The True Purpose of Chemtrails

Chemtrails Kill

By Carolyn Williams Palit

“The United States does not torture.” –President George W. Bush
 
We are dealing with Star Wars. It involves the combination of chemtrails for creating an atmosphere that will support electromagnetic waves, ground-based, electromagnetic field oscillators called gyrotrons, and ionospheric heaters. Particulates make directed energy weapons work better. It has to do with “steady state” and particle density for plasma beam propagation.
 
They spray barium powders and let it photo-ionize from the ultraviolet light of the sun. Then, they make an aluminum-plasma generated by “zapping” the metal cations that are in the spray with either electromagnetics from HAARP, the gyrotron system on the ground [Ground Wave Emergency Network], or space-based lasers. The barium makes the aluminum-plasma more particulate dense. This means they can make a denser plasma than they normally could from just ionizing the atmosphere or the air.
 
More density [more particles] means that these particles which are colliding into each other will become more charged because there are more of them present to collide. What are they ultimately trying to do up there — is create charged-particle, plasma beam weapons.
Chemtrails are the medium – GWEN pulse radars, the various HAARPs, and space-based lasers are the method, or more simply:
 
Chemtrails are the medium — directed energy is the method.
 
Spray and Zap.
 
This system appears to be in Russia, Canada, the United States, and all of Europe. Exotic weapons can be mobile, stationary, land-based, aerial, or satellite.
 
It is an offensive and defensive system against EM attacks and missiles. It uses ionospheric particle shells as defense mechanisms [like a bug-zapper shell]* against missiles and EM attacks. That means they spray and then pump up the spray with electromagnetics. When these shells are created using the oscillating, electromagnetic, gyrotron stations, it “excludes” and displaces the background magnetic field. These shells can be layered one above another in a canopy fashion for extra protection from missiles. The chemtrail sprays have various elements in them like carbon which can used to absorb microwaves. Some of these sprays have metal flakes in them that make aerial craft invisible to radar. Spoofer sprays. Sprays like these can be used to create colorful, magnetized plasmas to cloak fighter jets.
 
There are satellite weapons involved. Activists are using meters and are getting readings of microwaves, x-rays, and some other kind of emission that they are not sure of, maybe a low-intensity laser.
 
They are also photographing gas plasma generation due to the heating of chemtrails by electromagnetics. The technical names for vertical and horizontal plasma columns are columnar focal lenses and horizontal drift plasma antennas. Various size of gas plasma orbs are associated with this technology. These orbs can be used as transmitters and receivers because they have great, refractory and optical properties. They also are capable of transmitting digital or analog sound. Barium, in fact, is very refractive — more refractive than glass.
 
What does that mean? Someone or someones are very involved in unconstitutional, domestic spying and the entrained plasma orbs carried on electromagnetic beams can be used for mind control programming. The satellites can be programmed to track and monitor various frequencies on different parts of your body. These electromagnetic beams carrying the gas plasma orbs stick due magnetic polarity and frequency mapping and tracking to people’s eyes, ears, temples, and private parts. A beam with entrained orbs carries pictures in each orb just like the different frames in a movie. It is a particle beam that is also a frequency weapon.
 
The satellites download holographic mind control movies, pictures, sounds, and sensations to people through this technology. The Air Force has stated in “Air Force 2025” that their goal is to develop virtual and augmented reality mind control. Depending on the how the computer is programmed or depending on the mood or intent of the person interfacing with the technology, you can be probed, bothered, gaslighted, frightened, manipulated, electronically raped, or tortured. It scans your brain frequencies and deciphers your thoughts. The satellites track you by mapping your bioenergetic signature [body biometrics] and constantly scanning an area to find you.
 
We are the lab rats for this technology and something is very wrong in the military or intelligence branches somewhere. Because developmental projects in government and military are often so compartmentalized, I suppose someone could be using and developing this technology secretly and without authorization. Then again, behavioral and mind control programs were an authorized policy under MKULTRA. Our country has a history of experimenting on its citizens. We are talking about satellite charged-particle frequency weapons attacking a person 24 hours a day. Psychotronic weapons are considered weapons of mass destruction by the U.N.
 
“HAARPs” can create earthquakes and can also x-ray the earth to find underground military bases, gold, or oil reserves. These ionospheric heaters can also operate as an over-the-horizon or under-the-ocean communications system. This system can control the weather or create disasters. Taken together with the aurora keyhole through-your-roof satellite surveillance system, Echelon electronic computer/phone sweeps, plasma-cloaked DOD Drug War helicopters and stealths, implants, and cameras on the street, it constitutes one, big global and space control grid.
 
These weapons involve beams. Two beams overlapped will couple into a particle-ion beam that will bounce off of a remote target and send a holographic image back to the satellite for remote spying operations. When you cross two strong beams, you can supposedly* create scalar energies. These energies can be used as untraceable weapons for nuclear size explosions or for defense. These crossed-energies can be used to cause a person’s physical electrical system to fail or with a lower frequency, administer a kind of remote electro-shock. Visualize touching a positive and negative electric cable to each other on top of your head. Scalar energies can be utilized in hand-held military guns and on tanks. They can dud-out electronics or cause large, electrical blackouts. Scalar energies are practically impossible to shield against. You need lead, ceramics, and a deep underground facility to not be affected by these weapons. Or, you need to be up and above the field of battle.
 
People who are working on these issues hear tones and hums. If you hear persistent tones and static; have body vibrations, burning sensations, “bangs” to the head, neurological damage, or immune system damage; are hearing electronic voices or hearing the sound of a plasma; suffering from pains deep in your organs or constant headaches; or experiencing other anomalous activity then you may be being targeted by directed energy, mind control weapons. These weapons could be on helicopters, jets, stealth fighters, or on satellites. Directed energy beams and electromagnetic waves can be sent to you via hand-held devices or piggy-backed in on cell phone and satellite towers.
 
Is it possible that someone(s) are very afraid of coming famines and riots due to the ongoing, man-induced failure of the ecological system, and they are saturating the earth with chemtrails for large- scale, gas plasma mind control? Is this the last grasp for the world’s resources? Or, are they just control freaks and money mongers? Someone would like to get to that oil under the melting [due to chemtrail-trapped EM heat] Artic. And, I guess the Third World is not a part of this system. I don’t think that the developed nations are going to let them in on this either.
 
Any country that joins this NATO system will become mind-controlled and diseased due to the associated, intense, oscillating, electromagnetic fields, electromagnetic soup, and the poisonous, toxic chemtrails. Our DNA will break. We risk the earth’s spin and tilt becoming messed up due to mucking around with the magnetic fields through this military technology. Maybe, it is already messed up.
 
It constitutes U.S. global domination via NATO and the erosion of civil rights. According to Charlotte Iserbyt and Al Martin, there are ex-KGB and ex-STASI advising our new Office of Total Information Awareness. They are the ones creating our new internal passports [national ID]. And under “The Treaty on Open Skies,” we have overflights by Russian and German military. Who exactly is flying those plasma-cloaked craft that are seen all over this country and mistaken for UFOs by people who do not know about this aerial deception technology? Obviously, we have another “Project Paperclip” in the making. We can add the new thugs to the 2,000 Iraqi brought into country by Daddy Bush who are now living in Nebraska.
 
The elitist corporate government is going to hold the rest of us hostage with directed energy weapons in space, if the Policy for a New American Century group – PNAC – Bush and cronie think tank has their way, along with directed energy attacks against any country or citizen that they decide they do not like. These weapons can create climate war, weather war, mind war, cyber war, disease war, disaster war, and undetectable war. Taken together they can create economic war.
 
If this system is not stopped, it will kill billions due to aluminum and barium poisoning. It will kill billions due to crop failures and world-wide famine. It will cause heart attacks, strokes, and cancers. It will cause stillbirths, miscarriages, and infertility. The chemtrail sprays often have fungi, bacteria, viruses, dessicated red blood cells, crystalline substances, carbon, metal cations, lithium, other chemicals, heavy metals, and God knows what – probably smart dust, or nanocrap. Years of biowarfare testing on the American public is no big secret anymore. Spraying germs in the sky where they mutate due to the ultra-violet light — brillant plan, my man. Are we acceptable losses or is this by design?
 
I know that many of the major players have big investments in pharmaceutical companies, GM seeds [seeds that can grow in an electromagnetic soup], weapons and directed energy development contracts, oil contracts, genetic research, and mind control research. Some of these people have had a familial history of financial and policy support for population control, eugenics, Hitler, Mao, Stalin, Lenin, Marx, Pinochet, Hussein, and various other dictators. Some of the major players were the masterminds of the death squads in Central and South America. They stand to make a big profit on our death and disease. Just take a look at Rumsfield and Tamiflu.
 
I assume that they know the dangers of this system and that they take care to stay in their shielded, air-filtered offices, homes, bases, and cars. I assume they take chelating substances to remove the barium and aluminum from their bodies and minds. If not, then they really do not understand the far-ranging implications of this destructive system. Congress may not understand just what a terrible weapons system and control grid they are funding.
 
As I understand it, Tesla towers attached to deep-earth, free-energy taps are to be created over the 10-12 magnetic poles and the GWEN system phased-out. Has this already been done? This should allow total control of the earth through giant, Tesla death ray-guns. This natural, electromagnetic earth was not meant to be an un-natural dynamo to power man’s weapons or his utility companies.
 
Over-unity systems [Tesla devices]* are as of yet, another unexplored and probably not understood man-made energy. We should be very suspect of free energy. As we can see, the forms of man-made energy that have been created and used in the past have not been good for this planet. Maybe it is time to reconsider the options available to us through the development of crops for fuel, wind, solar, and water power. We need world-wide, different, more holistic, renewable, energy programs.
 
Is there any good news? Yes. There has been tons of particulate dumping through the spray operations for 8 years over the Americas, Europe, Scandinavia, Eastern Europe, and from what I can find out, over Russia. And, what goes around blows around, right? So, these substances are probably actually global. It sure makes a ton of sense to spray poisonous elements in 24 NATO countries and let the substances be carried around the earth on the jet streams to poison yourself, your enemies, and all neutral and non-combatent countries. Talk about making more enemies.
 
The water, air, and soil of all of these countries is so saturated with metal cations that these weapons freaks should be able to zap and mind f–k each other quite well now and as often as they wish. Once they have clobbered each other with light-saber beams for a few years and razed and scorched sections of the earth, they may start to realize that this foreign policy will lead to a defective human race and a rotten economy.
 
Do you think they will have knocked some sense into each other by then and will decide that non-proliferation and arms reduction is the more civilized and mature direction to take in world affairs? I doubt it, cause only idiots would have developed horrific, planet-killer weapons like these. But, I’ll bet the rest of the planet will finally rise up and tell these juvenile delinquents to quit playing with those rayguns right this second.
 
After further thought on Bearden + — a big over-unity and free energy proponent of Tesla technology that makes energy off of boiling the ionosphere or stealing electricity from the mis-named “vacumn” called Life, I have decided that Bearden is telling us some, if not most, of the truth. Same for Eastlund.

HologramTupac

Sarcasm Break

 

Rihanna’s “Better Have My Money” Promotes the Elite’s Obsession With Torture

As a person who has been targeted with remote weaponry and electromagnetic radiation for many years, I can attest that the cultural obsession with torture is systemic.  The individuals who are behind the controls of the weapons and the computers that control them are psychopaths obsessed with sex, violence and torture.

****************************************************************************************************

leadbetterhaveBy The Vigilant Citizen

Rihanna’s “Better Have My Money” purposely pushes limits and purposely pushes them in a specific direction. The video is a continuation of mass media’s agenda of glorifying death, torture and dehumanization. We’ll look at the twisted messages behind “Better Have My Money”.

Since the launch of Vigilant Citizen in 2008, Rihanna has been a part of the picture. In fact, one of the first articles I ever wrote was about Rihanna’s Umbrella, and nothing has really changed since then. More than 7 years later, Rihanna is still being used to push the occult elite’s agenda … because that’s what industry pawns do. With Better Have my Money, Rihanna truly confirms that popular culture has turned into a depraved, toxic wasteland that purposely exposes young minds to death, murder, and torture. But it is not simply about exposing the youth to these things, it is about glorifying them, making them cool, fashionable, desirable and trendy.

Considering that the occult elite is not ashamed of torturing people for all kinds of purposes (see the horrific revelations of the CIA torture report  and the entire MK Ultra system), it is not surprising that they are looking to sell their love of human misery to the youth. One might say “This has nothing to do with Rihanna, it is just a fun video”. But actually, yes, it does. In Better Have My Money, Rihanna re-enacts actual torture techniques used by psychopathic entities and makes them appear cool. I mean, when you torture people on a yacht while there’s party music in the background, it’s cool, right? Right? Torture is cool? Oh, and sexy, too.

It’s Not Really About Her Money

If you listen to Better Have My Money without being exposed to the video, it is easy to assume that the song is about someone owing Rihanna money that she wants back. If someone has ever owed you money, and tried to weasel their way out of paying you back, you probably relate to the catchy chorus of the song: “B*tch better have my money”.

However, the imagery of the video takes things to a disturbing, psychopathic, sadistic new level. Now it is not simply about Rihanna trying to get her money, it is about Rihanna enjoying torturing and killing people. But, because it’s Rihanna that’s doing it, we’ll rationalize the horrors on screen and say that it’s just her being a “strong, empowered, independent woman”, right? Well, guess what. Even if a woman does it, killing and torturing people is still wrong.

Does watching the video gives you an uneasy, unpleasant feeling in your gut? That’s your instincts subtly telling you that what you are watching is not right. It does not fit with the state of natural balance and harmony your mind attempts to stay in. Watching pain, suffering, dehumanization and death is not “art”, it simply kills the soul.

As it is often the case with mass media, Rihanna’s video synchronizes with a recently released video from another pop star who also took on a bloody, vengeful, and violent persona: Taylor Swift.

Released a few weeks apart, Bad Blood and Better Have My Money feature pop stars in celebrating death and violence while wearing red hair – the color of blood and sacrifice.

Released a few weeks apart, Bad Blood and Better Have My Money feature pop stars in celebrating death and violence while wearing red hair – the color of blood and sacrifice.

The Video

The Better Have My Money video begins with a stereotypical Hollywood wife crossing paths with Rihanna and her mysterious trunk.

Rihanna is about to turn into a psychopatic torturer. But I looove her bohemian-chic style, so it’s OK.

Rihanna is about to turn into a psychopatic torturer. But I looove her bohemian-chic style, so it’s OK.

Rihanna leaves the elevator with the woman inside the trunk and the ordeal begins. Rihanna and her friends do not simply kidnap the woman to get their money back – they take pleasure in torturing her in various ways. In short, they are partaking in the guilty pleasures of the occult elite: dehumanizing, torturing, traumatizing, and, ultimately, murdering people. Yes, that’s what the occult elite does. In real life. Read the news.

First, they strip their victim naked – a classic way of taking away the victim’s dignity and sense of security and to enter the realm of sexual abuse.

betterhave5

They hang her upside down while Rihanna looks really cool. Looove that hat BTW.

“Simply hanging a person upside down for one or two hours will begin to play tricks on the mind. The mind will begin to dissociate, and will begin to reverse the primordial brain functions such as pain is pleasure. The person’s mind rearranges. This is often done with Beta alters or Beta models to get them to think that the pain of sadistic rape is a pleasure. After this reversal in the mind that “PAIN IS LOVE”, the S&M kitten alters will beg their handler to slap them, tie them up, hurt them, etc. They will tease their handler, and tell him he is not a real man if he shows any mercy in how the pain is inflicted. Fire/burning torture is used in the porcelain face programming.”
– Fritz Springmeier, The Illuminati Formula to Create a Mind Control Slave

Rihanna and her friends appear to have gotten the CIA handbook of torture.

Inducing vomiting through motion and/or drugs.

Inducing vomiting through motion and/or drugs.

Rihanna also appear to know about the sick mind games played on Beta Kitten slaves such as “making them pretty to then treat them like whores”.

Rihanna and friends make the victim wear jewelery and makeup. They even add eye-lashes on her blindfold. She is then drugged. This is the kind of stuff MK handlers do to slaves before abuse.

Rihanna and friends make the victim wear jewelery and makeup. They even add eye-lashes on her blindfold. She is then drugged. This is the kind of stuff MK handlers do to slaves before abuse.

Keeping a victim underwater and simulating death by drowning is a particularly traumatic torture technique (see Guantanamo Bay/waterboarding) that often leads to dissociation.

Keeping a victim underwater and simulating death by drowning is a particularly traumatic torture technique (see Guantanamo Bay/waterboarding) that often leads to dissociation.

In the scene above, the victim is kept underwater to hide her from the idiot policeman who is too distracted by the pretty women to notice anything else. When pop stars like Rihanna and Taylor use sex and violence to get what they want, it is often portrayed as a feminist statement. But in mass media, feminism is not about equality, it is about normalizing degradation and violence and calling it empowerment.

After a bunch of shots of Rihanna looking angry and cool, we finally learn why this poor woman is suffering. Because her husband owes Rihanna money. The woman is therefore presumably totally innocent, but is still subjected to the worst kind of abuse. (By other women. So much for feminism!)

Despite his wife’s torture, the husband is not sending Rihanna her money, so she decides to slaughter him like a farm animal. That’s rational.

The man’s living room is covered in plastic sheets because Rihanna is about to hack and slash him in an orgy of unnecessary violence. I’m sure Rihanna’s 12 year-old fans will enjoy this.

The man’s living room is covered in plastic sheets because Rihanna is about to hack and slash him in an orgy of unnecessary violence. I’m sure Rihanna’s 12 year-old fans will enjoy this.

In a quick shot, we see his hand cut off.

In a quick shot, we see his hand cut off.

Doing all of these horrific things was apparently worth it because Rihanna got her money. Good. We were all very worried about Rihanna’s money. While young viewers will conclude that “Rihanna is such a bad-ass”, the final scene of the video reveals her true state.

Rihanna lays in the trunk where the torture victim was previously placed.

Rihanna lays in the trunk where the torture victim was previously placed.

Not unlike the torture victim, Rihanna is inside the chest, naked and drugged. It is a symbolic way of stating that Rihanna is actually not a cool, renegade bad-ass, but is a victim herself. She is a product of the Beta Kitten industry, she has literally blood on her hands, but there is some money thrown on her to keep her in line. In other words, she is no different than the woman who got kidnapped, tortured and exploited to get money. By portraying a sadistic killer over club music, she is being used and manipulated by the industry to advance its Agenda. She is not “empowered”, nor is she in control of anything. She never was.

The last image of the video, after the song is over, shows Rihanna’s face dripping with blood over unsettling sounds.

The last image of the video, after the song is over, shows Rihanna’s face dripping with blood over unsettling sounds.

The blood on Rihanna’s face recalls the extreme violence of the murder she committed and reminds us of the real point of the video. This was never about getting paid. This is about using Rihanna to sell the elite’s culture of death and dehumanization, while negating human dignity, self-respect, and everything that is positive about humanity.

In Conclusion

There is no hidden message in Better Have My Money. Everything is in your face, like the blood dripping down Rihanna’s face. The video still manages to deceive viewers by rationalizing horror because “the guy was a jerk and he deserved it”. No, he didn’t.

However, the sickness goes deeper than this. This video is about the elite’s obsession with pain and torture. Whether you are looking at the treatment of war prisoners and MK slaves, or at the underground rings selling selling snuff torture, those “above the law” have legitimized the torture of those that are “beneath” them. Not only is it used as a tool to obtain what they want, but their inverted mindstate “gets off” on it. Better Have My Money celebrates this mindstate under the guise of being “edgy”.

What does this say about us and our culture? Why does “pushing the limits” in popular culture always go in a debasing and dehumanizing direction, but rarely in the opposite direction, toward beauty, creativity, and innovation? Because those who control the world economy and mass media do not want human minds to expand and be inspired. They want the opposite. They want closed, cloudy minds obsessed with unhealthy and destructive ideas and images. Minds they can control.

Rihanna is a tool to accomplish this. She doesn’t really have a say in any of it. She didn’t even write the song. She is simply doing what her bosses tell her to do. And, when all is said and done, they will tell her: “B*tch better have my money”.

Source:  http://vigilantcitizen.com

Resources:  https://gangstalkingsurfers.wordpress.com/2015/03/30/summary-of-no-touch-torture-techniques-in-use-to-target-innocent-americans-by-dr-robert-duncan/

Gang Stalking is Pervasive……How to Survive

More
Stuter
Articles:

For several days in a row, when doing errands in your car, you consistently come in contact with drivers who tailgate you, cut you off in traffic, or maybe pull out in front of you unexpectedly. Or you go out to get your mail and see someone sitting on a bicycle watching you from a distance. Or maybe you notice a sudden increase in strange cars driving slowly pass your home. Or you get the feeling you are being followed but don’t see anyone there. Or you find garbage strewn on your lawn or piles of dirt where dirt shouldn’t be. Or you return to your home and notice that pictures or knickknacks aren’t where they were when you left.

Is this all just coincidental or is there something more to it? You might even wonder if you just have an over-active imagination or if maybe you’ve slipped a few cogs upstairs.

Over the past ten years, a phenomenon has become apparent that more recently has been given a name:—gang-stalking, also known as group-stalking, vigilante-stalking and predatory gang-stalking.

Over a period of time gang-stalking has produced some commonalities among those targeted or victimized:

1. The target is likely seen as a threat to a cause;

2. The target most likely does not know the perpetrators of the gang stalking;

3. Those involved in the gang-stalking do not know the target;

4. Those involved in the gang-stalking do not necessarily know why they are gang-stalking an individual;

5. The stalking is subtle but targeted and can be seen as inconsequential or everyday such as …

a. drive-by honking of horns,
b. drive-by yelling of obscenities,
c. hand gestures generally considered to be hostile in nature;
d. vehicles stopping and standing on the street in front of the target’s home;
e. trash strewn on the target’s lawn, driveway and property in such manner as to make it obvious that it was a deliberate act;
f. shining lights in the windows of the target’s home;
g. an increase in noise in the area of the target’s home;
h. tailgating the target then dropping back repeatedly;
i. sending the target messages that let the target know they are being watched such as…

i. the names of family pets;
ii. the names of children;
iii. stores visited frequently;
iv. schools the children attend;

j. day-in and day-out hang-up calls or wrong number calls;
k. vandalism to the home or property of the target;
l. graffiti in proximity to the target’s home;

6. The gang-stalking takes place over a period of time or number of years;

7. The faces of those involved in gang-stalking change frequently but the perpetrators often remain constant.

The intent of gang-stalking is to …

1. Render the target, the victim, psychologically demoralized even to the point of committing suicide;

2. Make the target appear, to the larger community, to be mentally unstable for the purposes of … a. discrediting and psychologically demoralizing the target; b. ensuring no one will believe the target when they claim they are being targeted;

3. Alienate and marginalize the target from the larger community, even family, making it easier to psychologically demoralize and discredit the target.

The number of reported incidences of gang-stalking has increased measurably since the early 1990s when the transformation of American society to systems philosophy began in earnest.

Gang-stalking holds no political association with those targeted covering the political spectrum of liberal, centrist, conservative, ultra-left and ultra-right. People involved in gang-stalking display a common trait of needing to feel that they have power over the target even though they may not know that person.

Group dynamics, how individuals interact in a group, a general need of an individual for human contact and interaction, plays a key role in the structure of gang-stalking.

One high-ranking law enforcement official, on the condition of anonymity, has stated that

1. Law enforcement is under strict orders that they are to ignore all cases of gang-stalking, and if possible to provide evidence that the victim is criminally insane; and

2. The criminal justice system is strictly under the control of a small elite who ensure that no charges are pressed against the instigators of gang-stalking.

Gang-stalking relies heavily on …

1. The target becoming so psychologically demoralized that he/she believes there must be something wrong with him/her and is, therefore, afraid to say anything for fear others will think them crazy;

2. The target will have no evidence beyond his/her word that the gang-stalking is happening;

3. The target will have no detailed records or documentation showing what, when, where, and to what extent;

4. The target will not be able to find out who the perpetrators are or those involved in the gang-stalking.

Anyone who believes they are being gang-stalked should …

1. Keep detailed records and documentation of times, dates, and details; making those records as soon as the incident is apparent so details are not lost over time.

2. Take pictures of any evidence left by the perpetrators making sure to include a point of reference in the picture for identification purposes. For instance, if trash is strewn on the lawn, take close ups but then take pictures showing the house, garage, or even a car in the picture as a point of reference that the garbage was actually where you claim it was.

3. Keep detailed records of any interaction with law enforcement; even when law enforcement are friendly and appear to be empathetic. Keep track of who the responding officer is, what department he works for, what he tells you, what he does. If he removes evidence from the scene, note how he handles it, what he does with it. Know the procedures for preserving evidence and observe if the officer follows those procedures. Write it all down so details aren’t lost over time. Ask for an event number and incident number.

4. If you believe you are being gang-stalked, get a psychological evaluation immediately. This establishes that you are mentally stable when those involved and law enforcement try to intone that you are somehow mentally deranged.

5. If you believe you are being gang-stalked, don’t be afraid to speak up. There was a time when people being stalked were not listened to, were considered to be off in the head. Now stalking someone is a crime. The more who speak up, the better chance there is that gang-stalking will not continue to operate under the radar.

By Lynn Stuter

TwinTowerBillofRights

Bilderberg 2015: Huxley’s Brave New World and Ultimate Revolution on Steroids

Bilderberg 2015:  Implantation of the A.I. Grid as delineated in Aldous Huxley’s elitest dystopian novel, Brave New World.  If you have never listened to Aldous Huxley’s 1963 Berkeley speech titled, The Ultimate Revolution, it is an expose’ on how to control and socially engineer the human race.  The use of Artificial Intelligence, nanotechnology and the covert and clandestine weaponization of the electromagnetic spectrum to change our DNA and control our minds and bodies, create disease, and historically unparalleled torture.

Regina's All-Seeing Eye.

Regina’s All Seeing Eye

The plan to integrate nations into continental trading blocs is not a new idea.  In Dr. Carroll Quigley’s Tragedy and Hope, reference is made to the plan of the Third Reich to create global trading blocs, which itself is an older British Royal Society plan.  Daniel Estulin, in his The Bilderberg Group and Shadow Masters provides detailed investigations into both Bilderberg and its many-headed Hydra organization, exemplified in Captain America 2: Winter Soldier.  Founded by Prince Bernhard of the Netherlands, as well as numerous other Atlanticist elites like David Rockefeller, Paul Van Zeeland and numerous other media barons, corporate heads, bankers, and countless other people better than us.  This year’s meeting is scheduled for this week, June 11-14th in Telfs-Buchen, Austria.

Bilderberg, operating under the guise of “free market capitalism,” represents instead the complete culmination of banking corporate world control.  Presented as yet another debate forum, the secretive meetings instead have been revealed in numerous cases to have driven global policy.  The most shining example is the 1955 Bilderberg meeting’s plans for the creation of the “European Common Market” and “European Union (Unity) shown below.  It is important to recall that the European Common Market came into play some three years later in 1958, while the European Union itself was supposedly founded in 1993.  With this in mind, we can see how the TTIP is simply a further extension of the same strategy of economic integration, from the EU to NAFTA.

1955 Bilderberg document highlighting the coming European Union.

1955 Bilderberg document highlighting the coming European Union reproduced in Estulin’s Shadow Masters.

In other words, what the banksters planned in secret in 1955 was made public in 1993, having been implemented in gradual, incremental stages.  Indeed, it was the post-World War II era that created all these entities – the U.N., Bretton Woods and the IMF and World Bank, etc.  All of these entities, including Bilderberg, are part of the same power structure that coordinated the last century’s wars for the sole purpose of a world government, all of which is spelled out in Quigley’s CFR archives-based tome, Tragedy and Hope.  Thus, while the populations still think their national governments are at war with other nation-states and market economies are driving economic surplus, the reality is that most nation-states are subsidiaries of the Atlanticist power bloc whose sights are set on the dismantling of Russia, as Estulin’s Shadow Masters details.

Like last year’s Bilderberg meeting, the whispers are this year will discuss the implementation and rollout of artificial intelligence.  2015 has seen a tremendous push for the acceptance of automation, from robots in the workplace, to driverless cars, to implantable microchips.  Transhumanism is now a buzzword, and we in the alternative media community have been vindicated countless times in calling attention to the unified agenda of selling the masses on the acceptance of the new religious ideology.  JaysAnalysis has highlighted this takeover plan from older Pentagon documents, as well as its selling point in countless Hollywood blockbusters (and here).

This year, former DARPA head turned Google exec, Regina Dugan will be speaking, vindicating JaysAnalysis’ identifying Dugan as a key player to watch back in 2012.  In 2013, Dugan gave a talk telling the audience the future of the microchip will be an ingestible form, as well as tattooed RFID tracking.  Dugan’s Ted Talks and lectures detailed the technological side of the pyramid’s plans for rolling out the “Smart” drones, and when read in convert with IBM CEO Ginny Rommety’s lectures on SmartCities and “pre-crime,” we can see the unified plan of the technocrats.  Detailing hundreds of similar examples, what is most difficult to convey is the unified nature of the overall plan, from economic “reform” and “free market shock therapy austerity,” to the implementation of the Smart grid/A.I. takeover, to the bio-chemical dysgenics operations, the Atlanticist plans are unified, strategic, and full-spectrum.  They cover the entire domain of human experience, as well as the entire biosphere.  The transition to SmartCities is the ultimate goal of the Green/Agenda 21 plan, as the below UK think tank Forum for the Future propaganda video demonstrates:

All of this arrives on the heels of Jenner’s trans-formation into a “woman,” despite the obvious absurdity of this idea given male and female chromosomes, as well as Ray Kurzweil’s claim that by 2030, humans will be cyborg hybrids.  Kurzweil stated:

Kurzweil predicts that humans will become hybrids in the 2030s. That means our brains will be able to connect directly to the cloud, where there will be thousands of computers, and those computers will augment our existing intelligence. He said the brain will connect via nanobots — tiny robots made from DNA strands.  “Our thinking then will be a hybrid of biological and non-biological thinking,” he said. The bigger and more complex the cloud, the more advanced our thinking. By the time we get to the late 2030s or the early 2040s, Kurzweil believes our thinking will be predominately non-biological.  We’ll also be able to fully back up our brains.  “We’re going to gradually merge and enhance ourselves,” he said. “In my view, that’s the nature of being human — we transcend our limitations.”

The over-arching plan is the complete trans-cending of limitations, be they law, gender, nature, time and space.  However, while this unified agenda has all the weight of the Fortune 100 and transnational banksters behind it, the Gospel of the transhumanists has one big problem – as long as humans are a finite mind with a limited point of focus in the psyche, there will always be limitations.  Man’s promethean desire to overcome limitations through alchemical techno means is all predicated on naturalism, and naturalism isn’t true.  Transhumanist “immortality” is a deception that, even as life extension (an actual, positive goal) becomes more advanced, will not be offered to the masses.  The same people meeting at Bilderberg desiring immortality are the same people behind mass dysgenics, global drug running and the rigging of global markets.  Why would you trust liars to give you eternal life?  Truly people will believe anything.

The unified plan is also outlined in one of its architect’s most famous dystopian novels, Aldous Huxley’s Brave New World.  In his 1932 work, the future envisioned is entirely under technocratic control, where breeding is controlled by the state through cloning, sterilization, and the abolition of monogamy, property history, tradition and culture.  Huxley’s famous Berkeley speech outlines the strategy – the very thing Bilderberg desires to implement, and even describes mass mind control, brainwashing, and the mass pharmacological neutering of the future genderless Morlock masses.  Huxley referred to it as the “final revolution” – the revolution against man himself. It is a unified plan.

Free download of Aldous Huxley’s book,  Brave New WorldBraveNewWorld book PDF

By Jay Dyer  http://jaysanalysis.com/2015/06/08/bilderberg-2015-implementation-of-the-a-i-grid/

Bilderberg 2015 attendees:   http://www.bilderbergmeetings.org/participants2015.html
https://gangstalkingsurfers.wordpress.com/2013/02/21/transhumanism-eugenics-elite-bloodlines/
https://gangstalkingsurfers.wordpress.com/2014/03/15/controlling-the-minds-of-the-masses-how-it-is-done-and-why/  
H.G. Wells, Wikipedia and the World Brain Matrix
The Tavistock Agenda (Video)
Your Future Meed Your Neighbor a Transhumanist Frankenstein
The Secret Covenant of the Powers That Control the World
https://gangstalkingsurfers.wordpress.com/2015/04/09/protocols-of-the-learned-elders-of-zion-%E2%80%A2-a-k-a-%E2%80%A2-rothschilds-25-point-plan-for-world-domination/
 
And for the historical underpinnings of mind control and social engineering, please see these exhaustive articles:
Tavistock Institute, Agenda 21, Social Engineering & Global Mind Control
Mass Psychology–The Re-Evolution Will Be Internalized

The New Phoenix Program–Film on the Use of Microwave & Slow Kill Weapons on U.S. Citizens

CointelPro type operations are presently being incorporated into the development of microwave weapons. INSCOM is perfecting nonlethal microwave weapons and at the same time neutralizing potential enemies by enfolding all the previous illegal government operations into one program as a force multiplier. The legacy of half a million US citizens used as human guinea pigs in nuclear, biological, and chemical weapons experiments during the Cold War as well as CointelPro and MKULTRA crimes against humanity lives on today. Dissidents that in the past were visibly attacked or assassinated in a traditional manner are now targeted for elimination using electromagnetic weapons. The targets of nonlethal microwave weapons fit a common profile similar to the targets of previous illegal government programs. People with a history of political activism or whistleblowers are used as human guinea pigs and experimental subjects in terminal experiments that are designed to force suicide, incarceration, or premature death due to the effects of non-ionizing radiation. These political assassinations are accomplished with technology that often leaves no obvious injuries. The theme of forced suicide has remained constant. What is different is that driving a target to suicide using microwave weapons is perfectly deniable because these individuals are tormented invisibly. The intelligence agencies have achieved perfect deniability for their crimes.

Film about microwave weapons war crimes and crimes against humanity. The victims tell their story of being tortured mercilessly with state of the art anti-personnel weapons.

Neuropsychological & Electronic No-Touch Torture Report by Dr. Robert Duncan (used on targeted citizens here in the U.S.)

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report


                  Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”     

http://fas.org/sgp/crs/intel/R43906.pdf                                                                                                                          http://incf.org/gsoc/2015/proposals/#—-nbsp–span-id–docs-internal-guid-f—c-e—e-b-f-e———f—ab-f—–span-power-arm-support-for-the-cyme-library-span—span 

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings.  Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

1.       Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

2.       Memory Erasure
The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

3.       Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

4.       Fear and Terror
There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques the target needs to hear their handler’s voice.  This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

5.       Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

6.       Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

7.       Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

8.       Personal and Spiritual Defamation
In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

9.       Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

10.     Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

11.     Dietary Manipulation, Forced Weakness and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

12.     Repetition
Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind.  During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

13.     Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies.  In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject.  Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

14.     Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

15.     Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

16.     Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering.  All suffering can be entrained into the minds of no-touch torture subjects.

17.     Sleep Deprivation
This is the number one torture method along with the popularity in the press of water boarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

18.     Stress Positions
Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.  Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.  Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.

http://projectsoulcatcher.blogspot.com/2015/03/summary-of-no-touch-torture-techniques.htmlhttp://www.drrobertduncan.com/dr-robert-duncans-neuropsychological-and-electronic-no-touch-torture-report.html

Partial Project Summary History

Project Descriptions

Technologies and Skills

Signal/Image Processing and Pattern Recognition

 
Tank image recognition from satellites 3-D stereoscopic extraction algorithms
Submarine signature recognition from acoustic underwater phased arrays Expert Bayesian system, parameter tuning, phased array signal processing correlogram
Stock market statistical arbitrage Creating models based on financial fluid flow dynamics and correlations of stock prices. Forecasting (Tuck).
Credit card fraud pattern recognition. Spending pattern irregularities alerts
Sound triangulation/sniper system Asymmetric phased arrays and reflection calibration algorithms

Biometric Recognition Systems

 
Face, finger print, retinal, voice and infra-red vascular recognition Feature extraction, registration algorithms, noise removal, large dataset management. Eigenvectors, wavelets, 3-D convolutions, cluster analysis.
Eye gaze tracker Real time image processing. Head rotation modeling.
Truth detection systems Automating polygraph parameter sensors and voice stress. Emotional context modeling through vocabulary templates.
Gesture recognition Hand gestures conversion to computer commands.
Brain Print Recognition Utilizing many samples, human brains have a unique MEG/EEG brain “hum” and cluster analysis can be done to recognize mental illnesses and uniqueness of individuals. (Lockheed Martin is doing research on recognition of precognitive signals of objects. Berkley also just released a paper showing how to discriminate between 1024 visual objects.)

Supercomputing Applications

 
Various projects including FFT optimization Vector Pipeline, BBN Butterfly, Hypercube, Viking Boards
Artificial life simulations, gas lattices Specialized Hardware, genetic and evolutionary algorithms.
Grid computing BEA and Oracle distributed grid computing
Computer generated holography 3-D spatial FFT on BBN’s connection machine. C-paris parallel programming language. Fortran 77.

Speech Recognition/Identification

 
Voice recognition/identification BBN Hark’s system.Markov modeling, n-grams, context probability models, speaker independent models
Models of discourse and planning Studied under world renown Barbara Grosz, graduate school adviser Harvard
Natural Language parsing and AI knowledge networks CIA project. Focused on pronoun reference algorithms.

Biomedical Projects

 
Soldier 2000 project Connecting vital sensors to a wireless bodyLan, DARPA.
Robotic Surgery in Medicine for the Army Hepatic feedback, latency time compensation, tremor filtering, object touch recognition
Virtual Reality in Medicine Overlays of fMRI scans onto patient for real time surgical applications
Virtual Reality 3-D Reconstruction Teleconferencing Carnegie Mellon University. 3-D reconstruction of objects in the teleconference room.
EEG controlled robots Relatively simplistic mental state recognition to control direction of robot. Discriminant function analysis.
Neural network controller for “INFANT” robot Designing robot controllers to learn to grasp objects that mimic human babies. Mentor: Dr. Kuperstein (MIT)
Retraining the brain to interpret tactile feedback as visual information Braille interfacing also used by Navy for Sonar feedback on tongue tactile vision systems.
Research / simulations in cybernetic hive mind work groups (BBN) Increasing the hypothetical efficiency of integrated rapid communication technologies.
Neural network control system for leg muscle stimulation to make paralyzed people walk again Engineering of exoskeleton. Control systems for non-linear biological models due to muscle fatigue.

Digital Circuit/Systems Design

 
Cascadable digital neural network chip VLSI design, production, testing
Wearable ubiquitous computing systems Enhanced reality, enhanced cognition. Heads up display borrowed from NASA for entrepreneurial venture.

DARPA Scientist Dr. Robert Duncan Interview, 2/28/15–How to Create a “Super Spy”, No-Touch Torture & Trauma-Based Conditioning Programs

Dr. Duncan talks in detail about the technology being used in no-touch torture programs.  He explains more in this video than any other that I’ve seen.  He claims that the technology is being developed to be used on the overall population.

By Steve DiBasio

Robert Duncan is a scientist with multiple degrees from Dartmouth College and Harvard University in Applied Sciences (e.g., artificial intelligence, pattern recognition and robotics) and Business. He has worked on projects for the CIA, Department of Defense, and Department of Justice. In 2004 he testified before the Senate Intelligence Committee, Judiciary Committee, and 23 members of Congress regarding non-consensual experimentation on American citizens.

In 2010 he authored, in partnership with an anonymous consortium of scientists calling themselves the “Mind Hacking Strategy Group,” a book entitled Project: Soul Catcher, Secrets of Cyber and Cybernetic Warfare Revealed.  He has appeared on the radio show Coast To Coast and was interviewed by Jesse Ventura for the “Brain Invaders” episode of the television program Conspiracy Theory. [1]

I cited Duncan’s work in an article I wrote for Veterans Today and Nexus Magazine called “Mind Control In The 21st Century” (Part I and Part II). Recently I had the opportunity to speak with him.

In the interview posted below we discuss, among other topics, remote “mind reading,” CIA hive mind experimentation (multiple people sharing the same mental “space”), how people can be targeted and tracked remotely via their energy signature or “brain print,” the existence and use of a technology for remotely “cloning” or “copying” thoughts, emotions and other states (including intense pain) onto a target, [2] and how a weapons system capable of totalitarian control has been developed (with non-consensual and often-times brutal experimentation on civilians ongoing).

Duncan also reveals that many people are now in wireless mental contact with artificial intelligence run on supercomputers.

It is worth noting that current research projects, according to Duncan, have targeted people from all walks of life, not merely (or mainly) the “downtrodden,” as was done in the past.

Some of these targets are threatened with harm to themselves or family members if they do not carry out the instructions of their “handler,” or are promised release from their tortures if they perform some action. [3]

For example, Myron May, the Florida State University shooter, a former assistant district attorney, posted on Facebook before the shooting:

Has anyone been asked to kill promise of freedom

Duncan, who has interviewed many targets, has said that he immediately recognized the “torture script” used on May after listening to a recording in which May discusses his ordeal.

Perhaps most frightening is Duncan’s contention that the scalability of this technology is being tested: “…[A] lot of people won’t believe me and that’s fine. But they’re increasing this. They are scaling this technology to the entire population.

[1] A partial summary history of his work (classification prevents full disclosure) includes: Tank recognition from satellites, submarine signature recognition from acoustic underwater phased arrays, stock market statistical arbitrage, voice and vascular signature recognition, truth detection systems, robotic surgery in medicine, EEG controlled robots, and “brain print” recognition.

[2] The technology is called “EEG Cloning” or “EEG Heterodyning.” The brain patterns (electromagnetic signals) “cloned” onto the target may be catalogued brain patterns stored in computers, though live signals from a “real person’s” brain could also be transmitted to the target.

[3] The handler communicates with the target through a technology for transmitting voices into people’s heads which goes by many names, including “voice to skull,” synthetic telepathy,” “microwave hearing,” and the “Frey effect.” The communication may also be accomplished via EEG heterodyning, which involves “re-mapping the auditory cortex of the human brain.”  Other technologies for transmitting voices include “ultrasonic heterodyning” and bone conduction techniques.

http://www.veteranstoday.com/2015/03/01/its-the-ultimate-weapon/

See also:                                                                                                                                   https://gangstalkingsurfers.wordpress.com/2015/02/13/cia-engineer-dr-robert-duncan-targeted-individual-tyrone-dew-explain-directed-energy-weapons-mind-control-used-on-aaron-alexis-myron-may/

https://gangstalkingsurfers.wordpress.com/2015/02/12/cia-engineer-dr-robert-duncan-on-wheel-of-freedom-show-2915-the-psychology-of-torture-targeted-individualstechnical-methods-tactics/

https://gangstalkingsurfers.wordpress.com/2014/02/23/deborah-tavares-dr-robert-duncan-dr-john-hall-dr-terry-andersen-t-i-friends-the-pete-santilli-radio-show-22214/

CIA Engineer Dr. Robert Duncan & Targeted Individual Tyrone Dew Explain Directed Energy Weapons & Mind Control Used on Aaron Alexis & Myron May


Dr. Robert Duncan’s books:                                                                                                                                                   Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed
How to Tame a Demon: A short practical guide to organized intimidation stalking, electronic torture, and mind control

Tyrone Dew’s book:
Illuminati Got Me!  Satellite Directed Energy Weaponry Terrorism

Magnus Olsson on The Pete Santilli Show, Feb. 6, 2015–Artificial Intelligence, HAARP, Chemtrails, Satellites & Computers to Enlave Us

In this episode of  The Pete Santilli Show:

Pete is joined by first time guest Magnus Olsson expert on mind control and covert harassment.  Magnus Olsson is of Swedish nationality. He studied economics at the Cesar Ritz in Switzerland, American University of Paris and Harvard, Boston, USA, during the years 1988-1992.  In 1994 he started the company Jon Sandman Enterprises that became a well known brand in the bedding industry.  Magnus wasn’t just an outgoing successful businessman.  His personal life was as fulfilling.  He was married with a wonderful woman with whom he has two children.

In the spring of 2005 Magnus visited St. George (Carpio) Hospital where he was sedated.  Soon thereafter his life’s circumstances changed forever.  He entered what he calls a shocking “Science Fiction-drama”.  He entered ” into a world where violence and torture was the norm”.  The shock consisted not only in the fact that he had been implanted and transformed into a victim of non-consensual experimentation associated with a Swedish hospital.  He soon realized that there wasn’t anywhere to go; no one to speak with; there wasn’t any help for this type of crime.  On his own, he had to learn to cope with a life of constant torture around the clock.

Two years later, Magnus begun researching what he now was a victim of. First he went to the Royal Institute of Technology where he spoke with several people. Thereafter, at an international Alba-Nova conference, he realized that there was an ongoing research in connecting biological systems to computers. Research on the Internet helped him to learn more about the subject but he also got in touch with hundreds of other victims online. He realized that this problem was global. He also developed several webpages about the technology used, involving all sides of it in order to inform and warn others.
Read Magnus’ full Bio and personal experience at http://Mindcontrol.se.com

– See more at: http://guerillamedianetwork.com/pete-santilli-episode-902-magnus-olsson-exposes-remote-mind-control-monitoring/#sthash.URTo21tr.dpuf

http://wp.me/p30jla-esn

CIA Engineer Dr. Robert Duncan on “Wheel of Freedom Show”, 2/9/15–The Psychology of Torture–Targeted Individuals/Technical Methods & Tactics

Dr. Robert Duncan has worked for DARPA, the CIA and the Departments of Defense and Justice as an engineer on torture and surveillance technologies.