DARPA Scientist Dr. Robert Duncan Interview, 2/28/15–How to Create a “Super Spy”, No-Touch Torture & Trauma-Based Conditioning Programs

Dr. Duncan talks in detail about the technology being used in no-touch torture programs.  He explains more in this video than any other that I’ve seen.  He claims that the technology is being developed to be used on the overall population.

By Steve DiBasio

Robert Duncan is a scientist with multiple degrees from Dartmouth College and Harvard University in Applied Sciences (e.g., artificial intelligence, pattern recognition and robotics) and Business. He has worked on projects for the CIA, Department of Defense, and Department of Justice. In 2004 he testified before the Senate Intelligence Committee, Judiciary Committee, and 23 members of Congress regarding non-consensual experimentation on American citizens.

In 2010 he authored, in partnership with an anonymous consortium of scientists calling themselves the “Mind Hacking Strategy Group,” a book entitled Project: Soul Catcher, Secrets of Cyber and Cybernetic Warfare Revealed.  He has appeared on the radio show Coast To Coast and was interviewed by Jesse Ventura for the “Brain Invaders” episode of the television program Conspiracy Theory. [1]

I cited Duncan’s work in an article I wrote for Veterans Today and Nexus Magazine called “Mind Control In The 21st Century” (Part I and Part II). Recently I had the opportunity to speak with him.

In the interview posted below we discuss, among other topics, remote “mind reading,” CIA hive mind experimentation (multiple people sharing the same mental “space”), how people can be targeted and tracked remotely via their energy signature or “brain print,” the existence and use of a technology for remotely “cloning” or “copying” thoughts, emotions and other states (including intense pain) onto a target, [2] and how a weapons system capable of totalitarian control has been developed (with non-consensual and often-times brutal experimentation on civilians ongoing).

Duncan also reveals that many people are now in wireless mental contact with artificial intelligence run on supercomputers.

It is worth noting that current research projects, according to Duncan, have targeted people from all walks of life, not merely (or mainly) the “downtrodden,” as was done in the past.

Some of these targets are threatened with harm to themselves or family members if they do not carry out the instructions of their “handler,” or are promised release from their tortures if they perform some action. [3]

For example, Myron May, the Florida State University shooter, a former assistant district attorney, posted on Facebook before the shooting:

Has anyone been asked to kill promise of freedom

Duncan, who has interviewed many targets, has said that he immediately recognized the “torture script” used on May after listening to a recording in which May discusses his ordeal.

Perhaps most frightening is Duncan’s contention that the scalability of this technology is being tested: “…[A] lot of people won’t believe me and that’s fine. But they’re increasing this. They are scaling this technology to the entire population.

[1] A partial summary history of his work (classification prevents full disclosure) includes: Tank recognition from satellites, submarine signature recognition from acoustic underwater phased arrays, stock market statistical arbitrage, voice and vascular signature recognition, truth detection systems, robotic surgery in medicine, EEG controlled robots, and “brain print” recognition.

[2] The technology is called “EEG Cloning” or “EEG Heterodyning.” The brain patterns (electromagnetic signals) “cloned” onto the target may be catalogued brain patterns stored in computers, though live signals from a “real person’s” brain could also be transmitted to the target.

[3] The handler communicates with the target through a technology for transmitting voices into people’s heads which goes by many names, including “voice to skull,” synthetic telepathy,” “microwave hearing,” and the “Frey effect.” The communication may also be accomplished via EEG heterodyning, which involves “re-mapping the auditory cortex of the human brain.”  Other technologies for transmitting voices include “ultrasonic heterodyning” and bone conduction techniques.

http://www.veteranstoday.com/2015/03/01/its-the-ultimate-weapon/

See also: 

http://www.veteranstoday.com/2014/03/10/mind-control-in-the-21st-century/                                                                                                                                 https://gangstalkingsurfers.wordpress.com/2015/02/13/cia-engineer-dr-robert-duncan-targeted-individual-tyrone-dew-explain-directed-energy-weapons-mind-control-used-on-aaron-alexis-myron-may/

https://gangstalkingsurfers.wordpress.com/2015/02/12/cia-engineer-dr-robert-duncan-on-wheel-of-freedom-show-2915-the-psychology-of-torture-targeted-individualstechnical-methods-tactics/

https://gangstalkingsurfers.wordpress.com/2014/02/23/deborah-tavares-dr-robert-duncan-dr-john-hall-dr-terry-andersen-t-i-friends-the-pete-santilli-radio-show-22214/

Advertisements

CIA Engineer Dr. Robert Duncan & Targeted Individual Tyrone Dew Explain Directed Energy Weapons & Mind Control Used on Aaron Alexis & Myron May


Dr. Robert Duncan’s books:                                                                                                                                                   Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed
How to Tame a Demon: A short practical guide to organized intimidation stalking, electronic torture, and mind control

Tyrone Dew’s book:
Illuminati Got Me!  Satellite Directed Energy Weaponry Terrorism

Strange New “2014” Addition to the Georgia Guidestones

A new block on which is inscribed “2014” was recently added to the Georgia Guidestones. This eerie and mysterious monument just became even more eerie and mysterious.
georgia-guidestones-2014-block-e1411483403342
In my article Sinister Sites : The Georgia Guidestones, I took a thorough look at the Georgia Guidestones and at its ominous message for humanity. In short, it is all about massive depopulation, world government, a single language and a single religion. While this monument was built in 1980, its “commandments” keep increasing in relevancy as the world elite steers the masses towards a New World Order.

A recent addition to the monument- a block on which is inscribed 2014 – was placed inside an indent between the English and the Spanish slab. While apparently trivial, this block nevertheless proves that the Guidestones is still updated by its sponsors and that its message is, more than ever, relevant in 2014.

Why is 2014 inscribed on that block? Will an event lead to the fruition of one of the Guidestones’ commandments in 2014? Considering the fact that the first commandment is about maintaining the world population under 500 million, this is somewhat disturbing.

Another recent addition to the monuments is camera surveillance.
30329_1210067630211_1784351392_390326_658797_n-e1411485629753It is rather appropriate that a monument celebrating the New World Order is “under video surveillance at all times”.

30329_1210065030146_1784351392_390319_6629138_n-e1411485676643

The Georgia Guidestones is therefore not abandoned but alive and well. The monument is maintained, updated and monitored. In short, the commandments inscribed on the stones are not a philosophical fantasy dreamt up by strange people 34 years ago, it is a concrete plan that firmly believed in by the elite.

Source:  http://vigilantcitizen.com/sinistersites/new-strange-2014-addition-georgia-guidestones/

Government Trolls, Handlers and Counter Intelligence Agents & Getting the Word Out About Targeting Programs

Since I began writing this blog January 1, 2012, I have had a government troll who accesses my blog with the following search term: cia; tavistock institute, for, rockefeller.  This government handler troll individual sometimes access this blog up to 6 times daily with this one search term.

You don’t have to be a lifelong target of government subversion, handling, programming or Counter Intelligence Programs to know that this is one of the ways that they want to let me know that they are watching everything that I do and write.  Other than making me aware of general surveillance, it is also to intimidate and to frighten me, which is what targeting is all about–behavioral/mind control.  None of the online surveillance, hacking and censoring have worked–other than the immense amount of time that it takes to correct what they make disappear or censor.  However, the use of technologies to radiate me and cut my body and the use of chemicals have been very effective at diverting my attention from what I have tried to do, at impairing my ability to function and create a need for healing, which takes time.

Here is a screen shot of my search terms to date showing this government troll’s searches to my blog:

Screen Shot 2014-08-09 at 2.11.39 PM

I also deal with constant break-ins and have for over 8 years consistently. I have purchased over 55 high security locks now; to no avail.  I can’t keep them out and I can’t keep my foods from being tampered with, my goods being disposed of or stolen, and all of my clothing, shoes, books and personal items from being heavily vandalized.  They also chemically poison my cat, pluck and cut his whiskers, pull out his fur and cause his ears, feet and anus to bleed with the use of sharp objects.  For a touch of extra torture, I find my cat’s blood smeared around my dwelling and personal items.

Here is a photo that I took in 2012 showing receipts for over 50 high security locks at that time:

A few high-security deadbolt Lock receipts; also add, two security companies and systems, 2 camera systems and 3 DVR's.

A few high-security deadbolt Lock receipts; also add, two security companies and systems, 2 camera systems and 3 DVR’s.

The online attacks have been more severe since I began exposing Linda4444 as a Counter Intelligence Agent who has waged a fierce CoIntelPro attack against me since June 2014.  My Google+ account gets hacked and my comments get routinely removed.  For the whole month of June I was unable to make any Google+ posts or comments.  Most of my postings can be seen at the Google+ Globalist Watch International page where I am “Unwitting Experimentee”.  As you can see, the name that I go by on there incites wonder into whoever sees it before they even read anything that I have to say. The website address to GWI is:  https://plus.google.com/communities/113504931417760953233.   I invite all readers of this blog to check out what I write about and post there, too.

Targeted individuals should consider the Google+ communities to spread information and inform the public about targeted individual programs.  I have belonged to Google+ for less than 6 months; yet I have 117 followers and nearly 180,000 views to the things that I’ve posted.  You share to your circles and to your circles, circles (which are your extended circles).  When you do this, your posts go viral within an hour.  I have seen many of my posts do this and feel that this is the way to get the greatest amount of traffic to our areas of concern.  I am often surprised when I do a post on what is being done through these programs or even to my personal posts about CoIntelPro at how many people share them with their circles.  There is definitely interest and concern for our issues and this is a very effective way of letting others know what we go through.

Never give up and, to the best of your ability in any given day, do not let this program change who you are or what you will do to expose them.  It has been my experience that it won’t affect your targeting much anyway.  I was receiving high tech harassment for years before I started exposing the cowards here.  Although my targeting has increased tremendously since I began to expose Linda4444 in September of 2013, I wouldn’t change a thing as those who lie, bully, harass, manipulate and attempt to control and wage counter intelligence against worthy targets need to be exposed.  I would caution anyone who does not have a strong faith and is not afraid of actually dieing, to leave exposing the Linda Lesker’s of this world to those of us who do.  Linda is and will continue to be exposed, but those who know and aren’t willing to come forward with their experiences with her, should not be disparaged for not doing so for fear of the repercussions.

There is only one true God and he allows for us to be tried in this way.  He has shown me the error of my ways and strengthened my spirit, faith and true following of him through this horrendous experience.  I pray that all targets will see God’s blessing in disguise for their lives as they navigate through these precarious final days of life as we know it.

May God bless you and guide your path~

Lynn

Saul Alinsky’s 12 Rules For Radicals That The Globalists Are Using To Divide & Conquer and Bring About The NWO

Rules_for_RadicalsThe Globalists are using the Hegelian Dialectic and Social Engineering that is filtered down to society through front organizations of The Tavistock Institute of Human Relations. Please see my previous post about Tavistock with the video to read more about these organizations and about how they are bringing about their “Big Society” and implementing the “Communitarian Agenda” to bring about Agenda 21 global mind control.

Here are Saul Alinsky’s 12 Rules For Radicals that they are using to divide and conquer (the Hegelian Dialectic) and bring about the New World Order through global mind control.

The Rules

•RULE 1: “Power is not only what you have, but what the enemy thinks you have.” Power is derived from 2 main sources – money and people. “Have-Nots” must build power from flesh and blood.

•RULE 2: “Never go outside the expertise of your people.” It results in confusion, fear and retreat. Feeling secure adds to the backbone of anyone.

•RULE 3: “Whenever possible, go outside the expertise of the enemy.” Look for ways to increase insecurity, anxiety and uncertainty.

•RULE 4: “Make the enemy live up to its own book of rules.” If the rule is that every letter gets a reply, send 30,000 letters. You can kill them with this because no one can possibly obey all of their own rules.

•RULE 5: “Ridicule is man’s most potent weapon.” There is no defense. It’s irrational. It’s infuriating. It also works as a key pressure point to force the enemy into concessions.

•RULE 6: “A good tactic is one your people enjoy.” They’ll keep doing it without urging and come back to do more. They’re doing their thing, and will even suggest better ones.

•RULE 7: “A tactic that drags on too long becomes a drag.” Don’t become old news.

•RULE 8: “Keep the pressure on. Never let up.” Keep trying new things to keep the opposition off balance. As the opposition masters one approach, hit them from the flank with something new.

•RULE 9: “The threat is usually more terrifying than the thing itself.” Imagination and ego can dream up many more consequences than any activist.

•RULE 10: “If you push a negative hard enough, it will push through and become a positive.” Violence from the other side can win the public to your side because the public sympathizes with the underdog.

•RULE 11: “The price of a successful attack is a constructive alternative.” Never let the enemy score points because you’re caught without a solution to the problem.

•RULE 12: “Pick the target, freeze it, personalize it, and polarize it.” Cut off the support network and isolate the target from sympathy. Go after people and not institutions; people hurt faster than institutions

http://en.wikipedia.org/wiki/Rules_for_Radicals

Tavistock Institute, Agenda 21, Social Engineering & Global Mind Control

The Tavistock Institute, The British Psychological Society, The British Academy of Social Sciences and The Political Studies Association of the UK are in charge of social change (i.e. global mind control) and the Agenda 21 Social Engineering in the UK, European Union and the United States.

Tavistock Institute’s Social Dreaming experiments studied people and programmed them through limited choice as to what their aspirations really were and analyzed the psychology of what goes on in people’s minds. They create the psychology and then they bring it down and implement it through these organizations.

The change that they are instituting is the “Big Society”. They are programming us through the “Communitarian Agenda” of the UK and European Union.They are driving social change and social policy through their “Communitarian Agenda” which provides limited choices and is nothing less than global mind control.  They are creating a divide and rule “Big Society” that serves the Globalist’s Agenda 21 and Transhumanism goals through methods of global mind control.

They use companies established to implement the change such as:  https://unltd.org.uk, http://locality.org.uk and http://www.regenerate.co.uk, using subversive techniques to filter down the limited choices and social changes using the Hegelian (divide and conquer) Dialectic. They target people that they want to agitate; then come in with the pre-planned solution. They are using this network to institute their programming throughout society to serve their global Agenda 21 goals.

This “Big Society” is using Saul Alinsky’s 12 Rules For Radicals (doing anything that it takes) and implementing social engineering and global mind control using society and the United Nations to implement and institute global mind control.

PLEASE READ THE FOLLOWING INFORMATION:
http://en.wikipedia.org/wiki/Big_Society
http://en.wikipedia.org/wiki/Communitarianism
http://en.wikipedia.org/wiki/Rules_for_Radicals
https://gangstalkingsurfers.wordpress.com/2012/12/28/tavistock-agenda-revealed-fascist-america-2012/

July 4, 2014 Show With Deborah Tavares & Ron Angell About the Prolific Use of Directed Energy Weapons & Microwave Mind Control On An Increasing Number of American Citizens

Please listen to this as it wastes no time getting to the human right’s violation of experimentation and use of directed energy microwave weapons to torture and mind control the American populous. Thanks!

In Sheep’s Clothing–Identifying the Tactics of Manipulative People: A Primer on Linda4444’s Tactics

Linda4444 Disinformation Agent

In-Sheeps-ClothingAn Excerpt from the book:
In Sheep’s Clothing by George K. Simon

Two Basic Types of Aggression
There are two basic types of aggression: overt-aggression and covert-aggression. When you’re determined to have something and you’re open, direct and obvious in your manner of fighting, your behavior is best labeled overtly aggressive. When you’re out to “win,” dominate or control, but are subtle, underhanded or deceptive enough to hide your true intentions, your behavior is most appropriately labeled covertly aggressive. Now, avoiding any overt display of aggression while simultaneously intimidating others into giving you what you want is a powerfully manipulative maneuver. That’s why covert-aggression is most often the vehicle for interpersonal manipulation.

Acts of Covert-Aggression vs. Covert-Aggressive Personalities
Most of us have engaged in some sort of covertly aggressive behavior from time to time. Periodically trying to manipulate a person or a situation doesn’t make someone a covert-aggressive personality…

View original post 2,528 more words

The Late William Cooper on Psychological Operations

According to the late William Cooper in this 1992 CNN interview, the purpose of PSYCHOLOGICAL OPERATIONS against the public is:

  • INDOCTRINATE THE PUBLIC on what the government wants the public TO PERCEIVE what’s happening,  OR
  • SCARE the researchers AWAY FROM THE TRUTH,  or both.

Regarding  FRAUDULENT INTENT:

I decided that I had to tell the public and get people on the right track.  The right track is, DON’T BELIEVE ANYBODY.  You gotta go out and         GET PROOF in your hand before you can believe anything.  And to do otherwise today, is the BIGGEST MISTAKE ANYONE COULD EVER MAKE.  You begin believing in people–putting your trust in them that they’re telling you the truth and I guarantee you that you’re going to            take a ride on a roller coaster that you don’t want to be on.

Now my attitude is, I just don’t want this to happen anymore.  I am very reluctant to believe what anybody tells me anymore.  Someone who’s really good at it can snow you.  That’s what makes a con man a good con man is that you get the perception that they’re telling you the truth.

https://youtu.be/VBn3lXWhav8

The Art of Deception: Training for Online Covert Operations

I found this information on prayerwarriorpsychicnot’s blog that can be found at http://taknbsorbemwon5.wordpress.com.

I consider it a very good find as it is the playbook for online psyops.

Featured photo - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Original article:  https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/