer Verjährung zu entgehen.[52] Erschwerend kam für viele Betroffene hinzu, dass das MfS als Urheber persönlicher Schäden und Misserfolge nicht erkennbar war. Oftmals besitzen zudem Stasi-Unterlagen vor Gericht keine Beweiskraft.

Opfer von Zersetzungsmaßnahmen erhalten – sofern sie nicht mindestens 180 Tage inhaftiert waren – keine Opferpension gemäß §17a des Strafrechtlichen Rehabilitierungsgesetzes (StrRehaG). Bei nachweislicher systematischer, beruflicher und/oder gesundheitlicher Schädigung durch das MfS kann gemäß Unrechtsbereinigungsgesetz (2. SED-UnBerG) eine verwaltungsrechtliche und sowie eine berufliche Rehabilitierung beantragt werden. Diese heben bestimmte Verwaltungsmaßnahmen von DDR-Organen auf und stellen deren Rechtsstaatswidrigkeit fest. Dies ist Voraussetzung für soziale Ausgleichszahlungen nach dem Bundesversorgungsgesetz. Bei einer anerkannten Verfolgungszeit von mindestens drei Jahren und nachgewiesener Bedürftigkeit können zudem Ausgleichszahlungen für Verdienstausfälle und Rentenschäden beantragt werden.[53] Als besondere Hürden erweisen sich in den genannten Fällen jedoch der Nachweis des Eingriffs des MfS in Gesundheit, Vermögen, Ausbildung und Beruf des Betroffenen, sowie die Anerkennung von (zum Teil psychischen) Gesundheitsschäden als direkte Folge von Zersetzungsmaßnahmen.[54]

Follow

Get every new post delivered to your Inbox.

Join 100 other followers