Originally shared by Government GangStalking and Electronic Harassment
Experiences with harassment before and after working alongside the British Security Services
Carl became the hunted after falling out with his handlers and went through three years of harassment and targeting by his former mentors, it resulted in the breakdown of his marriage of 25 years before moving away from his home town of Norwich and settling in Thetford, where he became very popular and rebuilt his life.
Carl became a Local and District Councillor after being elected for his work with children and youth for the Labour Party, he then disagreed with some of their policies and represented the Christian Peoples Alliance, where he stood a candidate in the 2014 European Parliamentary elections in which he got over 11,000 votes and beat two of the opposing parties, due to a RTA (Road Traffic Incident) he was unable to stand in the U.K Parliamentary Elections in 2015 his injuries are still causing problems.
Carl Clark statement for the Covert Harassment Conference 2015:
https://www.covertharassmentconference.com/speaker&Carl_Clark
https://www.covertharassmentconference.com/speaker&Carl_Clark
Wednesday, August 30, 2017
THIS INJECTS A BIBLICAL TOUCH TO IT
Originally shared by Government GangStalking and Electronic Harassment
THIS INJECTS A BIBLICAL TOUCH TO IT
Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert Electromagnetic Torture of Civilians by Intel Agencies in US/UK/Europe/Asia with Directed Energy “Non-Lethal” Neuroweapons
https://debmatheny.wordpress.com/2015/09/06/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
https://debmatheny.wordpress.com/2015/09/06/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
THIS INJECTS A BIBLICAL TOUCH TO IT
Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert Electromagnetic Torture of Civilians by Intel Agencies in US/UK/Europe/Asia with Directed Energy “Non-Lethal” Neuroweapons
https://debmatheny.wordpress.com/2015/09/06/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
https://debmatheny.wordpress.com/2015/09/06/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
Electromagnetic Weapons Are Being Used To Torture And Subjugate Countless American Citizens...- Updated February...
Originally shared by Government GangStalking and Electronic Harassment
Electromagnetic Weapons Are Being Used To Torture And Subjugate Countless American Citizens...- Updated February 26, 2017 -
http://www.biggerthansnowden.com/
By The Whistleblowers such as
William Binney
NSA Veteran, Technical Director
and
John DeCamp, U.S. Army Capt. (Ret).
Army Intelligence Officer; Lawyer; Senator
and a list of other whistleblowers
http://www.biggerthansnowden.com/
Electromagnetic Weapons Are Being Used To Torture And Subjugate Countless American Citizens...- Updated February 26, 2017 -
http://www.biggerthansnowden.com/
By The Whistleblowers such as
William Binney
NSA Veteran, Technical Director
and
John DeCamp, U.S. Army Capt. (Ret).
Army Intelligence Officer; Lawyer; Senator
and a list of other whistleblowers
http://www.biggerthansnowden.com/
Targeted Individuals: testimony of current government covert torture & control experiments
Originally shared by Government GangStalking and Electronic Harassment
Targeted Individuals: testimony of current government covert torture & control experiments
http://www.washingtonsblog.com/2016/01/targeted-individuals-testimony-current-government-covert-torture-control-experiments.html
READ THE REFERENCED ARTICLES AT BOTTOM OF THIS POSTED ARTICLE
SEE LIST BELOW
The “Neutralizing” of US Dissent With Neuroweaponry: Open Letter to Journalists and Human Rights Advocates and Organizations in the USA and Worldwide
In 2015, Covert Non-Consensual RFID/MEMS (Microchip) Implants Are a Reality Everyone Should Know About
Paranoid Schizophrenia, Tool of the Red Terror, Makes a Comeback in Authoritarian USA & Other Western “Democracies”
2015: “Targeted Individuals” are Non-Consensual Subjects in Criminal, Clandestine, Classified “Top Secret” MKULTRA-Extended Mind & Behavior Control/Torture Experimentation by Joint Military/Intel/Justice/Academic Institutions, as well as Targets of COINTELPRO and Electronic Warfare
Is the US Department of Justice Secretly Permitting Local Law Enforcement & the Military to Assault American Citizens Using Covert Directed-Energy “Non-Lethal” Weapons?
The “Deep State” Hides in Plain Sight: Organized Covert Harassment Points to Overreach and Abuse of Powers by Out-of-Control Intel Agencies
Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert
Electromagnetic Torture of Civilians by Intel Agencies in US/UK/Europe/Asia with Directed Energy “Non-Lethal” Neuroweapons
Dr. Steven Greer: How the Secret Government Works — UFO Secrecy,
Unacknowledged Special Access Projects, Scalar Technologies, Disinfo Tactics (Includes Disclosure/Open Admissions on DEWs & EMFs, Targeting, RFIDs, Psychiatrist Complicity, Controlled Media)
EXERCISE CAUTION AT ARTICLES THAT MENTION AND SUPPORT THE WORD "UFOs"
http://www.washingtonsblog.com/2016/01/targeted-individuals-testimony-current-government-covert-torture-control-experiments.html
Targeted Individuals: testimony of current government covert torture & control experiments
http://www.washingtonsblog.com/2016/01/targeted-individuals-testimony-current-government-covert-torture-control-experiments.html
READ THE REFERENCED ARTICLES AT BOTTOM OF THIS POSTED ARTICLE
SEE LIST BELOW
The “Neutralizing” of US Dissent With Neuroweaponry: Open Letter to Journalists and Human Rights Advocates and Organizations in the USA and Worldwide
In 2015, Covert Non-Consensual RFID/MEMS (Microchip) Implants Are a Reality Everyone Should Know About
Paranoid Schizophrenia, Tool of the Red Terror, Makes a Comeback in Authoritarian USA & Other Western “Democracies”
2015: “Targeted Individuals” are Non-Consensual Subjects in Criminal, Clandestine, Classified “Top Secret” MKULTRA-Extended Mind & Behavior Control/Torture Experimentation by Joint Military/Intel/Justice/Academic Institutions, as well as Targets of COINTELPRO and Electronic Warfare
Is the US Department of Justice Secretly Permitting Local Law Enforcement & the Military to Assault American Citizens Using Covert Directed-Energy “Non-Lethal” Weapons?
The “Deep State” Hides in Plain Sight: Organized Covert Harassment Points to Overreach and Abuse of Powers by Out-of-Control Intel Agencies
Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert
Electromagnetic Torture of Civilians by Intel Agencies in US/UK/Europe/Asia with Directed Energy “Non-Lethal” Neuroweapons
Dr. Steven Greer: How the Secret Government Works — UFO Secrecy,
Unacknowledged Special Access Projects, Scalar Technologies, Disinfo Tactics (Includes Disclosure/Open Admissions on DEWs & EMFs, Targeting, RFIDs, Psychiatrist Complicity, Controlled Media)
EXERCISE CAUTION AT ARTICLES THAT MENTION AND SUPPORT THE WORD "UFOs"
http://www.washingtonsblog.com/2016/01/targeted-individuals-testimony-current-government-covert-torture-control-experiments.html
Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert Electromagnetic Torture of Civilians by Intel...
Originally shared by Government GangStalking and Electronic Harassment
Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert Electromagnetic Torture of Civilians by Intel Agencies in US/UK/Europe/Asia with Directed Energy “Non-Lethal” Neuroweapons
https://everydayconcerned.net/2015/09/05/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
Please visit Rudy2’s Multilingual Blog for the entire text of the interview, and also for translations in different languages, including French, Italian, and Spanish. at
https://rudy2.wordpress.com/secret-surveillance-and-electromagnetic-torture-by-the-secret-services/
Or visit Stopeg.com for the pdf of the translated interview.at
http://www.stopeg.com/doc/CarlClarkInterview.pdf
or link to the original document from the German Press at
http://media.de.indymedia.org/media/2010/04/278517.pdf
https://everydayconcerned.net/2015/09/05/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert Electromagnetic Torture of Civilians by Intel Agencies in US/UK/Europe/Asia with Directed Energy “Non-Lethal” Neuroweapons
https://everydayconcerned.net/2015/09/05/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
Please visit Rudy2’s Multilingual Blog for the entire text of the interview, and also for translations in different languages, including French, Italian, and Spanish. at
https://rudy2.wordpress.com/secret-surveillance-and-electromagnetic-torture-by-the-secret-services/
Or visit Stopeg.com for the pdf of the translated interview.at
http://www.stopeg.com/doc/CarlClarkInterview.pdf
or link to the original document from the German Press at
http://media.de.indymedia.org/media/2010/04/278517.pdf
https://everydayconcerned.net/2015/09/05/ex-cia-and-mi5-agent-and-whistleblower-carl-clark-reveals-covert-electromagnetic-torture-of-civilians-by-intel-agencies-in-usukeuropeasia-with-directed-energy-non-lethal-neuroweapons/
Tuesday, August 29, 2017
Sunday, August 27, 2017
Saturday, August 26, 2017
Diplomats in Cuba Victims of "ELF" Sonic Weapon Attacks?!
Originally shared by Government GangStalking and Electronic Harassment
Diplomats in Cuba Victims of "ELF" Sonic Weapon Attacks?!
https://www.youtube.com/watch?v=AXCjfkjuDHk
ALSO SEE
http://conservativetribune.com/docs-diagnose-us-diplomats-cuba/
Docs Finally Diagnose US Diplomats in Cuba… This Means War
https://www.youtube.com/watch?v=fYGnmObkhwE
SHOCKING: Doctors Finally Diagnose US Diplomats in Cuba with Nerve Damage …This Means ...!!!
THIS RESEMBLES WHAT WE, TIs, GO THROUGH ON 24/7 BASIS
https://www.youtube.com/watch?v=AXCjfkjuDHk
Diplomats in Cuba Victims of "ELF" Sonic Weapon Attacks?!
https://www.youtube.com/watch?v=AXCjfkjuDHk
ALSO SEE
http://conservativetribune.com/docs-diagnose-us-diplomats-cuba/
Docs Finally Diagnose US Diplomats in Cuba… This Means War
https://www.youtube.com/watch?v=fYGnmObkhwE
SHOCKING: Doctors Finally Diagnose US Diplomats in Cuba with Nerve Damage …This Means ...!!!
THIS RESEMBLES WHAT WE, TIs, GO THROUGH ON 24/7 BASIS
https://www.youtube.com/watch?v=AXCjfkjuDHk
Friday, August 25, 2017
Dr. Rauni Kilde - Microchip Implants, Mindcontrol and Cybernetics - MD December 6, 2000
Originally shared by Urupipeṛ2 Ṫẁo
Dr. Rauni Kilde - Microchip Implants, Mindcontrol and Cybernetics - MD December 6, 2000
The following article was originally published in the 36th-year (written in 2000 ) edition of the Finnish-language journal, SPEKULA (3rd Quarter, 1999). SPEKULA is a publication of Northern Finland medical students and doctors of Oulu University OLK (OULUN LÄÄKETIETEELLINEN KILTA). It is mailed to all medical students of Finland and all Northern Finland medical doctors. Circulation 6500.
by Rauni-Leena Luukanen-Kilde, MD Former Chief Medical Officer of Finland
In 1948 Norbert Weiner published a book, CYBERNETICS, defined as a neurological communication and control theory already in use in small circles at that time. Yoneji Masuda, "Father of Information Society," stated his concern in 1980 that our liberty is threatened Orwellian-style by cybernetic technology totally unknown to most people. This technology links the brains of people via implanted microchips to satellites controlled by ground-based superr-computers. The first brain implants were surgically inserted in 1974 in the state of Ohio, U.S.A., and also in Stockholm, Sweden. Brain electrodes were inserted into the skulls of babies in 1946 without the knowledge of their parents. In the 50's and 60's, electrical implants were inserted into the brains of animals and humans, especially in the U.S., during research into behavior modification, and brain and body functioning. Mind control (MC) methods were used in attempts to change human behavior and attitudes. Influencing brain functions became an important goal of military and intelligence services. Thirty years ago brain implants showed up in xrays the size of one centimeter. Subsequent implants shrunk to the size of a grain of rice. They were made of silicon, later still of gallium arsenide. Today they are small enough to be inserted into the neck or back, and also intravenously in different parts of the body during surgical operations, with or without the consent of the subject. It is now almost impossible to detect or remove them. It is technically possible for every newborn to be injected with a microchip, which could then function to identify the person for the rest of his or her life. Such plans are secretly being discussed in the U.S. without any public airing of the privacy issues involved. In Sweden, Prime Minister Olof Palme gave permission in 1973 to implant prisoners, and Data Inspection's ex-Director General Jan Freese revealed that nursing-home patients were implanted in the mid- 1980's. The technology is revealed in the 1972:47 Swedish state report, STATENS OFFICIELLA UTRADNINGER (SOU). Implanted human beings can be followed anywhere. Their brain functions can then be remotely monitored by supercomputers and even altered through the changing of frequencies. Guinea-pigs in secret experiments have included prisoners, soldiers, mental patients, handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children and any group of people considered "marginal" by the elite experimenters. The published experiences of prisoners in Utah State Prison, for example, are shocking to the conscience. Today's microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. Such a technique was among a number tested in the Iraq war, according to Dr. Carl Sanders, who invented the intelligence-manned interface (IMI) biotic, which is injected into people. (Earlier during the Vietnam War, soldiers were injected with the Rambo chip, designed to increase adrenaline flow into the bloodstream.) The U.S. National Security Agency's (NSA) 20 billion bits/second supercomputers could now "see and hear" what soldiers experience in the battlefield with a remote monitoring system (RMS). When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target's performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person's brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture. The NSA's electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24 hours a day. The Washington Post reported in in May 1995 that Prince William of Great Britain was implanted at the age of 12. Thus, if he were ever kidnapped, a radiowave with a specific frequency could be targeted to his microchip. The chip’s signal would be routed through a satellite to the computer screen of police headquarters, where the Prince’s movements could be followed. He could actually be located anywhere on the globe. The mass media have not reported that an implanted person's privacy vanishes for the rest of his or her life. S/he can be manipulated in many ways. Using different frequencies, the secret controller of this equipment can even change a person's emotional life. S/he can be made aggressive or lethargic. Sexuality can be artificially influenced. Thought signals and subconscious thinking can be read, dreams affected and even induced, all without the knowledge or consent of the implanted person. A perfect cyber-soldier can thus be created. This secret technology has been used by military forces in certain NATO countries since the 1980's without civilian and academic populations having heard anything about it. Thus, little information about such invasive mind-control systems is available in professional and academic journals. The NSA's Signals Intelligence can remotely monitor information from human brains by decoding the evoked potentials (3.50HZ, 5 milliwatt) emitted by the brain. Prisoner experimentees in both Gothenburg, Sweden and Vienna, Austria have been found to have [missing word] brain lesions. Diminished blood circulation and lack of oxygen in the right temporal frontal lobes result where brain implants are usually operative. A Finnish experimentee experienced brain atrophy and intermittent attacks of unconsciousness due to lack of oxygen. Mind control techniques can be used for political purposes. The goal of mind controllers today is to induce the targeted persons or groups to act against his or her own convictions and best interests. Zombified individuals can even be programmed to murder and remember nothing of their crime afterward. Alarming examples of this phenomenon can be found in the U.S. This “silent war” is being conducted against unknowing civilians and soldiers by military and intelligence agencies. Since 1980 electronic stimulation of the brain (ESB) has been secretly used to control people targeted without their knowledge or consent. All international human rights agreements forbid nonconsensual manipulation of human beings — even in prisons, not to speak of civilian populations. Under an initiative of U.S. Senator John Glenn, discussions commenced in January 1997 about the dangers of radiating civilian populations. Targeting people’s brain functions with electromagnetic fields and beams (from helicopters and airplanes, satellites, from parked white vans, neighboring houses, telephone poles, electrical appliances, mobil phones, TV, radio, etc.), is part of the radiation problem that should be addressed in democratically elected government bodies. In addition to electronic MC, chemical methods have also been developed. Mind-altering drugs and different smelling gasses affecting brain function negatively can be injected into air ducts or water pipes. Also, bacteria and viruses have been tested this way in several countries. Today's supertechnology, connecting our brain functions via microchips (or even without them, according to the latest technology) to computers via satellites in the U.S. or Israel, poses the gravest threat to humanity. The latest supercomputers are powerful enough to monitor the whole world’s population. What will happen when people are tempted by false premises to allow microchips into their bodies? One lure will be a microchip identity card. Compulsory legislation has even been secretly proposed in the U.S. to criminalize removal of an ID implant. Are we ready for the robotization of mankind and the total elimination of privacy, including freedom of thought? How many of us would want to cede our entire life, including our most secret thoughts, to Big Brother? Yet the technology exists to create a totalitarian "New World Order." Covert neurological communication systems are in place to counteract independent thinking and to control social and political activity on behalf of self-serving private and military interests. When our brain functions are already is connected to supercomputers by means of radio implants and microchips, it will be too late for protest. This threat can be defeated only by educating the public, using available literature on biotelemetry and information exchanged at international congresses. One reason this technology has remained a state secret is the widespread prestige of the psychiatric DIAGNOSTIC STATISTICAL MANUAL IV produced by the U.S. American Psychiatric Association (APA), and printed in 18 languages. Psychiatrists working for U.S. intelligence agencies no doubt participated in writing and revising this manual. This psychiatric "bible" covers up the secret development of MC technologies by labelling some of their effects as symptoms of paranoid schizophrenia. Victims of mind control experimentation are thus routinely diagnosed, knee-jerk fashion, as mentally ill by doctors who learned the DSM “symptom” list in medical school. Physicians have not been schooled that patients may be telling the truth when they report being targeted against their will or being used as guinea pigs for electronic, chemical and bacteriological forms of psychological warfare. Time is running out for changing the direction of military medicine, and ensuring the future of human freedom.
Rauni Kilde, MD December 6, 2000
http://100777.com/node/163
Anonymous Secret plan to 'implant us all with ID chips!
Originally shared by mystdolly
https://www.youtube.com/watch?v=w3qcBhE0LQw
https://www.youtube.com/watch?v=w3qcBhE0LQw
Tuesday, August 22, 2017
WOUNDED by WIRELESS, SMART METERS, WIFI, CELL PHONE TOWERS - EMF & MICROWAVE FREQUENCIES
Originally shared by Government GangStalking and Electronic Harassment
WOUNDED by WIRELESS, SMART METERS, WIFI, CELL PHONE TOWERS - EMF & MICROWAVE FREQUENCIES
https://www.youtube.com/watch?v=D0CHu4EOvG8
https://www.youtube.com/watch?v=D0CHu4EOvG8
WOUNDED by WIRELESS, SMART METERS, WIFI, CELL PHONE TOWERS - EMF & MICROWAVE FREQUENCIES
https://www.youtube.com/watch?v=D0CHu4EOvG8
https://www.youtube.com/watch?v=D0CHu4EOvG8
New 5G Technology Could Send Voices into your Head - Patents & White Papers - July 7 2017
New 5G Technology Could Send Voices into your Head - Patents & White Papers - July 7 2017
https://www.youtube.com/watch?v=YMJrcHg0ufc
https://www.youtube.com/watch?v=YMJrcHg0ufc
https://www.youtube.com/watch?v=YMJrcHg0ufc
https://www.youtube.com/watch?v=YMJrcHg0ufc
Saturday, August 19, 2017
Thursday, August 17, 2017
Gangstalker Wars: Details of Social Engineering Program Exposed
Gangstalker Wars: Details of Social Engineering Program Exposed
ABOUT GANG STALKING, ELECTRONIC HARASSMENT, MIND CONTROL, HUMAN EXPERIMENTATION,...AMONG OTHER THINGS..
https://www.spreaker.com/user/9988805/gangstalker-wars-details-of-social-engin
https://www.youtube.com/channel/UCcnkGqfcgB6ZhTy9B1LYRMw
ALSO SEE
Security Industry Specialist Tells All
https://www.spreaker.com/user/9988805/security-industry-specialist-tells-all
https://www.gofundme.com/stop-social-engineering
https://www.spreaker.com/user/9988805/gangstalker-wars-details-of-social-engin
ABOUT GANG STALKING, ELECTRONIC HARASSMENT, MIND CONTROL, HUMAN EXPERIMENTATION,...AMONG OTHER THINGS..
https://www.spreaker.com/user/9988805/gangstalker-wars-details-of-social-engin
https://www.youtube.com/channel/UCcnkGqfcgB6ZhTy9B1LYRMw
ALSO SEE
Security Industry Specialist Tells All
https://www.spreaker.com/user/9988805/security-industry-specialist-tells-all
https://www.gofundme.com/stop-social-engineering
https://www.spreaker.com/user/9988805/gangstalker-wars-details-of-social-engin
ExplicitSecurity Industry Specialist Tells All
ExplicitSecurity Industry Specialist Tells All
ABOUT GANG STALKING, ELECTRONIC HARASSMENT, MIND CONTROL, HUMAN EXPERIMENTATION,...AMONG OTHER THINGS..
https://www.spreaker.com/show/gangstalker-wars
https://www.youtube.com/channel/UCcnkGqfcgB6ZhTy9B1LYRMw
ALSO SEE
Gangstalker Wars: Details of Social Engineering Program Exposed
https://www.spreaker.com/user/9988805/gangstalker-wars-details-of-social-engin
https://www.youtube.com/channel/UCcnkGqfcgB6ZhTy9B1LYRMw
https://www.gofundme.com/stop-social-engineering
https://www.spreaker.com/show/gangstalker-wars
ABOUT GANG STALKING, ELECTRONIC HARASSMENT, MIND CONTROL, HUMAN EXPERIMENTATION,...AMONG OTHER THINGS..
https://www.spreaker.com/show/gangstalker-wars
https://www.youtube.com/channel/UCcnkGqfcgB6ZhTy9B1LYRMw
ALSO SEE
Gangstalker Wars: Details of Social Engineering Program Exposed
https://www.spreaker.com/user/9988805/gangstalker-wars-details-of-social-engin
https://www.youtube.com/channel/UCcnkGqfcgB6ZhTy9B1LYRMw
https://www.gofundme.com/stop-social-engineering
https://www.spreaker.com/show/gangstalker-wars
Monday, August 14, 2017
Mind Control - Induced States of Consciousness - Patent 5356368 Monroe & MKULTRA
Originally shared by Hristilian Petev
https://www.youtube.com/watch?v=7mz02buQyd4&feature=share
https://www.youtube.com/watch?v=7mz02buQyd4&feature=share
NSA Psychotronic warfare with Tesla tech radiofrequency weapons for mind control
Originally shared by Hristilian Petev
https://www.youtube.com/watch?v=Es9UfV2acNk&feature=player_embedded
https://www.youtube.com/watch?v=Es9UfV2acNk&feature=player_embedded
Radio Frequency Mind Control - Detect and Record
Originally shared by Hristilian Petev
https://www.youtube.com/watch?v=Z1NJoUmPo9w&feature=share
https://www.youtube.com/watch?v=Z1NJoUmPo9w&feature=share
Electronic Harassment: How they really do it. And defense methods.
Originally shared by Hristilian Petev
https://www.youtube.com/watch?v=H2AGRtz_cd4&feature=share
https://www.youtube.com/watch?v=H2AGRtz_cd4&feature=share
Thursday, August 10, 2017
Electronic Harassment & Organized Stalking Whistleblower
Electronic Harassment & Organized Stalking Whistleblower
https://www.youtube.com/watch?v=qdqL64rHVB4
https://www.youtube.com/watch?v=qdqL64rHVB4
https://www.youtube.com/watch?v=qdqL64rHVB4
https://www.youtube.com/watch?v=qdqL64rHVB4
Saturday, August 5, 2017
psychotronic weapons | STOP THE INFOWAR AGAINST CIVILIANS!
Originally shared by Irene Silvestri
https://mindcon.wordpress.com/tag/psychotronic-weapons/
https://mindcon.wordpress.com/tag/psychotronic-weapons/
Wednesday, August 2, 2017
MIND CONTROL
Originally shared by mystdolly
MIND CONTROL
"THE INVISIBLE CRIME" by Michael F. BELL
http://www.prlog.org/11926789-brighton-publishing-releases-the-invisible-crime-by-michael-bell-in-print-version.html
MIND CONTROL
"THE INVISIBLE CRIME" by Michael F. BELL
http://www.prlog.org/11926789-brighton-publishing-releases-the-invisible-crime-by-michael-bell-in-print-version.html
The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report
Originally shared by Ortaiηe Ðeviaη
The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report
Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”
By Robert Duncan, A.B., S.M., M.B.A., Ph.D.
04/2015
Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.
This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.
The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.
The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.
This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.
Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.
The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years. Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.
The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.
Numerated Torture Methods for
Interrogation and Behavior Modification
(A comparison between physical and no-touch torture tactics)
1. Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state. Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways. The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.” The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.
2. Memory Erasure
The military and CIA have been researching memory erasing drugs for half a century. The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation. There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do. Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes. The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.
3. Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.
4. Fear and Terror
There are many techniques to induce extreme fear in the target. In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used. Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish. In several of these techniques the target needs to hear their handler’s voice. This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.
5. Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche. Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.
6. Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.
7. Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture mutilation is done by trickery. Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.
8. Personal and Spiritual Defamation
In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?” In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” - in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.
9. Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.
10. Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding. In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.
11. Dietary Manipulation, Forced Weakness and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.
12. Repetition
Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.
13. Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.
14. Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes. Targets of no-touch torture often hear endless tinnitus.
15. Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.
16. Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering. All suffering can be entrained into the minds of no-touch torture subjects.
17. Sleep Deprivation
This is the number one torture method along with the popularity in the press of water boarding. This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.
18. Stress Positions
Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”
We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees. Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.
No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target. Creating hatred of groups through false correlations and deception is a common CIA method of trickery.
In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital. Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.
The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.
Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession. Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation. The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.
Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals. Obviously spoofing email and other identities on internet forums can be used in this manner too.
Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached. Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors. Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.
However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”. It is used in war games to determine how to control your enemies and targets. Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.
One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.
http://www.drrobertduncan.com/dr-robert-duncans-neuropsychological-and-electronic-no-touch-torture-report.html
The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report
Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”
By Robert Duncan, A.B., S.M., M.B.A., Ph.D.
04/2015
Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.
This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.
The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.
The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.
This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.
Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.
The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years. Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.
The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.
Numerated Torture Methods for
Interrogation and Behavior Modification
(A comparison between physical and no-touch torture tactics)
1. Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state. Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways. The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.” The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.
2. Memory Erasure
The military and CIA have been researching memory erasing drugs for half a century. The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation. There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do. Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes. The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.
3. Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.
4. Fear and Terror
There are many techniques to induce extreme fear in the target. In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used. Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish. In several of these techniques the target needs to hear their handler’s voice. This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.
5. Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche. Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.
6. Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.
7. Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture mutilation is done by trickery. Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.
8. Personal and Spiritual Defamation
In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?” In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” - in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.
9. Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.
10. Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding. In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.
11. Dietary Manipulation, Forced Weakness and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.
12. Repetition
Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.
13. Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.
14. Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes. Targets of no-touch torture often hear endless tinnitus.
15. Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.
16. Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering. All suffering can be entrained into the minds of no-touch torture subjects.
17. Sleep Deprivation
This is the number one torture method along with the popularity in the press of water boarding. This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.
18. Stress Positions
Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”
We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees. Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.
No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target. Creating hatred of groups through false correlations and deception is a common CIA method of trickery.
In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital. Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.
The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.
Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession. Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation. The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.
Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals. Obviously spoofing email and other identities on internet forums can be used in this manner too.
Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached. Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors. Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.
However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”. It is used in war games to determine how to control your enemies and targets. Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.
One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.
http://www.drrobertduncan.com/dr-robert-duncans-neuropsychological-and-electronic-no-touch-torture-report.html
Subscribe to:
Posts (Atom)