The Population Council–Rockefeller Eugenics Organization Used to Covertly Undermine Traditional Values

Population-Council-in-Egypt-to-participate-in-the-SAHWA-Youth-SurveyThe Population Council is an international, nonprofit, non-governmental organization. The Council conducts biomedical, social science, and public health research and helps build research capacities in developing countries.[1][2] One-third of its research relates to HIV and AIDS; its other major program areas are reproductive health and poverty, youth, and gender.[citation needed] It held the license for Norplant contraceptive implant, and now holds the license for Mirena intrauterine system. The Population Council also publishes the journals Population and Development Review, which reports scientific research on the interrelationships between population and socioeconomic development and provides a forum for discussion of related issues of public policy, and Studies in Family Planning, which focuses on public health, social science, and biomedical research on sexual and reproductive health, fertility, and family planning.

The Organization

Established in 1952 by John D. Rockefeller III, with important funding from the Rockefeller Brothers Fund, the Council is governed by an international board of trustees. The 2006 board includes leaders in biomedicine, business, economic development, government, health, international finance, the media, philanthropy, and social science.

Headquartered in New York, the Population Council has 18 offices in Africa, Asia, and Latin America and does work in more than 60 countries. With an annual budget of around $74 million, it employs more than 500 people from 33 countries with expertise in a wide array of scientific disciplines. Roughly 55 percent are based outside the United States.

The Council has its roots in the discredited eugenics movement. The first president of the Council was a eugenicist appointed by Rockefeller; Frederick Osborn, author of Preface to Eugenics (New York, 1940), leader of the American Eugenics Society, and one of the founding members of the Pioneer Fund. Osborn was vice president or president of the Population Council until 1959. In 1968 he wrote, “Eugenic goals are most likely to be achieved under another name than eugenics.”[3]

The Population Council's 1969 Memorandum showing the coming mass promotion of homosexuality and feminism are merely aspects of the planned total enslavement in a literal Brave New World sense - to make sure you don't go into the future through offspring.

The Population Council’s 1969 Memorandum showing the coming mass promotion of homosexuality and feminism as aspects of the planned total enslavement through population control creating a Brave New World through offspring management.

Reproductive Health

The Council conducts biomedical research to develop contraceptives and social science research to better understand the factors influencing access to and decision-making around contraceptives.[4] Its fundamental research on reproductive and immunological processes serves not only as the basis for the development of new contraceptive methods to meet the needs of both women and men, but also for new hormone therapies and AIDS-prevention products.[citation needed]

In the 1960s, the Council played a key role in documenting the large numbers of people in poor countries who lacked access to contraceptives and in conducting research to design and evaluate public family planning programs.[citation needed] At the same time, the Council’s biomedical researchers worked to develop new contraceptive methods, such as the intrauterine device.

Some contraceptives available in some countries today were developed by the Population Council: the Copper T IUD, Norplant, Jadelle (Norplant II), and Mirena. More than 50 million Copper T IUDs have been distributed in over 70 countries. Norplant was replaced by Jadelle.

The British medical journal Lancet said of the Population Council, “Most non-governmental organisations claim to promote change for the better; the Population Council actually has hard evidence of having changed the lives and expectations of hundreds of millions of people.”[5]

 

Source:  Wikipedia: Population Council

 

References

(1) Media Center | Key Facts
(2) About the Council
(3) Betsy Hartmann (2006). “Everyday Eugenics”. Zmag. Retrieved 2015-02-15
(4) The Lancet. (Vol. 361, June 7, 2003, review)
(5) David Rockefeller, New York: Random House, 2002

Website

http://www.popcouncil.org

Gang Stalking is Pervasive……How to Survive

More
Stuter
Articles:

For several days in a row, when doing errands in your car, you consistently come in contact with drivers who tailgate you, cut you off in traffic, or maybe pull out in front of you unexpectedly. Or you go out to get your mail and see someone sitting on a bicycle watching you from a distance. Or maybe you notice a sudden increase in strange cars driving slowly pass your home. Or you get the feeling you are being followed but don’t see anyone there. Or you find garbage strewn on your lawn or piles of dirt where dirt shouldn’t be. Or you return to your home and notice that pictures or knickknacks aren’t where they were when you left.

Is this all just coincidental or is there something more to it? You might even wonder if you just have an over-active imagination or if maybe you’ve slipped a few cogs upstairs.

Over the past ten years, a phenomenon has become apparent that more recently has been given a name:—gang-stalking, also known as group-stalking, vigilante-stalking and predatory gang-stalking.

Over a period of time gang-stalking has produced some commonalities among those targeted or victimized:

1. The target is likely seen as a threat to a cause;

2. The target most likely does not know the perpetrators of the gang stalking;

3. Those involved in the gang-stalking do not know the target;

4. Those involved in the gang-stalking do not necessarily know why they are gang-stalking an individual;

5. The stalking is subtle but targeted and can be seen as inconsequential or everyday such as …

a. drive-by honking of horns,
b. drive-by yelling of obscenities,
c. hand gestures generally considered to be hostile in nature;
d. vehicles stopping and standing on the street in front of the target’s home;
e. trash strewn on the target’s lawn, driveway and property in such manner as to make it obvious that it was a deliberate act;
f. shining lights in the windows of the target’s home;
g. an increase in noise in the area of the target’s home;
h. tailgating the target then dropping back repeatedly;
i. sending the target messages that let the target know they are being watched such as…

i. the names of family pets;
ii. the names of children;
iii. stores visited frequently;
iv. schools the children attend;

j. day-in and day-out hang-up calls or wrong number calls;
k. vandalism to the home or property of the target;
l. graffiti in proximity to the target’s home;

6. The gang-stalking takes place over a period of time or number of years;

7. The faces of those involved in gang-stalking change frequently but the perpetrators often remain constant.

The intent of gang-stalking is to …

1. Render the target, the victim, psychologically demoralized even to the point of committing suicide;

2. Make the target appear, to the larger community, to be mentally unstable for the purposes of … a. discrediting and psychologically demoralizing the target; b. ensuring no one will believe the target when they claim they are being targeted;

3. Alienate and marginalize the target from the larger community, even family, making it easier to psychologically demoralize and discredit the target.

The number of reported incidences of gang-stalking has increased measurably since the early 1990s when the transformation of American society to systems philosophy began in earnest.

Gang-stalking holds no political association with those targeted covering the political spectrum of liberal, centrist, conservative, ultra-left and ultra-right. People involved in gang-stalking display a common trait of needing to feel that they have power over the target even though they may not know that person.

Group dynamics, how individuals interact in a group, a general need of an individual for human contact and interaction, plays a key role in the structure of gang-stalking.

One high-ranking law enforcement official, on the condition of anonymity, has stated that

1. Law enforcement is under strict orders that they are to ignore all cases of gang-stalking, and if possible to provide evidence that the victim is criminally insane; and

2. The criminal justice system is strictly under the control of a small elite who ensure that no charges are pressed against the instigators of gang-stalking.

Gang-stalking relies heavily on …

1. The target becoming so psychologically demoralized that he/she believes there must be something wrong with him/her and is, therefore, afraid to say anything for fear others will think them crazy;

2. The target will have no evidence beyond his/her word that the gang-stalking is happening;

3. The target will have no detailed records or documentation showing what, when, where, and to what extent;

4. The target will not be able to find out who the perpetrators are or those involved in the gang-stalking.

Anyone who believes they are being gang-stalked should …

1. Keep detailed records and documentation of times, dates, and details; making those records as soon as the incident is apparent so details are not lost over time.

2. Take pictures of any evidence left by the perpetrators making sure to include a point of reference in the picture for identification purposes. For instance, if trash is strewn on the lawn, take close ups but then take pictures showing the house, garage, or even a car in the picture as a point of reference that the garbage was actually where you claim it was.

3. Keep detailed records of any interaction with law enforcement; even when law enforcement are friendly and appear to be empathetic. Keep track of who the responding officer is, what department he works for, what he tells you, what he does. If he removes evidence from the scene, note how he handles it, what he does with it. Know the procedures for preserving evidence and observe if the officer follows those procedures. Write it all down so details aren’t lost over time. Ask for an event number and incident number.

4. If you believe you are being gang-stalked, get a psychological evaluation immediately. This establishes that you are mentally stable when those involved and law enforcement try to intone that you are somehow mentally deranged.

5. If you believe you are being gang-stalked, don’t be afraid to speak up. There was a time when people being stalked were not listened to, were considered to be off in the head. Now stalking someone is a crime. The more who speak up, the better chance there is that gang-stalking will not continue to operate under the radar.

By Lynn Stuter

TwinTowerBillofRights

The New Phoenix Program–Film on the Use of Microwave & Slow Kill Weapons on U.S. Citizens

CointelPro type operations are presently being incorporated into the development of microwave weapons. INSCOM is perfecting nonlethal microwave weapons and at the same time neutralizing potential enemies by enfolding all the previous illegal government operations into one program as a force multiplier. The legacy of half a million US citizens used as human guinea pigs in nuclear, biological, and chemical weapons experiments during the Cold War as well as CointelPro and MKULTRA crimes against humanity lives on today. Dissidents that in the past were visibly attacked or assassinated in a traditional manner are now targeted for elimination using electromagnetic weapons. The targets of nonlethal microwave weapons fit a common profile similar to the targets of previous illegal government programs. People with a history of political activism or whistleblowers are used as human guinea pigs and experimental subjects in terminal experiments that are designed to force suicide, incarceration, or premature death due to the effects of non-ionizing radiation. These political assassinations are accomplished with technology that often leaves no obvious injuries. The theme of forced suicide has remained constant. What is different is that driving a target to suicide using microwave weapons is perfectly deniable because these individuals are tormented invisibly. The intelligence agencies have achieved perfect deniability for their crimes.

Film about microwave weapons war crimes and crimes against humanity. The victims tell their story of being tortured mercilessly with state of the art anti-personnel weapons.

Neuropsychological & Electronic No-Touch Torture Report by Dr. Robert Duncan (used on targeted citizens here in the U.S.)

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report


                  Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”     

http://fas.org/sgp/crs/intel/R43906.pdf                                                                                                                          http://incf.org/gsoc/2015/proposals/#—-nbsp–span-id–docs-internal-guid-f—c-e—e-b-f-e———f—ab-f—–span-power-arm-support-for-the-cyme-library-span—span 

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings.  Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

1.       Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

2.       Memory Erasure
The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

3.       Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

4.       Fear and Terror
There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques the target needs to hear their handler’s voice.  This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

5.       Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

6.       Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

7.       Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

8.       Personal and Spiritual Defamation
In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

9.       Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

10.     Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

11.     Dietary Manipulation, Forced Weakness and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

12.     Repetition
Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind.  During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

13.     Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies.  In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject.  Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

14.     Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

15.     Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

16.     Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering.  All suffering can be entrained into the minds of no-touch torture subjects.

17.     Sleep Deprivation
This is the number one torture method along with the popularity in the press of water boarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

18.     Stress Positions
Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.  Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.  Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.

http://projectsoulcatcher.blogspot.com/2015/03/summary-of-no-touch-torture-techniques.htmlhttp://www.drrobertduncan.com/dr-robert-duncans-neuropsychological-and-electronic-no-touch-torture-report.html

Partial Project Summary History

Project Descriptions

Technologies and Skills

Signal/Image Processing and Pattern Recognition

 
Tank image recognition from satellites 3-D stereoscopic extraction algorithms
Submarine signature recognition from acoustic underwater phased arrays Expert Bayesian system, parameter tuning, phased array signal processing correlogram
Stock market statistical arbitrage Creating models based on financial fluid flow dynamics and correlations of stock prices. Forecasting (Tuck).
Credit card fraud pattern recognition. Spending pattern irregularities alerts
Sound triangulation/sniper system Asymmetric phased arrays and reflection calibration algorithms

Biometric Recognition Systems

 
Face, finger print, retinal, voice and infra-red vascular recognition Feature extraction, registration algorithms, noise removal, large dataset management. Eigenvectors, wavelets, 3-D convolutions, cluster analysis.
Eye gaze tracker Real time image processing. Head rotation modeling.
Truth detection systems Automating polygraph parameter sensors and voice stress. Emotional context modeling through vocabulary templates.
Gesture recognition Hand gestures conversion to computer commands.
Brain Print Recognition Utilizing many samples, human brains have a unique MEG/EEG brain “hum” and cluster analysis can be done to recognize mental illnesses and uniqueness of individuals. (Lockheed Martin is doing research on recognition of precognitive signals of objects. Berkley also just released a paper showing how to discriminate between 1024 visual objects.)

Supercomputing Applications

 
Various projects including FFT optimization Vector Pipeline, BBN Butterfly, Hypercube, Viking Boards
Artificial life simulations, gas lattices Specialized Hardware, genetic and evolutionary algorithms.
Grid computing BEA and Oracle distributed grid computing
Computer generated holography 3-D spatial FFT on BBN’s connection machine. C-paris parallel programming language. Fortran 77.

Speech Recognition/Identification

 
Voice recognition/identification BBN Hark’s system.Markov modeling, n-grams, context probability models, speaker independent models
Models of discourse and planning Studied under world renown Barbara Grosz, graduate school adviser Harvard
Natural Language parsing and AI knowledge networks CIA project. Focused on pronoun reference algorithms.

Biomedical Projects

 
Soldier 2000 project Connecting vital sensors to a wireless bodyLan, DARPA.
Robotic Surgery in Medicine for the Army Hepatic feedback, latency time compensation, tremor filtering, object touch recognition
Virtual Reality in Medicine Overlays of fMRI scans onto patient for real time surgical applications
Virtual Reality 3-D Reconstruction Teleconferencing Carnegie Mellon University. 3-D reconstruction of objects in the teleconference room.
EEG controlled robots Relatively simplistic mental state recognition to control direction of robot. Discriminant function analysis.
Neural network controller for “INFANT” robot Designing robot controllers to learn to grasp objects that mimic human babies. Mentor: Dr. Kuperstein (MIT)
Retraining the brain to interpret tactile feedback as visual information Braille interfacing also used by Navy for Sonar feedback on tongue tactile vision systems.
Research / simulations in cybernetic hive mind work groups (BBN) Increasing the hypothetical efficiency of integrated rapid communication technologies.
Neural network control system for leg muscle stimulation to make paralyzed people walk again Engineering of exoskeleton. Control systems for non-linear biological models due to muscle fatigue.

Digital Circuit/Systems Design

 
Cascadable digital neural network chip VLSI design, production, testing
Wearable ubiquitous computing systems Enhanced reality, enhanced cognition. Heads up display borrowed from NASA for entrepreneurial venture.

Liars and Sociopaths: Criminal Government and Their Minions–Linda4444 and Her Ilk

He who dwells in the secret place of the Most High, Shall abide under the shadow of the Almighty. I will say of the LORD, He is my refuge and my fortress; My God, in Him I will trust.
 
For He will command His angels concerning you, to guard you in all your ways.
Psalm 91:1-2, 11

Fight to the death for truth and the Lord God will fight for you.
Ecclestiasticus of Sirach

From former FBI Agent and whistleblower Geral Sosbee

http://sosbeevfbi.ning.com/profiles/blogs/cjis-homicidal-rule-of-usa?xg_source=activity

The FBI’s CJIS [Criminal Justice Information System] fabricates files on millions of Americans (including congress) in order to blackmail or otherwise threaten them with ruination; many such files are based on rumor and unsubstantiated claims made by FBI paid informants and operatives and by professional liars. The CJIS together with the FBI/CIA can thus destroy any Target at will. These are the fools who have brought about totalitarian rule in the  United States of America.

The FBI is nervous over the recent global attention to FBI/CIA crimes against humanity, as Sosbee and others outline, sends a message [see link to original report].

For more info on the traitorous and corrupt hoodlums who run CJIS see:

http://www.sosbeevfbi.com/hatemail-partten.html

For evidence of the FBI’s efforts to kill or imprison me see the 19 parts of ‘My Story’ at:

http://www.sosbeevfbi.com/mystory.html
http://www.sosbeevfbi.com/hatemail-partten.html

************************************************************************

From Barbara Hartwell Percival


From my many years of being a Target of these criminals in government, I have come to know well the psychopathology which is at the root of their godlessness, ther lack of humanity and their twisted perceptions.

As for the fabricated files Geral describes, this tactic has been used in attempts to ruin the good names of many honorable people, whistleblowers, journalists and activists, simply because they defend Liberty and unalienable rights for ALL, expose Truth, and seek Justice for the wrongful actions of these perpetrators.

Geral Sosbee, Barbara Hartwell, Janet Phelan and many others (some of whom are our friends and colleagues) have been targeted for these fabricated files as well as forgeries, not only by the government, but by their minions, who are tasked with destroying the credibility of Targets by character assassination and by fabricating and disseminating the most outrageous of lies.

Some of these perps are also engaged in blackmail, extortion and monstrous invasions of privacy, soliciting crimes against Targets by posting private street addresses on the Internet.

The key to dealing with these assaults is to NOT let them intimidate you, nor silence you, nor neutralize you, no matter how much emotional distress (and other damages) they generate with their lies, slander, libel, harassment and threats.

Part of the “ruin” they seek is not only against your good name, but to every aspect of your life.

Remember that no decent, self-respecting, honorable person would ever use threats, libel and slander as a weapon; nor would bear false witness against anyone, nor torment, stalk, harass or persecute anyone, nor make a scapegoat of anyone, not even their worst enemy. God certainly expects us to expose truth and seek justice, but never to do evil with intent of malice to another.

No Godly person will return evil for evil, but will pray for those who persecute them. I admit, this is not easy for me, but it is my duty as a Christian.

Pray for God’s protection against these evildoers and ask your Brothers and Sisters in Christ for their intercessory prayers. Prayer is the greatest power available to us, and it can literally work miracles!

It is important to understand the mentality of these perps. They are sociopaths, who seek to control all those around them using deception and intimidation tactics.  But always know that their demonic lies cannot stand in the Light of God’s Truth.

This profile gives an overview of the psychopathology of those who are threatening ruin to God’s children, persecuting His saints and angels.

May God’s Grace and Peace be with you and may angels always protect you.

Barbara Hartwell Percival
June 28, 2011

**************************************************************

PROFILE OF THE SOCIOPATH

Source:  http://www.mcafee.cc/Bin/sb.html

This website summarizes some of the common features of descriptions of the behavior of sociopaths.

Glibness and Superficial Charm

Manipulative and Conning
They never recognize the rights of others and see their self-serving behaviors as permissible. They appear to be charming, yet are covertly hostile and domineering, seeing their victim as merely an instrument to be used. They may dominate and humiliate their victims.

Grandiose Sense of Self
Feels entitled to certain things as “their right.”

Pathological Lying
Has no problem lying coolly and easily and it is almost impossible for them to be truthful on a consistent basis. Can create, and get caught up in, a complex belief about their own powers and abilities. Extremely convincing and even able to pass lie detector tests.

Lack of Remorse, Shame or Guilt
A deep seated rage, which is split off and repressed, is at their core. Does not see others around them as people, but only as targets and opportunities. Instead of friends, they have victims and accomplices who end up as victims. The end always justifies the means and they let nothing stand in their way.

Shallow Emotions
When they show what seems to be warmth, joy, love and compassion it is more feigned than experienced and serves an ulterior motive. Outraged by insignificant matters, yet remaining unmoved and cold by what would upset a normal person. Since they are not genuine, neither are their promises.

Incapacity for Love

Need for Stimulation
Living on the edge. Verbal outbursts and physical punishments are normal. Promiscuity and gambling are common.

Callousness/Lack of Empathy
Unable to empathize with the pain of their victims, having only contempt for others’ feelings of distress and readily taking advantage of them.

Poor Behavioral Controls/Impulsive Nature
Rage and abuse, alternating with small expressions of love and approval produce an addictive cycle for abuser and abused, as well as creating hopelessness in the victim. Believe they are all-powerful, all-knowing, entitled to every wish, no sense of personal boundaries, no concern for their impact on others.

Early Behavior Problems/Juvenile Delinquency
Usually has a history of behavioral and academic difficulties, yet “gets by” by conning others. Problems in making and keeping friends; aberrant behaviors such as cruelty to people or animals, stealing, etc.

Irresponsibility/Unreliability
Not concerned about wrecking others’ lives and dreams. Oblivious or indifferent to the devastation they cause. Does not accept blame themselves, but blames others, even for acts they obviously committed.

Promiscuous Sexual Behavior/Infidelity
Promiscuity, child sexual abuse, rape and sexual acting out of all sorts.

Lack of Realistic Life Plan/Parasitic Lifestyle
Tends to move around a lot or makes all encompassing promises for the future, poor work ethic but exploits others effectively.

Criminal or Entrepreneurial Versatility
Changes their image as needed to avoid prosecution. Changes life story readily.

Other Related Qualities:

Contemptuous of those who seek to understand them

Does not perceive that anything is wrong with them

Authoritarian

Secretive

Paranoid

Only rarely in difficulty with the law, but seeks out situations where their tyrannical behavior will be tolerated, condoned, or admired

Conventional appearance

Goal of enslavement of their victim(s)

Exercises despotic control over every aspect of the victim’s life

Has an emotional need to justify their crimes and therefore needs their victim’s affirmation (respect, gratitude and love)

Ultimate goal is the creation of a willing victim

Incapable of real human attachment to another

Unable to feel remorse or guilt

Extreme narcissism and grandiose

May state readily that their goal is to rule the world

(The above traits are based on the psychopathy checklists of H. Cleckley and R. Hare.)

Source:  http://barbarahartwellvscia.blogspot.com/2011/06/liars-and-sociopaths-criminal.html?m=1

Government Trolls, Handlers and Counter Intelligence Agents & Getting the Word Out About Targeting Programs

Since I began writing this blog January 1, 2012, I have had a government troll who accesses my blog with the following search term: cia; tavistock institute, for, rockefeller.  This government handler troll individual sometimes access this blog up to 6 times daily with this one search term.

You don’t have to be a lifelong target of government subversion, handling, programming or Counter Intelligence Programs to know that this is one of the ways that they want to let me know that they are watching everything that I do and write.  Other than making me aware of general surveillance, it is also to intimidate and to frighten me, which is what targeting is all about–behavioral/mind control.  None of the online surveillance, hacking and censoring have worked–other than the immense amount of time that it takes to correct what they make disappear or censor.  However, the use of technologies to radiate me and cut my body and the use of chemicals have been very effective at diverting my attention from what I have tried to do, at impairing my ability to function and create a need for healing, which takes time.

Here is a screen shot of my search terms to date showing this government troll’s searches to my blog:

Screen Shot 2014-08-09 at 2.11.39 PM

I also deal with constant break-ins and have for over 8 years consistently. I have purchased over 55 high security locks now; to no avail.  I can’t keep them out and I can’t keep my foods from being tampered with, my goods being disposed of or stolen, and all of my clothing, shoes, books and personal items from being heavily vandalized.  They also chemically poison my cat, pluck and cut his whiskers, pull out his fur and cause his ears, feet and anus to bleed with the use of sharp objects.  For a touch of extra torture, I find my cat’s blood smeared around my dwelling and personal items.

Here is a photo that I took in 2012 showing receipts for over 50 high security locks at that time:

A few high-security deadbolt Lock receipts; also add, two security companies and systems, 2 camera systems and 3 DVR's.

A few high-security deadbolt Lock receipts; also add, two security companies and systems, 2 camera systems and 3 DVR’s.

The online attacks have been more severe since I began exposing Linda4444 as a Counter Intelligence Agent who has waged a fierce CoIntelPro attack against me since June 2014.  My Google+ account gets hacked and my comments get routinely removed.  For the whole month of June I was unable to make any Google+ posts or comments.  Most of my postings can be seen at the Google+ Globalist Watch International page where I am “Unwitting Experimentee”.  As you can see, the name that I go by on there incites wonder into whoever sees it before they even read anything that I have to say. The website address to GWI is:  https://plus.google.com/communities/113504931417760953233.   I invite all readers of this blog to check out what I write about and post there, too.

Targeted individuals should consider the Google+ communities to spread information and inform the public about targeted individual programs.  I have belonged to Google+ for less than 6 months; yet I have 117 followers and nearly 180,000 views to the things that I’ve posted.  You share to your circles and to your circles, circles (which are your extended circles).  When you do this, your posts go viral within an hour.  I have seen many of my posts do this and feel that this is the way to get the greatest amount of traffic to our areas of concern.  I am often surprised when I do a post on what is being done through these programs or even to my personal posts about CoIntelPro at how many people share them with their circles.  There is definitely interest and concern for our issues and this is a very effective way of letting others know what we go through.

Never give up and, to the best of your ability in any given day, do not let this program change who you are or what you will do to expose them.  It has been my experience that it won’t affect your targeting much anyway.  I was receiving high tech harassment for years before I started exposing the cowards here.  Although my targeting has increased tremendously since I began to expose Linda4444 in September of 2013, I wouldn’t change a thing as those who lie, bully, harass, manipulate and attempt to control and wage counter intelligence against worthy targets need to be exposed.  I would caution anyone who does not have a strong faith and is not afraid of actually dieing, to leave exposing the Linda Lesker’s of this world to those of us who do.  Linda is and will continue to be exposed, but those who know and aren’t willing to come forward with their experiences with her, should not be disparaged for not doing so for fear of the repercussions.

There is only one true God and he allows for us to be tried in this way.  He has shown me the error of my ways and strengthened my spirit, faith and true following of him through this horrendous experience.  I pray that all targets will see God’s blessing in disguise for their lives as they navigate through these precarious final days of life as we know it.

May God bless you and guide your path~

Lynn

13 Rules for Dealing with Sociopaths in Everyday Life

From the book, The Sociopath Next Door, by Martha Stout, PhD.

sociopath-next-door

13 RULES FOR DEALING WITH SOCIOPATHS IN EVERYDAY LIFE   

1.         The first rule involves the bitter pill of accepting that some people literally have no conscience.

These people do not often look like Charles Manson or Ferengi bartender.  They look like us.

2.     In a contest between your instincts and what is implied by the role a person has taken on–educator, doctor, leader, animal lover, humanist, parent–go with your instincts.                             

Whether you want to be or not, you are a constant observer of human behavior, and your unfiltered impressions, though alarming and seemingly outlandish, may well help you out if you will let them.  Your best self understands, without being told, that impressive and moral-sounding labels do not bestow conscience on anyone who did not have it to begin with.

3.     When considering a new relationship of any kind, practice the Rule of Threes regarding the claims made and promises a person makes, and the responsibilities he or she has.  Make the Rule of Threes your personal policy.                                                                                                                            

One lie, one broken promise, or a single neglected responsibility may be a misunderstanding instead.  Two may involve a serious mistake.  But three lies says you’re dealing with a liar, and deceit is the linchpin of conscienceless behavior.  Cut your losses and get out as soon as you can.  Leaving, though it may be hard, will be easier now than later, and less costly.

4.       Question authority.                                                                                                                                 

Once again–trust your own instincts and anxieties, especially those concerning people who claim that dominating others, violence, war, or some other violation of your conscience is the grand solution to some problem.  Do this even when, or especially when, everyone around you has completely stopped questioning authority.  Recite to yourself what Stanley Milgram taught us about obedience:  At least six out of ten people will blindly obey to the bitter end an official-looking authority in their midst.

The good news is that having social support makes people somewhat more likely to challenge authority.  Encourage those around you to question, too.

5.        Suspect flattery.

Compliments are lovely, especially when they are sincere.  In contrast, flattery is extreme and appeals to our egos in unrealistic ways.  It is the material of counterfeit charm, and nearly always involves an intent to manipulate.  Manipulation through flattery is sometimes innocuous and sometimes sinister.  Peek over your massaged ego and remember to suspect flattery.

This “flattery rule” applies on an individual basis, and also at the level of groups and even whole nations.  Throughout all of human history and to the present, the call to war has included the flattering claim that one’s own forces are about to accomplish a victory that will change the world for the better, a triumph that is morally laudable, justified by its humane outcome, unique in human endeavor, righteous, and worthy of enormous gratitude.  Since we began to record the human story, all of our major wars have been framed in this way, on all sides of the conflict, and in all languages the adjective most often applied to the word war is holy.  An argument can easily be made that humanity will have peace when nations of people are at last able to see through this masterful flattery.

Just as an individual pumped up on the flattery of a manipulator is likely to behave in foolish ways, exaggerated patriotism that is flattery-fueled is a dangerous thing.

6.      If necessary, redefine your concept of respect.

Too often, we mistake fear for respect, and the more fearful we are of someone, the more we view him or her as deserving of our respect.

I have a spotted Bengal cat who was named Muscle Man by my daughter when she was a toddler, because even as a kitten he looked like a professional wrestler.  Grown now, he is much larger than most other domestic cats.  His formidable claws resemble those of his Asian leopard-cat ancestors, but by temperament, he is gentle and peace-loving.  My neighbor has a little calico who visits.  Evidently, the calico’s predatory charisma is huge, and she is brilliant at directing the evil eye at other cats.  Whenever she is within fifty feet, Muscle Man, all fifteen pounds of him to her seven, cringes and crouches in fear and feline deference.

Muscle Man is a splendid cat.  He is warm and loving, and he is close to my heart.  Nonetheless, I would like to believe that some of his reactions are more primitive than mine.  I hope I do not mistake fear for respect, because to do so would be to ensure my own victimization.  Let us use our big human brains to overpower our animal tendency to bow to predators, so we can disentangle the reflexive confusion of anxiety and awe.  In a perfect world, human respect would be an automatic reaction only to those who are strong, kind, and morally courageous.  The person who profits from frightening you is not likely to be any of these.

The resolve to keep respect separate from fear is even more crucial for groups and nations.  The politician, small or lofty, who menaces the people with frequent reminders of the possibility of crime, violence, or terrorism, and who then uses their magnified fear to gain allegiance, is more likely to be a successful con artist than a legitimate leader.  This too has been true throughout human history.

7.       Do not join the game.

Intrigue is a sociopath’s tool.  Resist the temptation to compete with a seductive sociopath, to outsmart him, psychoanalyze, or even banter with him.  In addition to reducing yourself to his level, you would be distracting yourself from what is really important, which is to protect yourself.

8.       The best way to protect yourself from a sociopath is to avoid him, to refuse any kind of contact or communication.

Psychologists do not usually like to recommend avoidance, but in this case, I make a very deliberate exception.  The only truly effective method for dealing with  sociopath you have identified it to disallow him or her from your life altogether.  Sociopaths live completely outside of the social contract, and therefore to include them in relationships or other social arrangements is perilous.  Begin this exclusion of them in the context of your own relationships and social life.  You will not hurt anyone’s feelings.  Strange as it seems, and though they may try to pretend otherwise, sociopaths do not have any such feelings to hurt.

You may never be able to make your family and friends understand why you are avoiding a particular individual.  Sociopathy is surprisingly difficult to see, and even harder to explain.  Avoid him anyway.

If total avoidance is impossible, make plans to come as close as you can to the goal of total avoidance.

9.      Question your tendency to pity too easily.                                                                               

Respect should be reserved for the kind and the morally courageous.  Pity is another socially valuable response, and it should be reserved for innocent people who are in genuine pain or who have fallen on misfortune.  If, instead, you find yourself often pitying someone who consistently hurts you or other people, and who actively campaigns for your sympathy, the chances are close to 100 percent that you are dealing with a sociopath.

Related to this–I recommend that you severely challenge your need to be polite in absolutely all situations.  For normal adults in our culture, being what we think of as “civilized” is like a reflex, and often we find ourselves being automatically decorous even when someone has enraged us, repeatedly lied to us, or figuratively stabbed us in the back.  Sociopaths take huge advantage of this automatic courtesy in exploitive situations.

Do not be afraid to  be unsmiling and calmly to the point.

10.      Do not try to redeem the unredeemable.

Second (third, fourth, and fifth) chances are for people who posses a conscience.  If you are dealing with a person who has no conscience, know how to swallow hard and cut your losses.

At some point, most of us need to learn the important , if disappointing, life lesson that, no matter how good our intentions, we cannot control the behavior–let alone the character structures–of other people.  Learn this fact of human life, and avoid the irony of getting caught up in the same ambition he has–to control.

If you do not desire control, but instead want to help people, then help only those who truly want to be helped.  I think you will find this does not include the person who has no conscience.

The sociopath’s behavior is not your fault, not in any way whatsoever.  It is also not your mission.  Your mission is your own life.

11.      Never agree, out of pity or for any other reason, to help a sociopath conceal his or her true character.

“Please don’t tell,” often spoken tearfully and with great gnashing of teeth, is the trademark plea of thieves, child abusers–and sociopaths.  Do not listen to this siren song.  Other people deserve to be warned more than sociopaths deserve to have you keep their secrets.

If someone without conscience insists that you “owe” him or her, recall what you are about to read here:  “You owe me” has been the standard line of sociopaths for thousands of years, quite literally, and is still so.  It is what Rasputin told the empress of Russia.

We tend to experience “You owe me” as a compelling claim, but it is simply not true.  Do not listen.  Also, ignore the one that goes, “You are just like me.”  You are not.

12.     Defend your psyche.                                                                                                                             

Do not allow someone without a conscience, or even a string of such people, to convince you that humanity is a failure.  Most human beings do possess conscience.  Most human beings are able to love.

13.      Living well is the best revenge.

Linda4444 CoIntelPro Increases–My Online Presence & Identity is Now Being Hacked Daily By BigBro

There is new evidence of more government online hacking as a result of me exposing Linda4444’s CoIntelPro Operation on Talkshoe.  This morning I found my private Youtube account had an new additional account added to my other 2  under the name,  “Linda4444-2468@pa….”.  It will only show me a few characters of the email address, but I have no idea what email addresses have a “pa” prefix.  How was this added to my account when I don’t have access to confirm that it as mine; yet its linked to my account?

I will report all targeting of me, my person, my property, or my online presence during this increased CoIntelPro attack.

Screen Shot 2014-06-14 at 11.26.35 AMThis is CoIntelPro.  What Linda has done to me over the last 9 months is a total CoIntelPro Damage Control campaign.  I knew what Linda was going to do to me for coming forward because I have watched and heard her do it to many other brave T.I.’s that trusted her with their private information  who called her out or dared question her lies, contradictions or disturbing practices on Talkshoe.   She can be sued for Slander, Libel and Defamation of Character because there is proof that she KNEW all along and was PURPOSELY DECEIVING AND TARGETING CERTAIN GROUPS SPECIFICALLY–THE CHRISTIANS.  Linda dedicated 16 hours of Live Talkshoe call time to do this to me and recorded 5 hours for the public to continue to access.   After I called her out on her whole act and sent her an inspirational post that I reposted to my blog on Thursday, Linda444 has now taken down the 5 hour recording of me that was all  OUTRIGHT LIES AND THE MANIPULATION OF ANYTHING AND ALL THINGS FACTUAL.  This is what she did with all of the other CoIntelPro attacks that she waged and recorded on others–POOF–GONE IN AN INSTANT.  PROOF OF GUILT AND NEEDING TO HIDE SELF-INCRIMINATING SLANDER, LIBEL, CHARACTER DEFAMATION AND A TOTAL WHITEWASH OF EVERYTHING TRUTHFUL.

Since she was not allowed to put me under her spell or manipulate me away from sharing the truths that I know and have proof of, I have witnessed the most egregious slander campaign where Linda has appealed to everyone emotionally and played and manipulated them and the truth.  She has totally changed Talkshoe by her infiltration and CoIntelPro tactics and attacks where she gains peoples’ trust and they tell her all their deep secrets and stories and then she does one of these attacks on them when they question her or stand up for what they know to be the truth.

I will not stop reporting the truth about Linda4444 from the Talkshoe T.I. Callls.

I will not stop reporting any and all harassment, slander or torture that I endure outside of the usual levels during Linda’s accelerated CoIntelPro attack on me.

I will stand by the truth until the day I die and know that I will be called to die for what I believe in.  I am good with that and thank all those who are dedicated to the truth and who suffer for it and to all those who have been killed for the truth already.

Tupac on Death

 

Better a Brief Warfare and Eternal Rest, than False Peace and Everlasting Torment.

The Enemy Within

African Proverb-No Enemy Within

“I came not to send peace on earth, but a sword.”
–Matthew 10:34

The Christian will be sure to make enemies. It will be one of his objects to make none; but if to do the right, and to believe the true, should cause him to lose every earthly friend, he will count it but a small loss, since his great Friend in heaven will be yet more friendly, and reveal Himself to him more graciously than ever. O ye who have taken up His cross, know ye not what your Master said? “I am come to set a man at variance against his father, and the daughter against her mother; and a man’s foes shall be they of his own household.” Christ is the great Peacemaker; but before peace, He brings war. Where the light cometh, the darkness must retire. Where truth is, the lie must flee; or, if it abideth, there must be a stern conflict, for the truth cannot and will not lower its standard, and the lie must be trodden under foot. If you follow Christ, you shall have all the dogs of the world yelping at your heels. If you would live so as to stand the test of the last tribunal, depend upon it the world will not speak well of you. He who has the friendship of the world is an enemy to God; but if you are true and faithful to the Most High, men will resent your unflinching fidelity, since it is a testimony against their iniquities. Fearless of all consequences, you must do the right. You will need the courage of a lion unhesitatingly to pursue a course which shall turn your best friend into your fiercest foe; but for the love of Jesus you must thus be courageous. For the truth’s sake to hazard reputation and affection, is such a deed that to do it constantly you will need a degree of moral principle which only the Spirit of God can work in you; yet turn not your back like a coward, but play the man. Follow right manfully in your Master’s steps, for He has traversed this rough way before you. Better a brief warfare and eternal rest, than false peace and everlasting torment.

Charles Spurgeon, Evening Devotional, Dec. 28

The Late William Cooper on Psychological Operations

According to the late William Cooper in this 1992 CNN interview, the purpose of PSYCHOLOGICAL OPERATIONS against the public is:

  • INDOCTRINATE THE PUBLIC on what the government wants the public TO PERCEIVE what’s happening,  OR
  • SCARE the researchers AWAY FROM THE TRUTH,  or both.

Regarding  FRAUDULENT INTENT:

I decided that I had to tell the public and get people on the right track.  The right track is, DON’T BELIEVE ANYBODY.  You gotta go out and         GET PROOF in your hand before you can believe anything.  And to do otherwise today, is the BIGGEST MISTAKE ANYONE COULD EVER MAKE.  You begin believing in people–putting your trust in them that they’re telling you the truth and I guarantee you that you’re going to            take a ride on a roller coaster that you don’t want to be on.

Now my attitude is, I just don’t want this to happen anymore.  I am very reluctant to believe what anybody tells me anymore.  Someone who’s really good at it can snow you.  That’s what makes a con man a good con man is that you get the perception that they’re telling you the truth.