Tesla and Harnessing Radiation to Serve the Eugenicist Agenda

Tesla Eugenicist

The modern age of Electrification is implementing a plan of Eugenics through unhealthy vibrational frequencies, dirty electricity, and interruption of natural harmonics. Nikola Tesla was well aware of the plight of humanity. He was also a eugenicist at heart.  Tesla invented the technology that was developed into psychotronic weaponry, microwave beam weaponry and other exotic classified weapons that use the electromagnetic spectrum in the low frequency range to torture individuals with the most invasive and painful results.  The use of the electromagnetic spectrum as a weapon allows for torturing individuals with little to no evidence and the plausible denibility necessary for their to be no repercussions for those entities and individuals involved.  Any populace can be controlled–individually and collectively–using these technologies to bring about disease, dysfunction and imminent and early death.

“The year 2100 will see eugenics universally established. In past ages, the law governing the survival of the fittest roughly weeded out the less desirable strains. Then man’s new sense of pity began to interfere with the ruthless workings of nature. As a result, we continue to keep alive and to breed the unfit. The only method compatible with our notions of civilization and the race is to prevent the breeding of the unfit by sterilization and the deliberate guidance of the mating instinct. Several European countries and a number of states of the American Union sterilize the criminal and the insane. This is not sufficient. The trend of opinion among eugenicists is that we must make marriage more difficult. Certainly no one who is not a desirable parent should be permitted to produce progeny. A century from now it will no more occur to a normal person to mate with a person eugenically unfit than to marry a habitual criminal.”                     

In modern times, professionals in their prospective fields have tried to warn of the dangers of Electrification and the hazards of unnatural vibrational energy/radiation upon all life. Yet, few seem to understand the implications like Dr. Magda Havas,PhD.   http://www.magdahavas.com/category/emf-links/

On the 2nd May 2015, Barrie Trower, a very learned, thorough and experienced individual talked in depth for nearly two hours about the dangers of microwave radiation absorption from sources such as cell phone towers, Wifi routers, smartphones, tablets etc.

Dr. Barrie Trower on the Dangers of Microwave Radiation

                                   

Conspiracy Theory: Population Control & Microwave Radiation

Conspiracy Theory with Jesse Ventura: Death Ray & Brain Invaders Episodes

Conspiracy Theory with Jesse Ventura Brain Invaders S03E07 from Cruchot777 on Vimeo.

Others have documented the progression of disease in the modern age. Dr. Sam Milham discusses the health hazards of “Dirty Electricity” and the diseases associated with technology.
http://www.sammilham.com/

‘Dirty Electricity’ and the Diseases of Civilization – Dr. Sam Milham

Liberty Magazine article on Tesla, February 1935

libertymagazine9february1935frontcoverlibertymagazine9february1935page5libertymagazine9february1935page6libertymagazine9february1935page7

http://hello-earth.com/nikolatesla/amachinetoendwar/libertymagazine9february1935.html

 

Rihanna’s “Better Have My Money” Promotes the Elite’s Obsession With Torture

As a person who has been targeted with remote weaponry and electromagnetic radiation for many years, I can attest that the cultural obsession with torture is systemic.  The individuals who are behind the controls of the weapons and the computers that control them are psychopaths obsessed with sex, violence and torture.

****************************************************************************************************

leadbetterhaveBy The Vigilant Citizen

Rihanna’s “Better Have My Money” purposely pushes limits and purposely pushes them in a specific direction. The video is a continuation of mass media’s agenda of glorifying death, torture and dehumanization. We’ll look at the twisted messages behind “Better Have My Money”.

Since the launch of Vigilant Citizen in 2008, Rihanna has been a part of the picture. In fact, one of the first articles I ever wrote was about Rihanna’s Umbrella, and nothing has really changed since then. More than 7 years later, Rihanna is still being used to push the occult elite’s agenda … because that’s what industry pawns do. With Better Have my Money, Rihanna truly confirms that popular culture has turned into a depraved, toxic wasteland that purposely exposes young minds to death, murder, and torture. But it is not simply about exposing the youth to these things, it is about glorifying them, making them cool, fashionable, desirable and trendy.

Considering that the occult elite is not ashamed of torturing people for all kinds of purposes (see the horrific revelations of the CIA torture report  and the entire MK Ultra system), it is not surprising that they are looking to sell their love of human misery to the youth. One might say “This has nothing to do with Rihanna, it is just a fun video”. But actually, yes, it does. In Better Have My Money, Rihanna re-enacts actual torture techniques used by psychopathic entities and makes them appear cool. I mean, when you torture people on a yacht while there’s party music in the background, it’s cool, right? Right? Torture is cool? Oh, and sexy, too.

It’s Not Really About Her Money

If you listen to Better Have My Money without being exposed to the video, it is easy to assume that the song is about someone owing Rihanna money that she wants back. If someone has ever owed you money, and tried to weasel their way out of paying you back, you probably relate to the catchy chorus of the song: “B*tch better have my money”.

However, the imagery of the video takes things to a disturbing, psychopathic, sadistic new level. Now it is not simply about Rihanna trying to get her money, it is about Rihanna enjoying torturing and killing people. But, because it’s Rihanna that’s doing it, we’ll rationalize the horrors on screen and say that it’s just her being a “strong, empowered, independent woman”, right? Well, guess what. Even if a woman does it, killing and torturing people is still wrong.

Does watching the video gives you an uneasy, unpleasant feeling in your gut? That’s your instincts subtly telling you that what you are watching is not right. It does not fit with the state of natural balance and harmony your mind attempts to stay in. Watching pain, suffering, dehumanization and death is not “art”, it simply kills the soul.

As it is often the case with mass media, Rihanna’s video synchronizes with a recently released video from another pop star who also took on a bloody, vengeful, and violent persona: Taylor Swift.

Released a few weeks apart, Bad Blood and Better Have My Money feature pop stars in celebrating death and violence while wearing red hair – the color of blood and sacrifice.

Released a few weeks apart, Bad Blood and Better Have My Money feature pop stars in celebrating death and violence while wearing red hair – the color of blood and sacrifice.

The Video

The Better Have My Money video begins with a stereotypical Hollywood wife crossing paths with Rihanna and her mysterious trunk.

Rihanna is about to turn into a psychopatic torturer. But I looove her bohemian-chic style, so it’s OK.

Rihanna is about to turn into a psychopatic torturer. But I looove her bohemian-chic style, so it’s OK.

Rihanna leaves the elevator with the woman inside the trunk and the ordeal begins. Rihanna and her friends do not simply kidnap the woman to get their money back – they take pleasure in torturing her in various ways. In short, they are partaking in the guilty pleasures of the occult elite: dehumanizing, torturing, traumatizing, and, ultimately, murdering people. Yes, that’s what the occult elite does. In real life. Read the news.

First, they strip their victim naked – a classic way of taking away the victim’s dignity and sense of security and to enter the realm of sexual abuse.

betterhave5

They hang her upside down while Rihanna looks really cool. Looove that hat BTW.

“Simply hanging a person upside down for one or two hours will begin to play tricks on the mind. The mind will begin to dissociate, and will begin to reverse the primordial brain functions such as pain is pleasure. The person’s mind rearranges. This is often done with Beta alters or Beta models to get them to think that the pain of sadistic rape is a pleasure. After this reversal in the mind that “PAIN IS LOVE”, the S&M kitten alters will beg their handler to slap them, tie them up, hurt them, etc. They will tease their handler, and tell him he is not a real man if he shows any mercy in how the pain is inflicted. Fire/burning torture is used in the porcelain face programming.”
– Fritz Springmeier, The Illuminati Formula to Create a Mind Control Slave

Rihanna and her friends appear to have gotten the CIA handbook of torture.

Inducing vomiting through motion and/or drugs.

Inducing vomiting through motion and/or drugs.

Rihanna also appear to know about the sick mind games played on Beta Kitten slaves such as “making them pretty to then treat them like whores”.

Rihanna and friends make the victim wear jewelery and makeup. They even add eye-lashes on her blindfold. She is then drugged. This is the kind of stuff MK handlers do to slaves before abuse.

Rihanna and friends make the victim wear jewelery and makeup. They even add eye-lashes on her blindfold. She is then drugged. This is the kind of stuff MK handlers do to slaves before abuse.

Keeping a victim underwater and simulating death by drowning is a particularly traumatic torture technique (see Guantanamo Bay/waterboarding) that often leads to dissociation.

Keeping a victim underwater and simulating death by drowning is a particularly traumatic torture technique (see Guantanamo Bay/waterboarding) that often leads to dissociation.

In the scene above, the victim is kept underwater to hide her from the idiot policeman who is too distracted by the pretty women to notice anything else. When pop stars like Rihanna and Taylor use sex and violence to get what they want, it is often portrayed as a feminist statement. But in mass media, feminism is not about equality, it is about normalizing degradation and violence and calling it empowerment.

After a bunch of shots of Rihanna looking angry and cool, we finally learn why this poor woman is suffering. Because her husband owes Rihanna money. The woman is therefore presumably totally innocent, but is still subjected to the worst kind of abuse. (By other women. So much for feminism!)

Despite his wife’s torture, the husband is not sending Rihanna her money, so she decides to slaughter him like a farm animal. That’s rational.

The man’s living room is covered in plastic sheets because Rihanna is about to hack and slash him in an orgy of unnecessary violence. I’m sure Rihanna’s 12 year-old fans will enjoy this.

The man’s living room is covered in plastic sheets because Rihanna is about to hack and slash him in an orgy of unnecessary violence. I’m sure Rihanna’s 12 year-old fans will enjoy this.

In a quick shot, we see his hand cut off.

In a quick shot, we see his hand cut off.

Doing all of these horrific things was apparently worth it because Rihanna got her money. Good. We were all very worried about Rihanna’s money. While young viewers will conclude that “Rihanna is such a bad-ass”, the final scene of the video reveals her true state.

Rihanna lays in the trunk where the torture victim was previously placed.

Rihanna lays in the trunk where the torture victim was previously placed.

Not unlike the torture victim, Rihanna is inside the chest, naked and drugged. It is a symbolic way of stating that Rihanna is actually not a cool, renegade bad-ass, but is a victim herself. She is a product of the Beta Kitten industry, she has literally blood on her hands, but there is some money thrown on her to keep her in line. In other words, she is no different than the woman who got kidnapped, tortured and exploited to get money. By portraying a sadistic killer over club music, she is being used and manipulated by the industry to advance its Agenda. She is not “empowered”, nor is she in control of anything. She never was.

The last image of the video, after the song is over, shows Rihanna’s face dripping with blood over unsettling sounds.

The last image of the video, after the song is over, shows Rihanna’s face dripping with blood over unsettling sounds.

The blood on Rihanna’s face recalls the extreme violence of the murder she committed and reminds us of the real point of the video. This was never about getting paid. This is about using Rihanna to sell the elite’s culture of death and dehumanization, while negating human dignity, self-respect, and everything that is positive about humanity.

In Conclusion

There is no hidden message in Better Have My Money. Everything is in your face, like the blood dripping down Rihanna’s face. The video still manages to deceive viewers by rationalizing horror because “the guy was a jerk and he deserved it”. No, he didn’t.

However, the sickness goes deeper than this. This video is about the elite’s obsession with pain and torture. Whether you are looking at the treatment of war prisoners and MK slaves, or at the underground rings selling selling snuff torture, those “above the law” have legitimized the torture of those that are “beneath” them. Not only is it used as a tool to obtain what they want, but their inverted mindstate “gets off” on it. Better Have My Money celebrates this mindstate under the guise of being “edgy”.

What does this say about us and our culture? Why does “pushing the limits” in popular culture always go in a debasing and dehumanizing direction, but rarely in the opposite direction, toward beauty, creativity, and innovation? Because those who control the world economy and mass media do not want human minds to expand and be inspired. They want the opposite. They want closed, cloudy minds obsessed with unhealthy and destructive ideas and images. Minds they can control.

Rihanna is a tool to accomplish this. She doesn’t really have a say in any of it. She didn’t even write the song. She is simply doing what her bosses tell her to do. And, when all is said and done, they will tell her: “B*tch better have my money”.

Source:  http://vigilantcitizen.com

Resources:  https://gangstalkingsurfers.wordpress.com/2015/03/30/summary-of-no-touch-torture-techniques-in-use-to-target-innocent-americans-by-dr-robert-duncan/

The Population Council–Rockefeller Eugenics Organization Used to Covertly Undermine Traditional Values

Population-Council-in-Egypt-to-participate-in-the-SAHWA-Youth-SurveyThe Population Council is an international, nonprofit, non-governmental organization. The Council conducts biomedical, social science, and public health research and helps build research capacities in developing countries.[1][2] One-third of its research relates to HIV and AIDS; its other major program areas are reproductive health and poverty, youth, and gender.[citation needed] It held the license for Norplant contraceptive implant, and now holds the license for Mirena intrauterine system. The Population Council also publishes the journals Population and Development Review, which reports scientific research on the interrelationships between population and socioeconomic development and provides a forum for discussion of related issues of public policy, and Studies in Family Planning, which focuses on public health, social science, and biomedical research on sexual and reproductive health, fertility, and family planning.

The Organization

Established in 1952 by John D. Rockefeller III, with important funding from the Rockefeller Brothers Fund, the Council is governed by an international board of trustees. The 2006 board includes leaders in biomedicine, business, economic development, government, health, international finance, the media, philanthropy, and social science.

Headquartered in New York, the Population Council has 18 offices in Africa, Asia, and Latin America and does work in more than 60 countries. With an annual budget of around $74 million, it employs more than 500 people from 33 countries with expertise in a wide array of scientific disciplines. Roughly 55 percent are based outside the United States.

The Council has its roots in the discredited eugenics movement. The first president of the Council was a eugenicist appointed by Rockefeller; Frederick Osborn, author of Preface to Eugenics (New York, 1940), leader of the American Eugenics Society, and one of the founding members of the Pioneer Fund. Osborn was vice president or president of the Population Council until 1959. In 1968 he wrote, “Eugenic goals are most likely to be achieved under another name than eugenics.”[3]

The Population Council's 1969 Memorandum showing the coming mass promotion of homosexuality and feminism are merely aspects of the planned total enslavement in a literal Brave New World sense - to make sure you don't go into the future through offspring.

The Population Council’s 1969 Memorandum showing the coming mass promotion of homosexuality and feminism as aspects of the planned total enslavement through population control creating a Brave New World through offspring management.

Reproductive Health

The Council conducts biomedical research to develop contraceptives and social science research to better understand the factors influencing access to and decision-making around contraceptives.[4] Its fundamental research on reproductive and immunological processes serves not only as the basis for the development of new contraceptive methods to meet the needs of both women and men, but also for new hormone therapies and AIDS-prevention products.[citation needed]

In the 1960s, the Council played a key role in documenting the large numbers of people in poor countries who lacked access to contraceptives and in conducting research to design and evaluate public family planning programs.[citation needed] At the same time, the Council’s biomedical researchers worked to develop new contraceptive methods, such as the intrauterine device.

Some contraceptives available in some countries today were developed by the Population Council: the Copper T IUD, Norplant, Jadelle (Norplant II), and Mirena. More than 50 million Copper T IUDs have been distributed in over 70 countries. Norplant was replaced by Jadelle.

The British medical journal Lancet said of the Population Council, “Most non-governmental organisations claim to promote change for the better; the Population Council actually has hard evidence of having changed the lives and expectations of hundreds of millions of people.”[5]

 

Source:  Wikipedia: Population Council

 

References

(1) Media Center | Key Facts
(2) About the Council
(3) Betsy Hartmann (2006). “Everyday Eugenics”. Zmag. Retrieved 2015-02-15
(4) The Lancet. (Vol. 361, June 7, 2003, review)
(5) David Rockefeller, New York: Random House, 2002

Website

http://www.popcouncil.org

Muse’s “The Handler” : A Song about a Mind Control Slave Singing to His Handler

handler7Muse’s The Handler is one of the most obvious music videos about Monarch mind control ever created. However, it takes some basic knowledge on the subject to understand the true meaning of the video. Here’s a closer look at The Handler.

Muse’s lead singer Matt Bellamy was never a stranger to themes relating to the occult elite and mind control. The band’s 2009 album The Resistance contained titles such as Uprising and MKULTRA which alluded obscure topics relating to conspiracy theories. After the success of that album, Muse obtained some music industry recognition, participated in the 2012 Olympics Closing Ceremonies (which were a big occult elite ritual – read article about it here) and, since then, the band’s message somewhat shifted. Indeed, Matt Bellamy went from stating in 2006:

“September 11 is clearly an inside job, there’s massive evidence that suggests that it was either allowed to happen or even worse, deliberately made to happen”
– Drowned in Sound, Muse’s Matt Bellamy: September 11 is clearly an inside job”

To flip-flopping on the subject in 2012 :

“I don’t believe that anymore,  although there are lots of questions to be answered. I still read a lot about political history, the influence of corporations and the military but I make sure I’m reading from credible sources. I think my political views are bit more nuanced now.”
– Metro, Muse’s Matt Bellamy: It’s only now I feel comfortable singing about love

These kinds of statements, combined with a more subdued second album lead fans to wonder if the band “sold out” to the music business.

However, the band’s latest album, Drones, brings Muse back to its “Resistance” roots, and goes even further down the rabbit hole. Drones is indeed a concept album that “follows the protagonist’s journey from abandonment to indoctrination as a “human drone” and eventual defection”.

Matt Bellamy described Drones as an album about the dehumanization of modern warfare:

“To me, drones are metaphorical psychopaths which enable psychopathic behaviour with no recourse. The world is run by drones utilising drones to turn us all into drones. This album explores the journey of a human, from their abandonment and loss of hope, to their indoctrination by the system to be a human drone, to their eventual defection from their oppressors.”
– Gigwise, Muse announce Drones album and UK Psycho tour

The album cover of Drones depicts an unseen puppet master controlling a drone who is controlling masses of drones.

The album cover of Drones depicts an unseen puppet master controlling a drone who is controlling masses of drones.

The sixth song of the album, entitled The Handler, describes the protagonist’s indoctrination … and this indoctrination is clearly accomplished through Monarch mind control  (if you don’t know what I’m referring to, read this article first). The vocabulary of the song and the symbolism of the video could not be clearer, making The Handler one of the clearest references to Monarch programming in popular culture to date. Let’s look at the video.

The Handler

The song is about an MK slave singing to his handler. Right from the start, the lyrics refer to trauma-based mind control.

You (you, you)
Were my oppressor
And I (I, I)
I have been programmed to obey

And now (now, now)
You are my handler
And I (I, I)
I will execute your demands

The handler was first the “oppressor” as he subjected the slave to unbearable pain, torture and trauma in order to induce dissociation. Once that is accomplished, the oppressor becomes the “handler” who programs an alter-persona that can be controlled at will.

In the video, a shady figure in a black hood plays the role of the handler. He’s sticking out of a strange structure which appears to be the brain of the slave. While the handler acts as the master of ceremonies, symbolic images rotate around the slave’s brain. All of them refer to Monarch programming – and many of them are actual MK trigger images.

As Muse sings about the Handler, a bunch of symbolic characters move in front of him. Here, a moon crescent inside a cage represent the imprisonment of the MK slave.

As Muse sings about the Handler, a bunch of symbolic characters move in front of him. Here, a moon crescent inside a cage represent the imprisonment of the MK slave.

Then Alice in Wonderland appears. This fairytale is used by MK handlers to program slaves as they are encouraged to “follow the white rabbit through the looking glass” towards dissociation.

Then Alice in Wonderland appears. This fairytale is used by MK handlers to program slaves as they are encouraged to “follow the white rabbit through the looking glass” towards dissociation.

Here we see Minnie Mouse (a reference to Mickey Mouse programming) and, left of it, a chest full of Monarch butterflies flying around. Pinocchio also later makes an appearance. The story of the wooden puppet created by a puppeteer who turns into a “real boy” resonates deeply in MK programming.

Here we see Minnie Mouse (a reference to Mickey Mouse programming) and, left of it, a chest full of Monarch butterflies flying around. Pinocchio also later makes an appearance. The story of the wooden puppet created by a puppeteer who turns into a “real boy” resonates deeply in MK programming.

Another item waltzing in front of the handler is a teddy bear. Plush toys and pets are often given to slaves so they can bond with them and get some comfort … have them live the trauma of losing a loved one. We’ll later see how this plays out in the video.

The lyrics of the song mention the key steps of Monarch programming. The chorus alludes to the ultimate goal of Monarch programming: dissociation.

Leave me alone
I must disassociate from you

The word “dissociate” appears in large letters above a shady handler while Alice in Wonderland twirls around. This could not be more MKULTRA-related.

The word “dissociate” appears in large letters above a shady handler while Alice in Wonderland twirls around. This could not be more MKULTRA-related.

After being subjected to intense trauma and torture, MK slaves are pushed towards dissociation – it is a natural defense mechanism of the brain when faced to unbearable trauma.  After dissociation, handlers have “access” to the slave’s brain and can create programmable alter-personas.

The second verse of the song relates to the state of the slave after programming.

Behold my transformation

The video spells out “transformation” as  Trance Formation. It is a reference to the book Trance Formation of America by Cathy O’Brien.

The video spells out “transformation” as Trance Formation. It is a reference to the book Trance Formation of America by Cathy O’Brien.

Trance Formation of America is one of the first books ever to reveal the Monarch mind control system used by the occult elite. In her biography, O’Brien writes:

“I have prepared this book for your review and edification concerning a little known tool that “our” United States Government is covertly, illegally, and un-constitutionally using to implement the New World Order (One World Government). This well documented tool is a sophisticated and advanced form of behavior modification (brainwashing) most commonly known as MIND CONTROL. My first hand knowledge of this TOP SECRET U.S. Government Psychological Warfare technique is drawn from my personal experience as a White House “Presidential Model” mind-control slave.”

The rest of the second verse describes the powerlessness of a programmed MK slave who cannot help but to obey to the handler’s orders. The slave is a stranger in his own mind.

And you are empowered to do as you please
My mind was lost in translation
And my heart has become a cold and impassive machine

The third verse is about the slave rebelling and attempting to break from his programming.

I won’t let you control my feelings anymore
And I will no longer do as I am told
And I am no longer afraid to walk alone
Let me go
Let me be
I’m escaping from your grip
You will never own me again

During the third verse, things change in the mind of the slave: The moon is free from its cage, the Monarch butterflies are free from the chest and the handler is dead.

During the third verse, things change in the mind of the slave: The moon is free from its cage, the Monarch butterflies are free from the chest and the handler is dead.However, like most stories about Monarch programming, victory is mere illusion.

However, like most stories about Monarch programming, victory is mere illusion.

handler7

As the camera zooms out, we see another, larger handler above the dead handler. In the MK system, there are multiple levels of handlers. Most MK handlers are slaves themselves who are used to carry out the dirty work as superior level handlers oversee the entire process. Notice how the teddy bear now hangs upside down.

In Conclusion

The Handler is one of the most blatant music videos about Monarch mind control in popular culture. However, contrary to other MK-themed pop videos described on this site, the narrative of Muse’s story does not glorify Monarch programming, it goes against it. Does that mean that, despite being signed to a major label, Muse is anti-elite and anti-establishment?

Well, that’s not clear.  As stated in an article in Pseudo-Occult media, there’s a duality that permeates the message and the symbolism of Muse’s works. On one hand, some of their work has a rebellious and revolutionary message but, on the other hand, the band ultimately just adds more occult elite noise in mass media, albeit with a slightly different perspective. While the symbolism of The Handler could not be clearer for someone who knows about Monarch mind control, it still goes way above the heads of regular viewers (read the YouTube comments of the video, you’ll understand).

In the end, the work of Muse accomplishes what symbolism does best: It reveals to those in the know and conceals from those who are not. For this reason, it is up to us to be vigilant citizens and understand what mass media is trying to sell us. Otherwise, we will turn into drones who are controlled by other drones.

The Vigilant Citizen

Protocols of the Learned Elders of Zion • A.K.A • Rothschild’s 25 Point Plan For World Domination

The Goals of the Order of the Illuminati

11108752_10153171581497141_790512384748094937_n

“In 1770, Mayer Amschel Rothschild married Gutta Schnapper. In that same year, he retained Jewish-born, Adam Weishaupt, an apostate Jesuit-trained professor of canon law, to revise and modernize Illuminism, the worship of Satan, with the objective of world domination and the imposition of the Luciferian ideology “upon what would remain of the human race” after a final orchestrated social-cataclysm. In 1773, Mayer summoned twelve wealthy men to Frankfort and asked them to pool their resources, then presented the 25-point plan that would enable them to gain control of the wealth, natural resources and manpower of the entire world.

Those 25 points are:
1. Use violence and terrorism rather than academic discussions.
2. Preach “Liberalism” to usurp political power.
3. Initiate class warfare.
4. Politicians must be cunning and deceptive – any moral code leaves a politician vulnerable.
5. Dismantle “existing forces of order and regulation.” Reconstruct all existing institutions.”
6. Remain invisible until the very moment when it has gained such strength that no cunning or force can undermine it.
7. Use Mob Psychology to control the masses. “Without absolute despotism one cannot rule efficiently.”
8. Advocate the use of alcoholic liquors, drugs, moral corruption and all forms of vice, used systematically by “agenteurs” to corrupt the youth.
9. Seize properties by any means to secure submission and sovereignty.
10. Foment wars and control the peace conferences so that neither of the combatants gains territory placing them further in debt and therefore into our power.
11. Choose candidates for public office who will be “servile and obedient to our commands, so they may be readily used as pawns in our game.”
12. Use the Press for propaganda to control all outlets of public information, while remaining in the shadows, clear of blame.
13. Make the masses believe they had been the prey of criminals. Then restore order to appear as the saviors.
14. Create financial panics. Use hunger to control to subjugate the masses.
15. Infiltrate Freemasonry to take advantage of the Grand Orient Lodges to cloak the true nature of their work in philanthropy. Spread their atheistic-materialistic ideology amongst the “Goyim” (gentiles).
16. When the hour strikes for our sovereign lord of the entire World to be crowned, their influence will banish everything that might stand in his way.
17. Use systematic deception, high-sounding phrases and popular slogans. “The opposite of what has been promised can always be done afterwards… That is of no consequence.”
18. A Reign of Terror is the most economical way to bring about speedy subjection.
19. Masquerade as political, financial and economic advisers to carry out our mandates with Diplomacy and without fear of exposing “the secret power behind national and international affairs.”
20. Ultimate world government is the goal. It will be necessary to establish huge monopolies, so even the largest fortunes of the Goyim will depend on us to such an extent that they will go to the bottom together with the credit of their governments on the day after the great political smash.”
21. Use economic warfare. Rob the “Goyim” of their landed properties and industries with a combination of high taxes and unfair competition.
22. “Make the ‘Goyim’ destroy each other so there will only be the proletariat left in the world, with a few millionaires devoted to our cause, and sufficient police and soldiers to protect our interest.”
23. Call it The New Order. Appoint a Dictator.
24. Fool, bemuse and corrupt the younger members of society by teaching them theories and principles we know to be false.
25 Twist national and international laws into a contradiction which first masks the law and afterwards hides it altogether. Substitute arbitration for law.

Neuropsychological & Electronic No-Touch Torture Report by Dr. Robert Duncan (used on targeted citizens here in the U.S.)

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report


                  Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”     

Perspectives on Enhanced Interrogation Techniques                                                                              Project Proposals for Google Summer of Code 2015

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings.  Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

1.       Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

2.       Memory Erasure
The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

3.       Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

4.       Fear and Terror
There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques the target needs to hear their handler’s voice.  This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

5.       Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

6.       Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

7.       Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

8.       Personal and Spiritual Defamation
In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

9.       Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

10.     Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

11.     Dietary Manipulation, Forced Weakness and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

12.     Repetition
Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind.  During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

13.     Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies.  In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject.  Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

14.     Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

15.     Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

16.     Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering.  All suffering can be entrained into the minds of no-touch torture subjects.

17.     Sleep Deprivation
This is the number one torture method along with the popularity in the press of water boarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

18.     Stress Positions
Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.  Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.  Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.

http://projectsoulcatcher.blogspot.com/2015/03/summary-of-no-touch-torture-techniques.htmlhttp://www.drrobertduncan.com/dr-robert-duncans-neuropsychological-and-electronic-no-touch-torture-report.html

Partial Project Summary History

Project Descriptions

Technologies and Skills

Signal/Image Processing and Pattern Recognition

 
Tank image recognition from satellites 3-D stereoscopic extraction algorithms
Submarine signature recognition from acoustic underwater phased arrays Expert Bayesian system, parameter tuning, phased array signal processing correlogram
Stock market statistical arbitrage Creating models based on financial fluid flow dynamics and correlations of stock prices. Forecasting (Tuck).
Credit card fraud pattern recognition. Spending pattern irregularities alerts
Sound triangulation/sniper system Asymmetric phased arrays and reflection calibration algorithms

Biometric Recognition Systems

 
Face, finger print, retinal, voice and infra-red vascular recognition Feature extraction, registration algorithms, noise removal, large dataset management. Eigenvectors, wavelets, 3-D convolutions, cluster analysis.
Eye gaze tracker Real time image processing. Head rotation modeling.
Truth detection systems Automating polygraph parameter sensors and voice stress. Emotional context modeling through vocabulary templates.
Gesture recognition Hand gestures conversion to computer commands.
Brain Print Recognition Utilizing many samples, human brains have a unique MEG/EEG brain “hum” and cluster analysis can be done to recognize mental illnesses and uniqueness of individuals. (Lockheed Martin is doing research on recognition of precognitive signals of objects. Berkley also just released a paper showing how to discriminate between 1024 visual objects.)

Supercomputing Applications

 
Various projects including FFT optimization Vector Pipeline, BBN Butterfly, Hypercube, Viking Boards
Artificial life simulations, gas lattices Specialized Hardware, genetic and evolutionary algorithms.
Grid computing BEA and Oracle distributed grid computing
Computer generated holography 3-D spatial FFT on BBN’s connection machine. C-paris parallel programming language. Fortran 77.

Speech Recognition/Identification

 
Voice recognition/identification BBN Hark’s system.Markov modeling, n-grams, context probability models, speaker independent models
Models of discourse and planning Studied under world renown Barbara Grosz, graduate school adviser Harvard
Natural Language parsing and AI knowledge networks CIA project. Focused on pronoun reference algorithms.

Biomedical Projects

 
Soldier 2000 project Connecting vital sensors to a wireless bodyLan, DARPA.
Robotic Surgery in Medicine for the Army Hepatic feedback, latency time compensation, tremor filtering, object touch recognition
Virtual Reality in Medicine Overlays of fMRI scans onto patient for real time surgical applications
Virtual Reality 3-D Reconstruction Teleconferencing Carnegie Mellon University. 3-D reconstruction of objects in the teleconference room.
EEG controlled robots Relatively simplistic mental state recognition to control direction of robot. Discriminant function analysis.
Neural network controller for “INFANT” robot Designing robot controllers to learn to grasp objects that mimic human babies. Mentor: Dr. Kuperstein (MIT)
Retraining the brain to interpret tactile feedback as visual information Braille interfacing also used by Navy for Sonar feedback on tongue tactile vision systems.
Research / simulations in cybernetic hive mind work groups (BBN) Increasing the hypothetical efficiency of integrated rapid communication technologies.
Neural network control system for leg muscle stimulation to make paralyzed people walk again Engineering of exoskeleton. Control systems for non-linear biological models due to muscle fatigue.

Digital Circuit/Systems Design

 
Cascadable digital neural network chip VLSI design, production, testing
Wearable ubiquitous computing systems Enhanced reality, enhanced cognition. Heads up display borrowed from NASA for entrepreneurial venture.

Predictive Programming from 1981 Sitcom Explains the Rockefellers’ Trilateral Commission and the NWO Agenda (video)

A short clip from the 1981 sitcom Barney Miller features a kooky man describing the entire NWO agenda to a police officer who clearly thinks he’s crazy.

In this clip, a man who was arrested for entering the offices of the Trilateral Commission, goes into a diatribe about the great power of the Rockefeller family and the elite’s goal to create a one world government. However, the police officers think he’s crazy as the studio audience laughs at his claims. Here’s the clip.

This clip is rather astonishing because the man’s claims, which seemed outlandish in 1981, are now easily verifiable. Furthermore, looking back at how the world evolved, it is difficult to deny that the agenda went exactly as he described. In his 2002 memoirs, David Rockefeller himself wrote:

“Some even believe we are part of a secret cabal working against the best interests of the United States, characterizing my family and me as ‘internationalists’ and of David Rockefellerconspiring with others around the world to build a more integrated global political and economic structure – one world, if you will. If that’s the charge, I stand guilty, and I am proud of it.”
-David Rockefeller, “Memoirs of David Rockefeller” p.405

Displeased with the fact that Japan was not admitted at the Bilderberg meetings, Rockefeller did indeed create the Trilateral Commission, which still holds within its ranks the most powerful people in the world, including several state leaders.

The man in the clip mentions George H. W. Bush, who became Vice President in 1981 (the year the show aired), claiming that Rockefeller “made a call” to make it happen. As you might know, Bush went on to become President of the United States in 1989 … and his son was became President in 2002 … and his other son is working hard to become President as we speak.

The_Trilateral_CommissionBut the Trilateral Commission does not only work with Republicans. Obama was strongly endorsed by the co-founder of the Trilateral Commission, Zbigniew Brzezinski. He stated that Obama “recognizes that the challenge is a new face, a new sense of direction, a new definition of America’s role in the world.” He added: “What makes Obama attractive to me is that he understands that we live in a very different world where we have to relate to a variety of cultures and people.” In September 2007 during a speech on the Iraq war, Obama introduced Brzezinski as “one of our most outstanding thinkers”.

In short, this video is full of facts. But these facts were given by man who’s under arrest … with kooky literature … while a studio audience laughs at him. That’s how mass media spins the truth.

http://vigilantcitizen.com/latestnews/a-prophetic-clip-from-1981-sitcom-explains-the-rockefellers-the-trilateral-commission-and-the-nwo-agenda/?utm_source=wysija&utm_medium=email&utm_campaign=barney+Email

Government Trolls, Handlers and Counter Intelligence Agents & Getting the Word Out About Targeting Programs

Since I began writing this blog January 1, 2012, I have had a government troll who accesses my blog with the following search term: cia; tavistock institute, for, rockefeller.  This government handler troll individual sometimes access this blog up to 6 times daily with this one search term.

You don’t have to be a lifelong target of government subversion, handling, programming or Counter Intelligence Programs to know that this is one of the ways that they want to let me know that they are watching everything that I do and write.  Other than making me aware of general surveillance, it is also to intimidate and to frighten me, which is what targeting is all about–behavioral/mind control.  None of the online surveillance, hacking and censoring have worked–other than the immense amount of time that it takes to correct what they make disappear or censor.  However, the use of technologies to radiate me and cut my body and the use of chemicals have been very effective at diverting my attention from what I have tried to do, at impairing my ability to function and create a need for healing, which takes time.

Here is a screen shot of my search terms to date showing this government troll’s searches to my blog:

Screen Shot 2014-08-09 at 2.11.39 PM

I also deal with constant break-ins and have for over 8 years consistently. I have purchased over 55 high security locks now; to no avail.  I can’t keep them out and I can’t keep my foods from being tampered with, my goods being disposed of or stolen, and all of my clothing, shoes, books and personal items from being heavily vandalized.  They also chemically poison my cat, pluck and cut his whiskers, pull out his fur and cause his ears, feet and anus to bleed with the use of sharp objects.  For a touch of extra torture, I find my cat’s blood smeared around my dwelling and personal items.

Here is a photo that I took in 2012 showing receipts for over 50 high security locks at that time:

A few high-security deadbolt Lock receipts; also add, two security companies and systems, 2 camera systems and 3 DVR's.

A few high-security deadbolt Lock receipts; also add, two security companies and systems, 2 camera systems and 3 DVR’s.

The online attacks have been more severe since I began exposing Linda4444 as a Counter Intelligence Agent who has waged a fierce CoIntelPro attack against me since June 2014.  My Google+ account gets hacked and my comments get routinely removed.  For the whole month of June I was unable to make any Google+ posts or comments.  Most of my postings can be seen at the Google+ Globalist Watch International page where I am “Unwitting Experimentee”.  As you can see, the name that I go by on there incites wonder into whoever sees it before they even read anything that I have to say. The website address to GWI is:  https://plus.google.com/communities/113504931417760953233.   I invite all readers of this blog to check out what I write about and post there, too.

Targeted individuals should consider the Google+ communities to spread information and inform the public about targeted individual programs.  I have belonged to Google+ for less than 6 months; yet I have 117 followers and nearly 180,000 views to the things that I’ve posted.  You share to your circles and to your circles, circles (which are your extended circles).  When you do this, your posts go viral within an hour.  I have seen many of my posts do this and feel that this is the way to get the greatest amount of traffic to our areas of concern.  I am often surprised when I do a post on what is being done through these programs or even to my personal posts about CoIntelPro at how many people share them with their circles.  There is definitely interest and concern for our issues and this is a very effective way of letting others know what we go through.

Never give up and, to the best of your ability in any given day, do not let this program change who you are or what you will do to expose them.  It has been my experience that it won’t affect your targeting much anyway.  I was receiving high tech harassment for years before I started exposing the cowards here.  Although my targeting has increased tremendously since I began to expose Linda4444 in September of 2013, I wouldn’t change a thing as those who lie, bully, harass, manipulate and attempt to control and wage counter intelligence against worthy targets need to be exposed.  I would caution anyone who does not have a strong faith and is not afraid of actually dieing, to leave exposing the Linda Lesker’s of this world to those of us who do.  Linda is and will continue to be exposed, but those who know and aren’t willing to come forward with their experiences with her, should not be disparaged for not doing so for fear of the repercussions.

There is only one true God and he allows for us to be tried in this way.  He has shown me the error of my ways and strengthened my spirit, faith and true following of him through this horrendous experience.  I pray that all targets will see God’s blessing in disguise for their lives as they navigate through these precarious final days of life as we know it.

May God bless you and guide your path~

Lynn

Leuren Moret: DHS/Janet Napolitano using Berkeley, CA as template for overthrow of USA – Organized Gangstalking, EMF Cop Toys, HAARP/Chemtrails, Grid Changes

VANCOUVER, BC – In this Special Exopolitics program with Alfred Lambremont Webre, Independent scientist Leuren Moret, MA, PhD ABD reveals a covert plan initiated January 1, 2014 that targets Berkeley, CA as the first of 100 NWO cities with a template in which DHS (Homeland Security), FEMA, the Nuke “Labs”, and UC President Janet Napolitano employ a coordinated infrastructure of organized gangstalking, electronic cop toys, grid changes, and institutional infiltration as a methodology aimed at the overthrow of the USA.

This new template is based on the Phoenix program originally designed to eliminate all civilian resistance to the US occupation of Vietnam. While she was DHS director, Janet Napolitano entered into agreements with 15 commonwealth nations to provide “Homeland Security” and “FEMA” services.  This new template can be a mechanism for overthrown of nations throughout the world and implementation of a New World Order.

References
http://leurenmoret.info

The Late William Cooper on Psychological Operations

According to the late William Cooper in this 1992 CNN interview, the purpose of PSYCHOLOGICAL OPERATIONS against the public is:

  • INDOCTRINATE THE PUBLIC on what the government wants the public TO PERCEIVE what’s happening,  OR
  • SCARE the researchers AWAY FROM THE TRUTH,  or both.

Regarding  FRAUDULENT INTENT:

I decided that I had to tell the public and get people on the right track.  The right track is, DON’T BELIEVE ANYBODY.  You gotta go out and         GET PROOF in your hand before you can believe anything.  And to do otherwise today, is the BIGGEST MISTAKE ANYONE COULD EVER MAKE.  You begin believing in people–putting your trust in them that they’re telling you the truth and I guarantee you that you’re going to            take a ride on a roller coaster that you don’t want to be on.

Now my attitude is, I just don’t want this to happen anymore.  I am very reluctant to believe what anybody tells me anymore.  Someone who’s really good at it can snow you.  That’s what makes a con man a good con man is that you get the perception that they’re telling you the truth.

https://youtu.be/VBn3lXWhav8