Etiket arşivi: MIND CONTROL

MK ULTRA PROJECT /// VİDEO : Gold against Mind Control

Millions of healthy and normal people all over the world complain about hearing foreign voices in their skull (v2k), about being targeted by unknown radiation; about being tormented and raped by this radiation, about gang stalking, about that someone is able to read their thoughts and making comments on them, about getting their memories hacked, about somebody seeing with their eyes/hearing with their ears and commenting those signals.

Those people are called targeted individuals (ti). Their number is constantly growing.

Every day since I started recording live interviews with ti’s about 3 years ago, I receive at least one e-mail, one phone call or one letter from a desperate ti from all corners in the world. They contact me because I take them serious and listen to them. I do not go into the evil and carefully designed trap that claims, they are mentally ill. I studied the research from David Icke, Cathy O’Brien, Helmut Lammer och Heiner Gehring that opened my eyes for this covert technology, which targets people since more than 60 years.

The majority of the ti’s are not aware that they are targeted. Otherwise the mental enslavement would not work. But a growing minority is aware of the technology and complain. Thanks to the Internet they can learn about other ti’s and realize that they are not crazy or alone.

I felt always very miserable that I could not offer help to all the suffering ti’s. The radiation penetrates every material and part of the body. The first ti reaction is to build a shelter with shielding material against electromagnetic radiation, tin foiled hats for example. But that does not help. Those using the electronic harassment mock about the ti’s and use corrupt journalists and doctors to spread the mockery in order to hide the torture technology.

We found out that the secret services of Russia, USA, Israel and Sweden developed the mind control technology using a secret physics: scalar waves. Since the death of James Clerk Maxwell 1879 physicists forged intentionally the Maxwell field equations and put the part describing the scalar waves wrongly to zero, so that today only the electromagnetic wave is explained by the Maxwell equation torso. Thanks to physics professor Konstantin Meyl do we now know a lot about scalar waves. Those being relevant for our body are the magnetic scalar waves. They transport neutrinos quicker than light and penetrate everything, even the whole earth. They transport both, energy and information, enabling them to transfer holographic 3d coloured pictures and thoughts, not build up by pixels.

After long research and waiting I got a hint in Germany about a year ago, that gold protects against mind control. Gold emits destructive interference against scalar waves disturbing the resonance between the chip/DNA in a ti and the beamer in the hands of a criminal secret agent or doctor.

Real ti’s don’t have money, so they can’t afford gold. That’s why we found out that homeopathic gold (aurum metallicum) helps. It is very cheap and available in most countries. Homeopathy does not help with chemical instruments but with physical, simply by waves, constructive and destructive interference. The potencies D12, D30 and C100 gave best results with a lot of ti’s that tested it. Side effects are not known.

We started 2013 a European ti association: European Coalition against Covert Harassment (EUCACH), seated in Sweden. Everybody may become a member.

Listen now to my interview with the most famous ti, Magnus Olsson from Sweden and managing director of EUCACH, about his very liberating experience with homeopathic gold during 2013.

VİDEO LİNK :

MK ULTRA PROJECTS : The Secrets of Mind Control

The Mind Control Cover-up 10-Page Summary

The Secrets of Mind Control

Based on Three Books by Top Mind Control Researchers

This summary is based on three landmark books: Bluebird by Colin A. Ross MD, a leading Canadian psychiatrist; Mind Controllers by Dr. Armen Victorian; and A Nation Betrayed by recovered mind control victim Carol Rutz. All three authors provide hundreds of footnotes to support their research. We’ve included footnotes here as well. A significant amount of their work is based on 18,000 pages of declassified CIA documents on mind control. You can order these documents in CD format from the government by following the directions at the end of this document. Join in powerfully building a better world for all by spreading the word.

The Secret Agenda

Please note: the letters and numbers after each paragraph denote the book and page from which the information given was taken. BB stands for Bluebird ; MC for Mind Controllers; NB for A Nation Betrayed. To order these books, see our Resource List: www.WantToKnow.info/resources#mindcontrol

A declassified CIA document dated 7 January 1953[1] with a section heading “Outline of Special H Cases” describes the experimental creation of multiple personality in two 19-year old girls by the CIA. “H” is used as shorthand for hypnotic, hypnotized, or hypnotism in these documents: “These subjects have clearly demonstrated that they can pass from a fully awake state to a deep H controlled state by telephone, by receiving written matter, or by the use of code, signal, or words, and that control of those hypnotized can be passed from one individual to another without great difficulty. It has also been shown by experimentation with these girls that they can act as unwilling couriers for information purposes.” BB 32

After the end of World War II, German scientists were being held in a variety of detainment camps by the allies and Russians. In 1946, President Truman authorized Project Paperclip[2][3][4] to exploit German scientists for American research, and to deny these intellectual resources to the Soviet Union. Some reports bluntly pointed out that they were “ardent Nazis.” They were considered so vital to the “Cold War” effort, that they would be brought into the US and Canada. Some of these experts were accused of participating in murderous medical experiments on human subjects at concentration camps. A 1999 report to the Senate and the House said that “between 1945 and 1955, 765 scientists, engineers, and technicians were brought to the US under Paperclip and similar programs.”[5] BB 3, NB xi, xii

According to the Central Intelligence Agency’s Fact Book,[6] the NSC (National Security Council) and the CIA were established under the provisions of the National Security Act of 1947. In December 1947, the NSC held its first meeting. James Forrestal, the Secretary of Defense, pushed for the CIA to begin a ‘secret war’ against the Soviets. Forrestal’s initiative led to the execution of psychological warfare operations (psy-ops) in Europe. CIA personnel were not opposed to working with Nazi doctors who had proven to be proficient in breaking the mind and rebuilding it. In some cases military bases were used to hide these covert activities. It was decided that the communist threat was an issue that took priority over constitutional rights. MC 1, 3, 7, 8, NB xvii

The concept of running a secret ‘black’ project was no longer novel. In 1941,[7] Roosevelt had decided, without consulting Congress, that the US should proceed with the utmost secrecy to develop an atomic bomb. Secrecy shrouded the Manhattan Project (the atomic bomb program) to the extent that Vice President Harry Truman knew nothing about it. The project meant that by 1947, the US Government had already gained vast experience in the initiation of secret operations. The existence of ‘black projects’ funded by ‘black budgets’ was withheld not only from the public, but also from Congress for reasons of national security. MC 8-10

A declassified CIA document[8] “Hypnotic Experimentation and Research, 10 February 1954” describes a simulation of relevance to the creation of unsuspecting assassins: “Miss [whited out] was instructed (having previously expressed a fear of firearms in any fashion) that she would use every method at her disposal to awaken Miss [whited out] (now in a deep hypnotic sleep). Failing this, she would pick up a pistol nearby and fire it at Miss [whited out]. She was instructed that her rage would be so great that she would not hesitate to “kill” [whited out] for failing to awaken. Miss [whited out] carried out these suggestions to the letter including firing the (unloaded) gun at [whited out] and then proceeded to fall into a deep sleep. Both were awakened and expressed complete amnesia for the entire sequence. Miss [whited out] was again handed the gun, which she refused (in an awakened state) to pick up or accept form the operator. She expressed absolute denial that the foregoing sequence had happened.” BB 36, 37

One of the main areas to be investigated by the CIA was mind control. The CIA’s human behavior control program was chiefly motivated by perceived Soviet, Chinese, and North Korean use of mind control techniques. Under the protection of ‘national security,’ many other branches of the government also took part in the study of this area. The CIA originated its first program in 1950 under the name BLUEBIRD, which in 1951, after Canada and Britain had been included, was changed to ARTICHOKE. MKULTRA officially began in 1953.[9] Technically it was closed in 1964, but some of its programs remained active under MKSEARCH well into the 1970s. In 1973, tipped off about forthcoming investigations, CIA Director Richard Helms ordered the destruction of any MKULTRA records. MC 10, 17

Diligent use of the Freedom of Information Act (FOIA) helps to cast light on the advances that have been made in controlling the way people think and act. In 1977, through an FOIA request, 16,000 pages of documents were found, held as part of the Agency’s financial history. The FOIA allows the most humble citizen to demand the disclosure of documents, although inevitably some will be heavily censored or not released at all. That is how much of this information has been pieced together. MC 5 NB, xvi, xvii

Inevitably, however, it is an incomplete picture. Most of the important details[10] were conveniently destroyed under orders of CIA Director Helms to conceal wrongdoing. What the mind controllers were and are doing may be only hinted at in a memo footnote or in the memoirs of a retired researcher. Nevertheless, there is more than enough here to show that secret new techniques are being exploited that are no longer in the realm of science fiction. We must all be aware of this threat, so that those who wish to take liberties with democracy, and with our freedom to think, are deterred. MC 6, NB xvii For more, click here.

The CIA Mind Control Projects

Project BLUEBIRD was approved by the director of the CIA on April 20, 1950. In a 1951 memo,[11] Bluebird states that practical research was to be conducted to include these specific problems:

· Can we create by post-H control an action contrary to an individual’s basic moral principles?

· Can we in a matter of an hour, two hours, one day, etc., induce an H [hypnotic] condition in an unwilling subject to such an extent that he will perform an act for our benefit?

· Could we seize a subject and in the space of an hour or two by post-H control have him crash an airplane, wreck a train, etc.?

· Can we by H and SI techniques force a subject to travel long distances, commit specified acts and return to us or bring documents or materials?

· Can we guarantee total amnesia under any and all conditions?

· Can we “alter” a person’s personality?

· Can we devise a system for making unwilling subjects into willing agents and then transfer that control to untrained agency agents in the field by use of codes or identifying signs?

· How can sodium A or P[12] or any other sleep inducing agent be best concealed in a normal or commonplace item, such as candy, cigarettes, coffee, tea, beer, medicines? NB 13, 14, BB 23

Officially, MKULTRA was established on 13 April 1953, at Richard Helms’ suggestion[13] as “ultra sensitive work.” The operational wing of MKULTRA, known as MKDELTA, had as its mission to find out how to use chemical and biological weapon ingredients to alter the human mind. Originally established as a supplementary funding mechanism to the ARTICHOKE project, MKULTRA quickly grew into a mammoth undertaking that outflanked earlier mind control initiatives. MC 69, NB 28

A memorandum from Richard Helms,[14] Acting Deputy Director to CIA Director Allen Dulles dated 3 April 1953 and entitled “Two Extremely Sensitive Research Programs” (MKULTRA and MKDELTA) includes the statement, “Even internally in CIA, as few individuals as possible should be aware of our interest in these fields and of the identity of those who are working for us. At present this results in ridiculous contracts which do not spell out the scope or intent of the work.” BB 125

The memorandum below was written 10 years later to Helms, who by then had become CIA Director.

26 July 1963, MEMORANDUM FOR: Director of Central Intelligence[15]

SUBJECT: Report of Inspection, MKULTRA

It was deemed advisable to prepare the report of the MKULTRA program in one copy only, in view of its unusual sensitivity. Normal procedures for project approval, funding, and accounting were waived. The program requires the services of highly specialized authorities in many fields of natural science. The concepts involved in manipulating human behavior are found by many people both within and outside the Agency to be distasteful and unethical. Nevertheless, there have been major accomplishments both in research and operational employment.

Over the ten-year life of the program many additional avenues to the control of human behavior have been designated under the MKULTRA charter, including radiation, electro-shock, harassment substances, and paramilitary devices. Some MKULTRA activities raise questions of legality implicit in the original charter. A final phase of the testing of MKULTRA products places the rights and interests of US citizens in jeopardy. Public disclosure of some aspects of MKULTRA activity could induce serious adverse reaction in US public opinion.

TSD [Technical Services Division of CIA] initiated a program for covert testing of materials on unwitting US citizens in 1955. TSD has pursued a philosophy of minimum documentation in keeping with the high sensitivity of some of the projects. Some files contained little or no data at all. There are just two individuals in TSD who have full substantive knowledge of the program and most of that knowledge is unrecorded. In protecting the sensitive nature of the American intelligence capability to manipulate human behavior, they apply “need to know” doctrine to their professional associates to a maximum degree.

J.S. Earman, Inspector General NB 108-113

The Senate Intelligence Committee did find some records during its investigation in 1976.[16] However it noted that the practice of MKULTRA was “to maintain no records of the planning and approval of test programs.” Miles Copeland, a former CIA officer, said, “The congressional sub-committee which went into this got only the barest glimpse.”[17] Senator Frank Church, who led the congressional investigations of the CIA’s unlawful actions, said that the agency was “a rogue elephant” operating above the law as it plotted assassinations, illegally spied on thousands of Americans, and even drugged our own citizens in its effort to develop new weapons for its covert arsenal.” MC 13, 18, NB 38

The focal point of MKULTRA was the use of humans as unwitting subjects [without their knowledge or consent]. The CIA sponsored numerous experiments of this kind. Regardless of a report by the CIA’s Inspector General in 1963 recommending the termination of testing on unwitting subjects, future CIA Director Richard Helms continued to advocate covert testing on the grounds that “we are less capable of staying up with the Soviet advances in this field.” On the subject of moral issues, Helms commented, “we have no answer to the moral issue.”[18] MC 18 For more, click here.

The Experience of CIA Mind Control Victim Carol Rutz[19]

The CIA bought my services from my grandfather in 1952 starting at the tender age of four.[20] Over the next 12 years, I was tested, trained, and used in various ways. Electroshock, drugs, hypnosis, sensory deprivation, and other types of trauma were used to make me compliant and split my personality [create multiple personalities for specific tasks]. Each alter or personality was created to respond to a post-hypnotic trigger, then perform an act and not remember it later. This “Manchurian Candidate” program was just one of the operational uses of the mind control scenario by the CIA. Your hard-earned tax dollars supported this.

As a survivor of CIA programs Bluebird/Artichoke and MKULTRA, I began my intense search to document some of the mind control experiments that I was made part of. Through a series of FOIA requests to various departments of the government, 48 years after I was first experimented on, I found solid proof of my memories—proof that was in the government vaults of the nearly 18,000 pages of declassified documents from the Bluebird/Artichoke and MKULTRA programs.

One of the declassified documents[21] states, “Learning studies will be instituted in which the subject will be rewarded or punished for overall performance and reinforced in various ways—with electric shock, etc. In other cases, drugs and psychological tricks will be used to modify attitudes. The experimenters will be particularly interested in dissociative states [multiple personality]. An attempt will be made to induce a number of states of this kind, using hypnosis.” The government had finally handed me the validation I had been searching for. NB xvii, xviii

The basic premise of the book The Manchurian Candidate[22] is that a group of American POWs in the Korean War is brainwashed while crossing through Manchuria to freedom. They arrive back in the US amnesic for the period of brainwashing. One of them is programmed to be an assassin. His target is a candidate for president of the US. His handlers control him with a hypnotically implanted trigger. BB 23

In an experiment described in a document entitled “SI and H experimentation[23] (25 September 1951),” two female subjects took part in an exercise involving the planting of a bomb. Both subjects performed perfectly and were fully amnesic for the exercise: “[Whited out] was instructed that upon awakening, she would proceed to [whited out] room where she would wait at the desk for a telephone call. Upon receiving the call, a person known as “Jim” would engage her in normal conversation. During the course of the conversation, this individual would mention a code word. When she heard this code word, she would pass into a SI trance state, but would not close her eyes and remain perfectly normal and continue the telephone conversation.

She was told that upon conclusion of the telephone conversation, she would carry out instructions: [Whited out] was shown an electric timing device. She was informed that this device was a bomb, and was then instructed how to attach and set the device. After [whited out] learned how to set and attach the device, she was told to take the timing device which was in a briefcase, and proceed to the ladies room. In the ladies room, she would be met by a girl whom she had never seen who would identify herself by the code word “New York.” [whited out] was then to show this individual how to attach and set the timing device and further instructions would be given that the timing device was to be carried in the briefcase to [whited out] room, placed in the nearest empty electric-light plug and concealed in the bottom, left-hand drawer of [whited out] desk, with the device set for 82 seconds and turned on.” BB 37, 38

The Mind Control Doctors

In the second half of the 20th century, mind control projects resulted in extensive political abuse of psychiatry in North America. Many thousands of prisoners and mental patients were subjected to unethical mind control experiments by leading psychiatrists and medical schools. Organized academic psychiatry has never acknowledged this history. The network of mind control doctors involved has done a great deal of harm to the field of psychiatry and to psychiatric patients. BB, pg. K

The work of the mind control doctors did not occur in a vacuum. The importation of Nazi doctors to the US through secret programs like PAPERCLIP is part of the context. Mind control experimentation was not only tolerated by medical professionals, but published in psychiatric and medical journals.[24] The climate was permissive, supportive, and approving of mind control experimentation. BB 1

Dr. William Sweet[25] participated in both brain electrode implant experiments and the injection of uranium into medical patients at Harvard University. The 925-page Final Report. Advisory Committee on Human Radiation Experiments[26] tells the story of the radiation experiments, and their linkage to mind control. BB 1

Martin Orne[27][28][29] is one of the leading experts on hypnosis of the 20th century. For about 30 years, he was the editor of The International Journal of Clinical and Experimental Hypnosis. Dr. Orne is one of two psychiatrists professionally still active into the late 1990’s who is a documented CIA mind control contractor (along with Dr. Louis Jolyon West). BB 121, 124

P. Janet[30] asked a “deeply hypnotized female to commit several murders before a distinguished group of judges, stabbing some victims with rubber daggers and poisoning others with sugar tablets.” The hypnotized subject did all these things without hesitation. MC 160

Army doctors were actively involved in LSD testing at least until the late 1970’s. Subjects of LSD experiments included children as young as five years old, and brain electrodes were implanted in children as young as 11 years of age. Four of the CIA’s MKULTRA Subprojects were on children. The mind control doctors included presidents of the American Psychiatric Association and psychiatrists who received full-page obituaries in the American Journal of Psychiatry. Responsibility for the unethical experimentation lies first with the individual doctors, but also collectively with the medical profession, and with academia as a whole. BB 21

The MKULTRA contractor about whom the most has been written is Dr. Ewen Cameron.[31][32][33][34][35] At various times, Dr. Cameron was President of the American, Canadian, and World Psychiatric Associations. He was one of four co-founders of the World Psychiatric Association. Dr. Cameron began conducting unethical, unscientific, and inhumane brainwashing experiments in the 1930’s. Schizophrenic patients were forced to lie naked in red light for eight hours a day for periods as long as eight months. Another experiment involved overheating patients in an electric cage until their body temperatures reached 102 degrees. BB 125-128

From January 1957 until September 1960, Dr. Cameron’s project received $64,242.44 in CIA funds.[36] When the CIA stopped funding him, Cameron received $57,750 from the Canadian government to continue his research from 1961 to 1964.[37] The actual number of patients[38] on whom Cameron tried varieties of his experimental techniques is reported as 332. NB 52, 53

Linda MacDonald was a victim of Dr. Ewen Cameron’s unethical, destructive mind control experiments in 1963. Dr. Cameron used a “treatment” which involved intensive application of three brainwashing techniques; drug disinhibition, prolonged sleep, and prolonged psychological isolation. These were combined with ECT [Electro Convulsive Therapy] treatments.[39][40][41] The amount of electricity introduced into Linda’s brain exceeded by 76.5 times the maximum amount recommended in the ECT Guidelines of the American Psychiatric Association. Dr. Cameron’s “depattering” technique resulted in permanent and complete amnesia. Dr. Cameron proved that doctors skilled in the right procedures can erase a subject’s memory. To this day, Linda MacDonald is unable to remember anything from her birth to 1963. As recorded by nurses in her chart, Linda was completely disoriented. She didn’t know her name, age or where she was. She didn’t recognize her children. She couldn’t read, drive, cook, or use a toilet. Not only did she not know her husband, she didn’t even know what a husband was. BB 181-183

Life changed for Linda when the Canadian Broadcasting Corporation program, The Fifth Estate, aired a segment on Dr. Cameron on January 17, 1984. A Vancouver newspaper ran a full-page story on Robert Loggie, a Vancouver man who had been experimented on by Dr. Cameron. Loggie was a plaintiff in the class action suit against the CIA for Dr. Cameron’s MKULTRA experiments, which was settled out of court for $750,000, divided among the eight plaintiffs in 1988.[42] Eventually Linda got $100,000 plus legal fees from the Canadian government. BB 187, 188

J.G. Watkins “induced a soldier to strike an officer by suggesting that the officer was a Japanese soldier.”[43] In another experiment, two subjects who were told to throw sulphuric acid at a laboratory assistant (protected by glass) complied with the hypnotist’s commands.[44] MC 158

G.H. Estabrooks is the only mind control doctor who has publicly acknowledged the building of Manchurian Candidates. In his book Spiritism,[45] Dr. Estabrooks describes experiments done to create multiple personality.[46][47] In his book Hypnotism,[48] Dr. Estabrooks states that the creation of experimental multiple personality for operational use in military subjects, whom he refers to as super spies, is ethical because of the demands of war. BB 159, 162

In a 1971 article in Science Digest, Dr. Estabrooks[49] claimed to have created hypnotic couriers and counterintelligence agents for operational use. “By the 1920’s not only had [clinical hypnotists] learned to apply posthypnotic suggestion, but also to split certain complex individuals into multiple personalities like Jeckyl-Hydes. During World War II, I worked this technique with a vulnerable Marine lieutenant I’ll call Jones. I split his personality into Jones A and Jones B. Jones A, once a ‘normal’ working Marine, became entirely different. He talked communist doctrine and meant it. He was welcomed enthusiastically by communist cells, and was deliberately given a dishonorable discharge by the Corps and became a card-carrying party member. Jones B was the deeper personality, knew all the thoughts of Jones A, was a loyal American and was ‘imprinted’ to say nothing during conscious phases. All I had to do was hypnotize the whole man, get in touch with Jones B, the loyal American, and I had a pipeline straight into the Communist camp. It worked beautifully.” BB 167-169

Dr. Estabrooks did experiments on children. He corresponded with FBI Director J. Edgar Hoover about using hypnosis to interrogate juvenile delinquents. His experimentation raises the possibility that he or other investigators might have attempted to create Manchurian Candidates in children. Such a possibility might seem far-fetched until one considers the LSD, biological and radiation experiments conducted on children,[50][51][52] and the fact that four MKULTRA Subprojects were on children. The deliberate creation of multiple personality in children is an explicitly stated plan in the MKULTRA Subproject Proposal submitted for funding on May 30, 1961. BB 61, 176, 177 For more, click here and here.

LSD Tests

From 1950 until the 1970s, the CIA collaborated closely with the US Army[53] while conducting LSD and other chemical tests on humans. Experiments were conducted where none of the volunteers gave their ‘informed consent’ prior to receiving LSD. There was a deliberate attempt to deny the volunteers any information that would have permitted them to evaluate the dangers involved. Most of the related records have been destroyed. MC 20, 21, 29, 32

A field test plan called for use of LSD on foreign nationals overseas. The Surgeon General[54] “offered no medical objections to the field experimental plan.” Subjects for the proposed field test were to be non-volunteer, foreign nationals. It is clear that from the start to finish the project violated Department of Defense policies, as well as specific procedures set for chemical or medical research. MC 33-36

Frank Olson was a biological warfare expert who committed suicide[55] after being given LSD hidden in liqueur by Dr. Sidney Gottlieb, Director of MKULTRA. Olson’s family determined that he committed suicide subsequent to a bad LSD trip only after reading Nelson Rockefeller’s 1975 report on the CIA, published 22 years after Olsen’s death. They were given $750,000 in compensation by Congress. BB 49

Electronic Implants

Jose Delgado’s development of the Stimoceiver in the 1950s brought intelligence agencies’ ultimate dream of controlling human behavior one step closer to reality. The Stimoceiver—a miniature electrode capable of receiving and transmitting electronic signals by FM radio—could be placed within an individual’s cranium. And once in place, an outside operator could manipulate the subject’s responses. Delgado demonstrated the potential of his Stimoceivers by wiring a fully-grown bull. With the device in place, Delgado stepped into the ring with the bull. The animal charged towards the experimenter – and then suddenly stopped, just before it reached him. The powerful beast had been stopped with the simple action of pushing a button on a small box held in Delgado’s hand.[56] MC 147

Dr. Delgado, a neurosurgeon and professor at Yale,[57][58][59][60][61][62] received funding for brain electrode research on children and adults. He did research in monkeys and cats, and in one paper describes the cats as “mechanical toys.” He was able to control the movements of his animal and human subjects by pushing buttons on a remote transmitter box. In 1966, Delgado asserted that his experiments “support the distasteful conclusion that motion, emotion and behavior can be directed by electrical forces, and that humans can be controlled like robots by push buttons.”[63] BB 88, 89, MC 147

An 11-year old boy underwent a partial change of identity[64] upon remote stimulation of his brain electrode: “Electrical stimulation of the superior temporal convolution induced confusion about his sexual identity. These effects were specific, reliable, and statistically significant. For example, the patient said, “I was thinking whether I was a boy or a girl,” and “I’d like to be a girl.” After one of the stimulations the patient suddenly began to discuss his desire to marry the male interviewer. Temporal-lobe stimulation produced in another patient open manifestations and declarations of pleasure, accompanied by giggles and joking with the therapist. In two adult female patients stimulation of the same region was followed by discussion of marriage and expression of a wish to marry the therapist. BB 88, 89

Brain electrode research was also conducted independently at Harvard by Dr. Delgado’s coauthors, Drs. Vernon Mark, Frank Ervin, and William Sweet. Mark and Ervin describe implanting brain electrodes in a large number of patients at Harvard hospitals. A patient named Jennie was 14 years old when they put electrodes in her brain. In their book Violence and the Brain,[65] photographs show 18-year old Julia smiling, angry, or pounding the wall depending on which button is being pushed on the transmitter box sending signals to her brain electrodes. The mind control doctors saw their patients as biological machines, a view which made them sub-human, and therefore easier to abuse in mind control experiments. BB 88-91

Dr. Robert G. Heath,[66][67][68] Chairman of the Department of Psychiatry and Neurology at Tulane University, placed brain electrodes in a young homosexual man and fitted him with a box. A button on the box could be used to electrically stimulate an electrode implanted in a pleasure center. During one three-our period, the patient, referred to as B-19, stimulated himself 1,500 times.[69] “During these sessions, B-19 stimulated himself to a point that he was experiencing an almost overwhelming euphoria and elation, and had to be disconnected, despite his vigorous protests. BB 94

Dr. John Lilly describes the technique of electrode implantation.[70] “Electrodes could be implanted in the brain without using anesthesia. Short lengths of hypodermic needle tubing equal in length to the thickness of the skull were quickly pounded through the scalp into the skull. These stainless steel guides furnished passageways for the insertion of electrodes into the brain to any desired distance and at any desired location. Because of the small size of the sleeve guides, the scalp quickly recovered from the small hole made in it, and the sleeve guide remained imbedded in the bone for months to years. At any time he desired, the investigator could palpate [rub] the scalp and find the location of each of the sleeve guides. Once one was found, he inserted a needle down through the bone. After withdrawing the needle, the investigator placed a small sharp electrode in the track made by the needle and pressed the electrode through the skull and down into the substance of the brain to any desired depth.” NB 62 For more, click here and here.

Non-Lethal Weapons

Non-lethal weapons is a broad category which includes devices for beaming various kinds of energy at human targets in order to temporarily incapacitate them, or to control or affect their behavior. Non-lethal weapons research has been conducted at universities on contract to the CIA, and has overlapped with research on hallucinogens and brain electrode implants. BB 103

In 1991, Janet Morris, one of the main proponents of non-lethal weapons, issued a number of papers.[71] According one paper, US Special Operations Command already had a portable microwave weapon. “US Special Forces can cook internal organs.”[72] Another concept was ‘Infrasound’ using acoustic beams. Laboratories were developing a high power, very low frequency acoustic beam weapon projecting non-penetrating acoustic bullets. Already, some governments have used infrasound as a means of crowd control. Very low frequency (VLF) sound, or low frequency RF modulations can cause nausea, vomiting and abdominal pains. “Some very low frequency sound generators can cause the disruption of human organs and, at high power levels, can crumble masonry.”[73] MC 176-179

Funding of these experiments began in MKULTRA. Subproject 62[74] documents “certain kinds of radio frequency energy have been found to effect reversible neurological changes in chimpanzees.” Subproject 54 was studying how to produce concussions from a distance using mechanical blast waves propagated through the air. Such a concussion “is always followed by amnesia for the actual moment of the accident.” It also states: “The blast duration would be in the order of a tenth of a second. Masking of a noise of this duration should not be difficult. It would be advantageous to establish the effectiveness of both of the above methods as a tool in brain-wash therapy.” BB 103-105

A confidential report prepared by the US Army[75] as early as 1969 detailed the effect an infra-sonic system would have on humans. These effects range from disruption of nervous systems to death. MC 199, 200

That such weapons have been used can be in little doubt. When the deployment of Cruise missiles at American bases in the UK was at its height, women peace campaigners staged a series of highly publicized peaceful protests outside the perimeter wires. In late 1985, the women in the peace camps at Greenham Common began to experience unusual patterns of illness, ranging from severe headaches, drowsiness, menstrual bleeding at abnormal times or after the onset of menopause, to bouts of temporary paralysis and faulty speech coordination. Electronics Today[76] magazine carried out a number of measurements, and in December 1985 published their report which concluded: “Readings taken with a wide range of signal strength meters showed marked increases in the background signal level near one of the women’s camps at a time when they claimed to be experiencing ill effects.” They noted that if the women created noise or a disturbance near the fence, the signals rose sharply. MC 201

The evidence in hand suggests that the technology to produce ‘voices in the head’ does exist. The Department of Defense has already acquired the technology to alter consciousness through various projects and programs. A patent discusses methods and system for altering consciousness. The abstract from once such program states:[77] “Researchers have devised a variety of systems for stimulating the brain to exhibit specific brain wave rhythms and thereby alter the state of consciousness of the individual subject.” Silent subliminal messages [were] “used throughout Operation Desert Storm (Iraq) quite successfully.”[78] MC 203, 204

A US State Department report[79] suggested it was possible to induce a heart attack in a person from a distance with radar. MC 172

By 1974, Stanford Research Institute had developed a computer system[80] capable of reading a person’s mind by correlating the brain waves of subjects on an electroencephalograph with specific commands. The concept of mind-reading computers is no longer science fiction. Neither is their use by Big Brotherly governments. Major Edward Dames of Psi-Tech said in April 1995 on NBC’s The Other Side program: “The US government has an electronic device which could implant thoughts in people.” Dames would not comment any further. MC 172

The latest development in the technology of induced fear and mind control is the cloning of the human EEG or brain waves of any targeted victim, or indeed groups. With the use of powerful computers, segments of human emotions which include anger, anxiety, sadness, fear, embarrassment, jealousy, resentment, shame, and terror, have been identified and isolated within the EEG signals as ‘emotion signature clusters.’ Their relevant frequencies and amplitudes have been measured. Then the very frequency/amplitude cluster is synthesized and stored on another computer. Each one of these negative emotions is separately tagged. They are then placed on the Silent Sound carrier frequencies and could silently trigger the occurrence of the same basic emotion in another human being. MC 205

The entire non-lethal weapon concept is literally a Pandora’s Box of unknown consequences. MC 179 For more, click here and here.

How to Order Government Mind Control Records of MKULTRA and Bluebird/Artichoke[81]

To order individual documents, go to www.foia.cia.gov/foia_request.asp. There is no charge for the first 100 pages. To order the three CD set of declassified CIA mind control documents, send a check for $30 made payable to the United States Treasurer. Send the check and a copy of the form below to the address given:

Central Intelligence Agency

FOIA and Privacy Act Coordinator

Washington, DC 20505

Re: Freedom of Information Act and Privacy Act Request

This letter constitutes my formal request for information pursuant to the provisions of the Freedom of Information and Privacy Acts, 5 USC552. I am requesting the three-volume CD set that includes the more than 18,000 pages of MKULTRA and Bluebird/Artichoke records, and a copy of the shareware viewer. Enclosed is a check for $30 made payable to the United States Treasurer.

Sincerely,

Note: For free, unlimited access to these very documents on an excellent Internet website, go to the Black Vault Government Archive at http://www.bvalphaserver.com/contentid-21.html.

To order the three books quoted in this summary, see the mind control section of our Resource List. For fascinating ten-page summaries of each book, go to www.WantToKnow.info/resources#summaries. We share this information as an invitation to work together for a better world. Please join us in spreading the word, so that we can create a critical mass of people who demand that all of these activities be brought back under Congressional control.

· [1] CIA MORI ID 190684, pp. 1, 4. This is a declassified CIA document. To verify this statement, use FOIA (Freedom of Information Act) request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [2] Hunt, L. Secret Agenda. The United States Government, Nazi Scientists, and Project Paperclip, 1945 to 1990. New York: St. Martin’s Press.

· [3] Simpson, C. Blowback. The First Full Account of America’s Recruitment of Nazis, and the Disastrous Effect on Our Domestic and Foreign Policy. New York: Weidenfeld and Nicolson, 1988.

· [4] Simpson, C. The Splendid Blonde Beast. Money, Law, and Genocide in the Twentieth Century. New York: Grove Press, 1993.

· [5] Interagency Working Group appointed to inform the appropriate committees of the US Senate and House of the activities of the Nazi War Criminal Records.

· [6] Available at http://www.cia.gov/cia/publications/index.html.

· [7] Vannevar Bush’s memorandum to James Conant, Bush-Conant files, Office of Scientific Research and Development, S-1, Record Group 227, National Archives.

· [8] CIA MORI ID 190691, p. 1 This is a declassified CIA document. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [9] CIA MORI ID 17748, p. 30. This is a declassified CIA document. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [10] Sidney Gottlieb’s deputy and the Chief of the CIA Records Center tried unsuccessfully to stop the destruction by Helms and Gottlieb.

· [11] CIA MORI ID 140401, p. 6, 7. This is a declassified CIA document. To order this document go to http://www.foia.cia.gov/foia_request.asp, and follow the instructions. This document is not included in the mind control CDs.

· [12] CIA MORI ID 144700, 4/26/52, p. 3: “Drugs—Sodium Pentathol, sodium amytal, and barbiturates in general. Evaluation: These techniques have been proven to be effective and they involve little risk to the subject if administered under competent medical direction.” CIA MORI ID 140394, pp. 2, 3, dated 2/25/52: “Q: Have you ever had any experience with drugs? A: Yes, many times. I worked with doctors using sodium amytal and pentathol and have obtained hypnotic control after the drugs were used. In fact, many times the drugs were used for the purpose of obtaining hypnotic control.” These are declassified CIA documents. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed. ID 140394 may not be included in the CDs, in which case you can order it separately.

· [13] Memorandum from ADDP Helms to DCI Dulles, dated 3 April 1953, Tab A, pp. 1-2 (P. 30 on CDs), CIA MORI ID 17748. This is a declassified CIA document. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [14] CIA MORI ID 17748, p. 30. Quote on p. 33. This is a declassified CIA document. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [15] CIA MORI ID 17748, pp. 2, 4, 6-9. This is a declassified CIA document. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [16] Final Report. Book 1, Foreign and Military Intelligence. Senate Select Committee to Study Government Operations with Respect to Intelligence Activities, 94th Congress, 2nd Session, 26 April 1976, Special Report No. 94-755 (Better known as the Church Committee Report). Also see Book 1, p. 406.

· [17] Eringer, Robert. Secret Agent Man. Rolling Stone, 1985

· [18] Final Report. Book 1, Foreign and Military Intelligence. Senate Select Committee to Study Government Operations with Respect to Intelligence Activities, 94th Congress, 2nd Session, 26 April 1976, Special Report No. 94-755 (Better known as the Church Committee Report).

· [19] For a 10-page summary of Ms. Rutz’ riveting story which includes revealing testimony from other mind control victims, see www.WantToKnow.info/nationbetrayed10pg. She backs up her experience with declassified CIA documents proving the existence of the programs she describes.

· [20] Project Bluebird/Artichoke’s primary purpose was the study of special interrogation techniques—primarily hypnosis, truth serums and brainwashing. See CIA-1978-S421-1 Project MKULTRA, The CIA’s Program of Research in Behavioral Modification, Appendix A, pg 66, Joint Hearing before the Select Committee on Intelligence and the Subcommittee on Health and Scientific Research of the Committee on Human Resources, United States Senate Ninety-Fifth Congress, First Session, August 3, 1977.

· [21] CIA MORI ID 17395, p. 18. ESP Research, 1961 and 1962. This is a declassified CIA document. . To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [22] Condon, R. The Manchurian Candidate. New York: Jove Books, 1959/1988.

· [23] CIA MORI ID 190527, pp. 1, 2. This is a declassified CIA document. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [24] You can find a dozen examples of this in these footnotes. See footnotes 39, 40, 41, 43, 44, 46, 47, 59, 64, 66, 67, 69.

· [25] Mark, V.H., & Ervin, F.R. Violence and the Brain. New York: Harper & Row, 1970.

· [26] Faden, R.R. Final Report. Advisory Committee on Human Radiation Experiments. Washington, DC: US Government Printing Office, 1995.

· [27] Marks, J. The Search for the Manchurian Candidate. New York: W.W. Norton, 1988.

· [28] Orne, M.T. The potential uses of hypnosis in interrogation. In A.D. Biderman (Ed.), The Manipulation of Human Behavior (pp. 169-215). New York: John Wiley & Sons, 1961.

· [29] West, L.J. Dissociative reactions. In A.M. Freedman & H.I. Kaplan (Eds.), Comprehensive Textbook of Psychiatry, pp. 885-889. Baltimore: Williams and Wilkins, 1967.

· [30] Janet, P. Psychological Healing; A Historical and Clinical Study, London: George Allen and Unwin, 1925.

· [31] Gillmor, D. I Swear By Apollo. Dr. Ewen Cameron and the CIA-Brainwashing Experiments. Montreal: Eden press, 1987.

· [32] Scheflin, A.W., & Opton, E.M. The Mind manipulators. New York: Paddington Press, 1978.

· [33] Thomas, G. Journey into Madness. The Secret Story of Secret CIA Mind Control and Medical Abuse. New York: Bantam, 1989.

· [34] Weinstein, H. Psychiatry and the CIA: Victims of Mind Control. Washington, DC: American Psychiatric Press, 1990.

· [35] Collins, A. In the Sleep Room. The Story of CIA Brainwashing Experiments in Canada. Toronto: Lester & Orpen Dennys, 1988.

· [36] CIA MORI ID 17468. This is a declassified CIA document. To verify this statement, use FOIA request as listed at the end of the 10-page summary. You should receive the CDs within a month of your request. Look up the MORI ID number listed.

· [37] Other Mental Health Project Grants awarded to Dr. Cameron by the Department of National Health and Welfare were:

· Project #604-5-11, The Effect of Senescence on Resistance to Stress, $195,388, 50-57,

· Project #604-5-13, Research Studies on EEG and Electrophysiology, $60,353, 50-57,

· Project #604-5-14, Support for a Behavioral Laboratory, $17,875, 50-54,

· Project #604-5-76, A Study of the Effect of Nucleic Acid Upon memory Impairment in the Aged, $18,000, 59-63,

· Project #604-5-432, A Study of Factors Which Promote or Retard Personality Change in Individuals Exposed to Prolonged Repetition of Verbal Signals, $57,750, 61-64, see Collins, Anne. In the Sleep room. The Story of CIA Brainwashing in Canada. Ken Porter Books, 1988, pg. 189.

· [38] Collins, Anne. In the Sleep room. The Story of CIA Brainwashing in Canada. Ken Porter Books, 1988, 258.

· [39] Cameron, D.E. Production of differential amnesia as a factor in the treatment of schizophrenia. Comprehensive Psychiatry, 1, 26-34, 1960.

· [40] Cameron, D.E., Levy, L. Rubenstein, L., & Malmo, R.B. Repetition of verbal signals: Behavioral and physiological changes. American Journal of Psychiatry, 115, 985-991, 1959.

· [41] Cameron, D.E., Lohrenz, J.G., & Handcock, K.A. The depatterning treatment of schizophrenia. Comprehensive Psychiatry, 3, 65-76, 1962.

· [42] Tyner, Arlene. Mind-Control Part 1: Canadian and US Survivors Seek Justice, PROBE Magazine, March-April, 2000

· [43] Fisher, S. An Investigation of Alleged Conditioning Phenomena Under Hypnosis. Journal of Clinical Experimental Hypnosis, 1955, 3, pp. 71-103.

· [44] Rowland, L.W., Will Hypnotized Persons Try to Harm Themselves or Others? Journal of Abnormal Social Psychology, 1939, 34, pp. 114-117.

· [45] Estabrooks, G.H. Spiritism. New York: E.M Dutton, 1947.

· [46] Harriman, P.L. The experimental induction of a multiple personality. Psychiatry, 5, 179-186, 1942.

· [47] Harriman, P.L. The experimental production of some phenomena related to multiple personality. Journal of Abnormal and Social Psychology, 37, 244-255,1942.

· [48] Estabrooks, G.H. Hypnotism. New York: E.M Dutton, 1943.

· [49] Estabrooks, G.H. Hypnosis comes of age. Science Digest, April, 1971, 44-50.

· [50] Okita, G.T., Plotz, E.J., & Davis, M.E. Placental Transfer of Radioactive Digitoxin in Pregnant Women and its Fetal Distribution. Semiannual Reports to the US Atomic Energy Commission, Vol. 1, Parts 1 6, 1954 to 1956.

· [51] New York Times, Feb. 10, 1995 reported that “about 9,000 Americans including children and newborns were used in 154 human radiation tests” sponsored by the Atomic Energy Commission.

· [52] Welsome, Eileen. The Plutonium Files, America’s Secret Medical Experiments in the Cold War. New York: Dial Press, 220-221.

· [53] Church Committee Report, book 1 p. 395, states that one of the three principal functions of the Special Operations Division (SOD) of the US Army Biological Center at Fort Detrick was to conduct “biological research for the CIA.” In early 1952, SOD agreed “to assist CIA in developing, testing, and maintaining biological agents delivery systems. By this agreement, CIA acquired the knowledge, skill, and facilities of the Army to develop biological weapons suited for the CIA’s use.” Church Committee Report, Book 1, p. 389. Many of the early CIA LSD tests were conducted at Fort Detrick.

· [54] USAINTC Letter to ACSI, DA. Subject: Staff Study: Material Testing Program EA1279, dated 15 October 1959. (Includes a reference to ACSI-SC letter, 27 July 1959, requesting study).

· [55] Dowling, Kevin. The Olsen File: A Secret that Could Destroy the CIA. Mail On Sunday. 23 August 1998.

· [56] New York Times, May 17, 1965, front page, ‘Matador’ With a Radio Stops Wired Bull; Modified Behavior in Animals Subject of Brain Study. Access article at http://www.wanttoknow.info/650517nytimes.

· [57] Delgado, J.M.R. Evaluation of permanent implantation of electrodes within the brain. Electroencephalography and Clinical Neurophysiology, 7, 637-644, 1955.

· [58] Delgado, J.M.R. Prolonged stimulation of brain in awake monkeys. Journal of Neurophysiology, 22, 458-475, 1959.

· [59] Delgado, J.M.R. Emotional behavior in animals and humans. Psychiatric Research Reports, 12, 259-266, 1960.

· [60] Delgado, J.M.R. Social rank and radio-stimulated aggressiveness in monkeys. Journal of Nervous and Mental Disease, 144, 383-390, 1967.

· [61] Delgado, J.M.R. Physical Control of the Mind. New York: Harper & Row, 1969.

· [62] Rosvold, H.E., & Delgado, J.M.R. The effect of delayed-alternation test performance of stimulating or destroying electrical structures within the frontal lobes of the monkey’s brain. Journal of Comparative and Physiological Psychology, 49, 365-372, 1956.

· [63] Kreech, David. Controlling the Mind Controllers. THINK 32, July/August 1966.

· [64] Delgado, J.M., Mark, V., Sweet, W., Ervin, F., Weiss, G., Bach-Y-Rita, G., & Hagiwara, R. Intracerebral radio stimulation and recording in completely free patients. Journal of Nervous and Mental Disease, 147, 329-340, 1968.

· [65] Mark, V.H., Ervin, F.R. Violence and the Brain. New York: Harper & Row, 1970.

· [66] Heath, R.G. Electrical self-stimulation of the brain in man. American Journal of Psychiatry, 120, 571-577, 1963.

· [67] Heath, R.G. Pleasure and brain activity in man. Deep and surface electroencephalograms during orgasm. Journal of Nervous and Mental Disease, 151, 3-18, 1972.

· [68] Heath, R.G., John, S.B. & Fontana, C.J. Stereotaxic implantation of electrodes in the human brain: A method for long-term study and treatment. IEEE Transactions on Biomedical Engineering, 23, 296-304, 1976.

· [69] Moan, C.E., & Heath, R.G. Septal stimulation for the initiation of heterosexual activity in a homosexual male. Journal of Behavior Therapy and Experimental Psychiatry, 3, 23-30, 1972.

· [70] Lilly, John. The Scientist, A Metaphysical Autobiography. Revised 1988. Dr. Lilly was not the only one experimenting with this technique. In 1955, he and Dr. J. Roe, B. Mountcastle, and L. Kurger, Johns Hopkins Medical School; Drs. C. Woolsey and J. Hind, University of Wisconsin; Dr. Karl Pribram, Institute of Living, Hartford Conn.; Dr. Leonard Malis, Mt. Sinai Hospital, New York City experimented on dolphins at Marineland.

· [71] The USGSC (US Global Strategy Council) has issued a wide variety of papers on the nonlethal weapons concept. For example: “In Search of Nonlethal Strategy,” Janet Morris; “Nonlethality: A Global Strategy – White paper”; “Nonlethality Briefing Supplement No. 1”; and “Nonlethality in Operational Continuum.”

· [72] Wall Street Journal, Jan. 4, 1993.

· [73] Morris, Janet. In Search of a Non-lethal Strategy. USGSC (US Global Strategy Council), p. 14.

· [74] Baldwin, M., Bach, S.A., & Lewis, S.Z. Effects of radio-frequency energy on primate cerebral activity. Neurology, 10, 178-187, 1960. This publication was a result of MKULTRA Subproject 62.

· [75] An Infrasonic System, US Army Mobility Equipment Research and Development Center, Fort Bellever, VA, 1969. See section on “Effects-Human.” In a forthcoming book, The Future War, John Alexander, one of the supporters, forerunners and founding fathers of the non-lethal weapons concept, tries to legitimize the acquisition and deployment of these destructive weapons.

· [76] Electronics Today, Dec. 1985.

· [77] Method and System for Altering Consciousness, Patent 5,123,899, US Patent Office, June 23 1992.

· [78] Letter from Edward Tilton, Dec. 13, 1996.

· [79] Microwave US-USSR, Vol VI, July-Dec. 1976 p. 4, Office of Security, US Dept. of State.

· [80] Mind Reading Computer. Time, July 1, 1974, p. 67. See also Rorvik, David M. As Man Becomes Machine. London: Sphere Books, 1979.

· [81] Ordering instructions for the declassified mind control documents are at the end of the summary, above these footnotes. We received the CDs less than three weeks after we ordered them.

DSS

MK ULTRA PROJECTS : Total Mind Control of America – Electronic Prison – leaked doc.

MERRY CHRISTMAS AMERICA 2013
FROM THE U.S. NAVY, SPECIAL OPERATIONS
DISCLOSURE ON TECHNOLOGIES AND APPLICATIONS BEING USED AGAINST AMERICAN TARGETED INDIVIDUALS

First, all 315 million Americans are targeted individuals. They are in an electro-magnetic concentration camp, under unbreakable electronic mind control.

– There is a secret military-police structure that silently controls much of America, especially in regards to current and future plans regarding population culling and management. On the lowest level are actual police and soldiers. As I was told, “everyone who carries a holster and a badge is directly under our control.” It is all under Northcom. Navy elements and private ‘black ops’ security firms are used for much of it, especially the dirty work. It is all done by neural frequency weapons/systems running on the now thoroughly complete atmospheric topologies of HAARP, ELF waves etc. with nanobots from chemtrails/aerosols in and around the subject(s). In the bigger picture, Americans (and the global population) are being buried alive in a frequency fence. Even the tiny handful of people who have had exposure to mind control, for example insiders themselves, or most targeted individuals, have no idea how fantastically advanced, subtle and powerful the current system really is. It is beyond words. Anybody can be taken over within seconds and be totally remote-controlled without knowing it. It is beyond the capacity of those who haven’t experienced this being done to themselves and others around them to even comprehend this.

– All Americans are computers. It takes an average of approximately five minutes to access any American and remote control them. The same apparently applies to Europeans and likely (potentially) most of the world. It can all be seen like a computer network where the human (brain and every single cell of the body) is the computer, and the mind (and entire biological system) is the software. A general patch/update can be pushed down to everyone in a general or highly granular targeted demographic. This could be a ‘patch’ to put you in any emotional state, say, to suddenly ‘see the light’ and be a proponent of any ideology, religious belief, have a certain disposition towards certain other people or groups, anything. A patch could be sent to everyone that fixes and prevents cancer – this basically already exists. Likewise you could be given cancer or a heart attack, stroke or otherwise killed instantly. You could be knocked out while driving around a curve.

An aside: I was told by a handler one time that it’s not a health care system we have but rather “wildlife management.”

– Many targeted individuals experience street theatre / gang-stalking. They are ignorant of what is actually happening to them. They believe hundreds of random strangers, or regular supernumeraries like the mailman, around them every day, are secretly paid by the government or other entities to mess with them. How it actually works is that live operators monitor them remotely and simply control anyone around them. Reference the scene in the movie Control Factor with the waitress. Humans are taken over that easily.

– Instantaneous communication with synthetic telepathy – how it works: This also can apply to gang stalking applications. It’s actually faster than instant. The operators, and possibly you mentally depending how things are configured, exist in a time-space bubble outside of our linear time. This gives the operators time to put together any kind of information to send you. Quantum Jumping (teleportation) used in ‘alien abductions’ works the same way. Via the electromagnetic-nanotech topologies the subject can be in essence ported to a lab, tested, fixed, brainwashed, raped, messed with, then sent back in-tact as they were or altered and never know anything at all happened unless the operators choose to leave them with a screen memory. Clones of course can be made and used in conjunction with this.

– The weather is almost TOTALLY controlled. It can be microcontrolled. Lightning and thunder can be directed. Wind can be created and blown on anyone, strong or a soft breeze. A voice can be put in it. TI’s familiar with sensory type auditory communication can understand this. Even sunlight and darkness in your room, believe it or not. They can simulate shooting stars. They can generate sounds of gunfire.

– Animals of course can be easily totally controlled. Cats, dogs etc. can be used as spy devices but obviously any human can too without knowing it. Birds can be commandeered and flown right over and around you, peck on your window etc.

– Worst of all are the extreme evil science projects that are being done by Navy and other military-industrial-medical-complex black ops elements to de-soul the population and try and control the heavens. Reference soul-catcher technology. Nobody would have believed the Nazis were doing the things they were doing. Same principle.

– They’ve ripped off ineffable spiritual energies from various people who are or were highly spiritual and can pump these cloned frequencies into people in church services. Likewise they can totally kill spirituality in naturally spiritual people. They can also of course whisper messages into the minds (auditory channel) of anyone. They can and WILL stop all organic, natural dreams in the entire population and instead pump in synthetic dreams and nightmares.

– Anyone reading this can have their opinion of it totally changed to think it’s all BS, whether they are currently under RNM or not. Remember within 5 minutes anyone can be an ‘open access target’. Any decision in business, government, finance etc. can be instantly or slowly totally controlled and changed. Massive debts can be forgiven and even forgotten about with the creditor walking away cheerful. Laws of supply and demand (how are gold and silver now?) are meaningless if and when need be. It’s all a matter of perspective, is it not? What an amazing economy to say nothing of other global theatre!

– When we chat about participants in staged events like the Boston Marathon, shootings etc we say ‘they didn’t know… there was something, it was something… something happened but I can’t remember, they didn’t know’

– We have a term for a human who’s been made into a hybrid, altered, robotoid like every single congressman/senator, the president etc etc… We say they’re ‘Moo Goo Gai Pan’. If they only knew that they’re immortal! Laboratory, human factory products now. How does the world work in 2013?

MORE:

I should clarify that it takes 5 minutes to first identify and lock in on a person’s location and then take them over. Everyone of course is already stored in government databases and can easily be located and tracked if they are of interest. Once an agency decides to check you out then you can be instantly accessed from then on – by them and affiliated groups. They can also use you as a spying/reporting mechanism to automatically feed info from your own mind and what you see around you and others back to them. They can then expand a peoplenetwork for others like you (who you associate with) that may of interest.

As I said, they can actually teleport you to a lab and do intensive interrogations and studies as well over the course extended time in another synthetic time-space dimension, take and use your DNA, spiritual properties, use you for breeding, do surgeries on you to enhance you or harm you etc. Obviously they can train you in anything, brainwash you deeply and powerfully and use you for staged state-sponsored terrorism, as an actor at the scene, as the perpetrator, and of course coordinate and choreograph the entire event. They’ll do this to cops and even other military-contractor personnel involved as well.

Select units/people get ‘super soldier’ moo-goo-gai-pan cybernetic enhancements and are outfitted for remote medical treatments on the spot via remotely delivered nano-biotechnology.

The entire country and pretty much world is now under this system. Virtually the entire population is oblivious. Magnus Olsson is one of the few outsiders who has a clue about this. Inside military/gov’t personnel who are ‘in the program’ are sworn to secrecy and are totally tracked. Most of the lower level personnel are probably under Remote Neural Monitoring (RNM) for this reason so if they even have serious thoughts about talking etc they can be identified as a threat and prevented. That’s why you never hear about this from the inside. As a civilian resource I have unusual freedom in this regard as I’m not sworn to any oath, however nobody would ever believe me except for insiders and some TI’s.

At some point, maybe now, one individual will be able to issue commands instantly via their thoughts over the system to do x, y or z to any other person at any time. You can use your imagination, they could take them over or have them commandeered by another resource at their base/office who takes them over and makes them do as they want… business decision, money, sex, whatever. I am pretty sure my main controllers either have this ability or close to it. They mayrequire some kind of small, portable security device, but that’s all.

Imagine the possibilities inside a casino, or controlling a football player in the Superbowl or a UFC fighters muscles or brain, or a business competitor’s decisions. I was always afraid to even think about it much. It’s a system of total subjugation and slavery over the masses by those with this technology. I also forgot to mention satellites are part of the overall networking hardware.

Brought to you by Don and four other U.S. Navy Special Operations Officers.

– PART 2 –

FROM THE U.S. NAVY, SPECIAL WARFARE OPERATIONS DISCLOSURE ON CLASSIFIED OPERATIONS, TECHNOLOGIES AND APPLICATIONS BEING USED AGAINST AMERICANS. MIND CONTROL, TIME TRAVEL, TIMELINE ALTERATIONS, SOUL THEFT, PLUNDERING THE HEAVENS – SPIRITUAL REALMS, GENOCIDE OF THE HUMAN SPECIES. SECOND RELEASE (1-13-2014)

This document is being published per the instructions of Commanders of a Navy Special Warfare Operations group. It expands further on the topics described in the title which were mentioned in summary in an earlier document released on Christmas day 2013. All of this information is published entirely at the direction of Don and Tim (real names), senior commanders of the Navy Special Ops / SEAL (black ops) group which is conducting operations in the United States at this time. Tim is in Marietta, GA and is a SEAL team lead commander.

INTRODUCTION which may be a helpful guide for the American public to comprehend the platform of advanced technologies their government has and is using against them. Consider skipping this section and going straight to Synthetic Dimensions. The below italicized text is just a backdrop.

The author is not a Christian, however, the best way to introduce the topics to the public in a big-picture way they can more easily comprehend is to provide Christian concepts regarding “Lucifer” AKA the “Anti-Christ” and “Revelations” as a backdrop. If the Anti-Christ were already here or on his way to power in the form of a human being; and if it were true there already exists an evil network of government/military/industry complexes… could it not be that Hell might be something that is completely built by and implemented by man himself? Could he not be in a prison already which he has myopically built around himself?

The only theme I’ll suggest here is that the Devil is a lower-astral-plane deity who essentially overlords humans as a type of plantation farm animal/slave. He, at best, surreptitiously meets bare minimum compliance with cosmic law in letting – more like steering – humans into their own demise, which will be total extinction with total harvesting of their most valuable properties, their souls, with full rights of ownership going to him.

I use my own specific definition of the word “Luciferianism” to refer to the entire project being carried out by the military-industrial-medical complex – the transhumanist project which can be inferred in this document. Put another way, this ad-hoc definition of Luciferianism is man trying to become “God” by killing off everything human and divine, and in the process, stealing the core properties of human soul, spirit and mind and scientifically, fraudulently, trying to use them as well as back-engineer them, unwittingly and ultimately for the benefit of the Devil, if you will.

The point in this summary introduction is just to a) provide a backdrop to help understand the big picture on advanced subjects that at first glance will strike many readers as just science fiction – they are not. b) understand the concepts of a living real and literal hell that fits with a common Christian theme, and understand that the people running these black ops projects are “Luciferians” despite what they may identify themselves as outwardly. They know what they do.

I will put the subject of Extraterrestrials to rest right now. There are real ET’s, interdimensional beings, celestial beings and demons. Very few humans know anything about this. However, Greys, Reptilians and Nordics as reported by 90 plus percent of “alien abductees” are totally fake. They exist only as holograms in-person (if even that) and most commonly, as screen memories, in the mind of the military/government mind-control lab-rat abductee, victim. Moreover, these types of fake “aliens” are more commonly appearing to regular targeted individuals. They’re simply holograms used in the torture process to make the subject appear insane. Advanced new world order technology does not come from aliens and it never has. The entire alien theme is a very well crafted enigmatic hoax used as a cover story for NSA-based abduction and “human effects” technology. Have higher intelligences played a hand in human sciences and events? Yes in my opinion. If you are atheist or agnostic that’s fine, makes no difference. The point is there are no real greys or reptilians working in government labs.

For clarification, in this document the terms “controller, handler, operator and agent” are synonymous.

– SYNTHETIC DIMENSIONS (Hell)

The secret military complex has created and uses what amounts to synthetic dimensions. They use these in quantum jumping and in other operations. Refer to Don’s first document on this if you need. What is a synthetic dimension? A man-made separate time-space bubble outside of our linear time. Through quantum jumping a person(s) can be teleported to a location such as a laboratory, held for x amount of time and then returned instantly back to where they were taken from with zero lag in our time. State of the art Remote Neural Monitoring and Synthetic Telepathy operations take place in a “synthetic dimension” too in that a separate time-space is used which is typically 2-5 minutes ahead of what the subject(s) experience as “normal” linear time.

We are actually in a synthetic dimension right now in a sense (post 2012). That is another story though that will lose too many readers. I’ll just say that the entire Cosmos and all divine, benevolent (ascension) energies are being closed off via the geo-engineering programs.

Bilocation: When a subject is shown simultaneous real time video of themselves in a synthetic dimension they are experiencing bilocation. They are typically shown this in their own mind or consciousness i.e. in their ‘mind’s eye’. All they have to do is close their eyes and they can see the version of themselves in the other dimension doing whatever they happen to be doing. This is only, of course, if the military/government operator decides to show it to them. I’ve experienced this a number of times before and it can be very creepy. They can show you being abused or in a situation where you are about to be, for instance, as well as showing you real-time video of others.

When a subject is teleported to a synthetic dimension anything can be done to them there by the personnel working in it. Thus the operators get to play God. They can commit every type of personal crime you can think of against the subject. They can do any kind of study, interrogation, medical operation. Anything, any activity – good and/or bad. The subject can exist in the time-space bubble indefinitely. One scenario when the perpetrators do this is when they make a major “new” version of the subject for any number of reasons. The inside nickname for this is “moo-goo-gai-pan. ” I’d see a picture or video of Obama (or any of the synthetic puppets) giving a speech and a controller would say he’s “moo-goo-gai-pan.” Adepts who can see aura’s can usually spot something funny about a re-manufactured human. One reason for a major new version of a subject is to do massive trauma erasing or reprogramming to restore to the “real you” a very blank, placid mind and consciousness – a very pleasant, functional lobotomy. They can deeply, powerfully filter or hinder recall of traumatic memories through advance neuroscience.

Another reason is if they want to archive a specific version of you for the future for any number of reasons. Exactly like backing up a hard drive. You want certain restore points. They may want the original version of you which they will always first make. You’d be lucky to get this restored back and get out of the program. But say you had some kind of accident or were used for a terrible Manchurian candidate murder. They could restore to you a version of your total mindset/consciousness/emotional memory structure of a ‘you’ from way before, or perhaps just a day or so before. So while you may have a memory of the act, there’d be no emotional pain and trauma etc… it would be as if it were hypothetical, like something someone else did. As far as just the memory itself, they can make that very faded and instill in you through deep hypnosis and other methods, very little desire to even delve into it. It was just “something” that happened. “Something” is a key word they use often to describe a subject’s understanding (or absolute lack of) an event or reason for why they are doing something. “It was something, something happened, I don’t know, there was something, it was something” then the subject just dismissed it. It was just “something.”

THINK YOUR’E GOING TO HEAVEN?

The Luciferians want to be able to trap the souls of people in a synthetic dimension. Let’s forget about the concept of an over-soul, something truly cosmic and untouchable, for a minute. They can, at the least, seriously mess with your “soul extensions” or soul-related energies by keeping you trapped in another dimension. Of course, they can inflict hellish experiences on you when they trap you there. As far as I know there may be several ways they can keep you indefinitely. One can be in a coma – as a clone. Another can be in some kind of holographic form, at least in part. They can also just keep the actual living version of you there, keeping you alive and healthy and youthful. One caveat they have in their artificial empire is that it’s all run on electricity. So when they use the word “eternal” actually that only applies as long as the power is on.

The “Spiritual Realms.” Think about it. This is the last frontier. You can only go so far in the 3D world. The human body is how much different than any other mammals? More intelligent ‘transhumanist’ elements in the government have probably realized some time ago that humans per-se were probably at the end of their collective life-cycle in a way. Technology is surpassing the third dimension. The physical body is a clunky 3-d vessel.

Where did humans come from? Where do they go when they die? Just like the human genome project and the brain-mapping project (already done – the Obama initiative is just a front for slowly disclosing what’s already been done) the people who run the world and their break-away civilization have created a spiritual-realm project to research, harness and exploit everything possible with the ‘hereafter’ i.e. to conquer it and control it.

The Navy is interested in using the soul energies of others to travel to Heaven and/or other spiritual realms. They study this intensely. They use Starseeds to communicate with the dead. They have indeed successfully stolen very graphic, real celestial visions associated with angelic realms from spiritual people. I do mean stolen. They can take these and store them and prevent the subject from ever accessing them again in a spiritual way. They can de-spiritualize an individual as hard as this may be to believe. In this respect alone they certainly can steal one’s soul.

Think about stories related from Near Death Experiences (NDE), stories of angels, guardian angels et.al. In fact, this particular Navy group will use a highly spiritual subject to communicate with a guardian angel and ask them to intercede in certain affairs on their behalf, now and in the future, in a ridiculously structured fake-benevolent format.

The thing is, the subject isn’t doing this by their own free will. They didn’t drive to a military laboratory/hospital, walk inside, sign papers and then proceed to be experimented on. They are abducted in a fashion that you’d see in the plethora of sci-fi movies that do this stuff, and are totally mind-controlled-directed to do it.

Scientists and doctors working with this Navy Special Operations group, will perform actual NDE’s on a subject, crossing them over to the “other side” and monitor their “soul” bio-spiritual-feedback and interact with the subject, asking them who and what they see etc. They will have used quantum jumping, or maybe clones, to bring close family members or friends to the hospital/lab and have them standing around the bed of the subject. They will be directed to comfort the subject while they are in a real or simulated death. I was told that they really do kill you to pull this off but they bring you back. The subject’s family members will ask the subject to talk to “grandpa” for example or maybe a famous historical figure and try to impart information to them if some kind of time-travel or timeline alteration operation is being done. The subject’s actual movement across time-space is actually visible and tracked by the team. It is extremely eerie. It looks like an endless sea of white with the subject taking huge leaps. The subject will wake up (be brought back) extremely disoriented and agitated, flipped out. More than one subject can also be used in tandem with them. The subject may retain more than a screen memory; they can actually remember the event and seeing other subjects who were sent across “time” with them. The experience is almost like a race where you are competing with the other subject. It is extremely scary. It’s what you would think death would be like in the absence of any spiritual component, just a kind of dumb, helpless consciousness utterly lost in a sick void. They nicknamed this the “bunny hop.” I mentioned a sea of white. It’s not the bright white light associated with passing over. It’s a troubling static-like type of white for lack of a better description.

The overall objective of NDE missions, aside from studies, is to alter timelines. This may also touch on use of the subject in future operations such as in world wars and other major catastrophes where extreme “hail-Mary” efforts to perform whatever tasks may be needed, including operations in post-apocalyptic settings. Example, in the aftermath of a nuclear war.

Also, they said they are close in their synthetic timelines to being able to access people from organic timelines. I don’t know if that’s actually true or not but it’s a goal. I know they are confident and ambitious.

What else can they use a psychic subject for? They can use their properties to try to provide a way to retroactively rescue someone in a car crash so they wake up in a room full of friends or something similar instead of ending up in a hospital or dead.

=> “Topsy Turvy”. This is an internal term used by this Navy Special Ops group for when they “take someone”, meaning quantum jump them to “their place.” “Their place” is the hospital/lab they are working out of. They can do this to anyone anytime. They remotely force the subject to take a deep breath and when they exhale they are transported.

Let’s return to the use of Luciferian/Synthetic dimensions to archive human energies such as minds and souls. It’s theoretically possible for millions of people to be topsy-turvy’d in one fell swoop or at stages, having their souls (or spiritual essences), as well as ALL energies i.e. devic/auric body, mind/consciousness and, of course, their overall biological body down to every cell, taken. The main thing to consider here though is heisting of the soul and mind. When they do this they call you a “new one” or “nobody” – meaning the you sitting on your couch are newly made and no longer spiritual but rather a type of soul-less synthetic. They have the spiritual, sentient version of you at their facility. Remember the phrase “the devil wants your soul”? This may have already been done to many, many Americans and others around the world. Regardless of the current count, I can promise it will be done in total. And you will have no idea it’s happened. The elementary principles for how it’s done were covered in the first document. Basically you are all computers on a wireless network called Earth; and via satellites, HAARP and ELF waves anyone, a part of anyone (ex: soul and mind) can be snatched easily and stored in a government lab/facility. Humans are full of nanobots which collectively assemble and interoperate to make the human a potential robot.

What happens next? Can they swap souls/spiritual energies, personalities, mental acuities and abilities? Can they render masses of people voided vessels and endow themselves with the unique riches they’ve stolen from the public? Can they dump negative, black energies back into the general public?

Worse, what will they do with the archived “you,” your “soul” in their Luciferian dimensions? They can send you off (archive you) in a state of bliss or likewise in a state of suffering, extreme misery, if they wish. It’s so easy. I think we’ve just defined a synthetic version of Heaven and Hell. I can tell you the people doing this are EVIL. I wouldn’t count on Heaven.

There are some researchers who are learning more about “satanic super-soldiers” as they call us; they talk about the “other place” as a kind of other Heaven/Hell. What they are talking about is a government/military synthetic dimension but don’t know it. By the way, this is where fake “alien abductees” are taken. “Alien abductees” in the majority of cases, especially involving “greys, reptilians and Nordics” are just mind control, lab rat victims who have a screen memory as a clever red herring cover story stuck in their minds.

=> Another point: They can create multiple instances of you in a shared space-time.

This Navy Special Ops group rapes a lot of women abductees. They have full access and nothing is provable. They can pull almost anyone they want. Anyone who talks publicly about it, if they even know, is labeled as mentally ill.

As mentioned in the first document, all 315 million Americans are effectively targeted individuals. They’re just clueless sheep. They live in an electro-magnetic concentration camp. Everyone on the planet is already configured and uniquely identified by their DNA as an antenna. You are defenseless.

=> FYI: most NWO “special ops” military personnel who have access to “human effects” systems are re-manufactured with cybernetics and get state of the art medical upgrades etc. Note, these are Luciferians (whether they identifiy themselves as such or not); NOT regular Army, Navy, Marines, Air Force or any special ops units thereof. I’m talking specifically about deep NWO black black black black-ops who function more like para-military death-squad secret police. That’s the truth. Don’t just visualize some Darth-vader looking guy with an M-16. They usually dress in street clothes and business suits a lot. Most nasty combat work can/will be done from behind a computer now. Will bits and pieces of cybernetic and DNA enhancements be pushed down unknowingly to certain regular military who have a high enough value at some point (maybe now)? You bet. The Luciferian/transhumanist military-police who are re-manufactured (like me) can be seen exactly like Agent Smith of “The Matrix” movie series. That’s on the money.

Well, Don emphasized talking about mind control. On to that.

MIND CONTROL AND TOTAL CONTROL OF HUMAN SUBJECTS

Refer to the first document for basics on this.

I have to state again this information comes from my experience, things I’ve learned under Don, the director of the MK-Ultra program I’m trapped in, as well as the other top controllers. I did not want to publish any of this. It’s done effectively under his direction.

How to tell when you are being taken over by remote control?

1. Being made to yawn or have a sudden strong sneeze.

2. The subject may find themselves rubbing their eyes.

3. They may become suddenly very drowsy. They could also slowly subtly become drowsy. A good example is if they are on their way home. When they get to their neighborhood they may then start getting tired and almost feeling like you do when you awake from a nice deep sleep. The idea of sleep may be appealing and their body yearns for it.

4. The subject will likely feel kind of silly, clownish. At first they may feel puzzled. They will suddenly “see things from a different perspective”, have a “change of mind” on a matter, come to see and sympathize with someone else’s point of view, even if it’s profoundly different and it’s someone they hate. The mind control operator can go on to “push” thoughts and feelings onto the subject or “steer” them in a particular direction on something.

5. They may go on to do something really irrational, deciding they need to “show someone what they know.” They “need to show someone.” That’s all “they know.” These are just insider terms describing the dumbed down robotic state of the subject. It doesn’t matter if the subject has an IQ of 160. A controller directs his thoughts and emotions over theirs, replaces them totally and directs them absolutely, totally and silently in perfect stealth. To the controller they look like total idiots. It’s amazing and hysterical. Don told me to publish this. I’m not a fool. I did not want to do this. I did everything within my power to get out of this. I’m publishing this document against my will. I’m actually being tortured into it.

If the controller(s) decide the subject should be sedated or heavily neurologically altered for the day, they may wake up from nightly sleep or a nap and be in the state describe above where their body still yearns for sleep. They may mistakenly believe that their mind is clear and refreshed because they had a good sleep, however in reality they are partially lobotomized but functional and in a good mood. Again, think of awaking from a good sleep. It’s that mood along with an uncluttered but non-thinking head, being empty-headed.

A fake world war or natural disaster or meteorite storm, ET invasion etc could be perpetrated and the entire population could be put in this state and/or a mixture of any other state including ripped off spiritual, ineffable feelings from Starseeds. Undesirables (riff-raff) could be killed efficiently and everyone else simply follows the exact directions they are given, they are total robots. That’s the plan. FEMA camps and the threat of gun-grabs may be real but they serve more realistically as distractions. Guns are a joke.

Ways to counter electronic mind control

New nanobots are often forced into the subject when they are being taken over by a certain agent. If someone is being accessed for the first time this is always the case. This will be done when, as stated above, they are made to yawn or sigh or sneeze or just take a bigger breath than usual and hold it down a tiny bit longer, just a healthy inhale. As stated, often these nanobots are connected to individual agents. Agents can sometimes conflict and one may kick another one out by making the subject sneeze. This could happen between competing agencies on a resource, a politician during a speech for example.

Depending on the mind control system you are on, you can create extreme pain in an agent if you crank up very loud discordant noise like squelching static with headphones on and keep your mouth tightly shut and limit your nose breathing to short regular breaths so he can’t get out. They can develop work-arounds to this glitch but it will still often work for a while.

If you suspect you are being or have just been taken over:

Try to make yourself sneeze. Grab your nose with a Kleenex and try to blow as much mucus out as possible. Coughing up flem may help.

Other ways: If you are already under neurological control, try to get into an intense primal state, especially one of anger. Scream, stomp, punch. Get vicious. Swear. Bring out your meanest side. Physical exercise, especially outdoors, will help. Long drives will help too – a lot. You have to shatter the frequencies in and around you. Getting intense will help. Being calm and meditative will only prove helpful if they are laying off you. Then you will reconnect to your sense of self.

Synthetic Telepathy, Remote Neural Monitoring

– If you are being tortured with synthetic telepathy, talk out loud to yourself (not around others though). Also go ahead and talk to the handler(s) talking to you. Ask them what their name is over and over, where they are at etc. Keep doing it. Always return fire with fire, get extremely personal, gross and mean. Ask them the name of their oldest kid or the most recently deceased relative if they are trying to degrade and traumatize you by using your family. Try and divide and conquer, turn them against their superiors and fellow handlers. Play good cop/bad cop against them. Every TI who survives is mean and fights back, as far as I know. The nice ones don’t make it.

Do NOT sit there in silence letting the electronic Luciferian rats run wild over your brain driving you insane. Call other TI’s. Do NOT talk about the torture to non-TI’s unless you want to end up losing friends, family, jobs and also end up in the psych ward.

Keep white noise on, AM radio static is good and can cause a gateway Syntel operator real pain especially if you turn it up loud. Remember the above technique of not letting the nanobot(s) that the main gateway “listener” agent is connected to, get out.

Odds are they are watching you every second. They also see exactly what you see depending on the system you are under (RNM). If so you can watch as much disturbing content of things that will sicken them (but not you). Whatever works. Just desensitize yourself to it and look at it in a casual, frequent, non-premeditative way.

=> BTW, For ALL Americans, you might as well not be wearing clothes and be inside a building. It’s hilarious, these cover stories about the NSA tapping phone lines. It’s like Charles Manson admitting to shoplifting. Anyone in the secret police/military structure can see, hear, experience emotions, everything about you in unreal detail. They can watch your heart beat, your lungs expand, see you in the bathroom, bedroom, any time. It’s called “total target access.”

Communicating with Synthetic Telepathy

First, I recommend you do NOT learn how to internally communicate with this EVIL, unnatural protocol. They may try to actually teach you to do it. If you do want to, what you do is direct your thoughts into words or images and push them downward, inwardly in your head and further downward as if being “stuffed” down the back of the throat. The exact opposite of how you talk to people verbally, physically. It takes a few months but you will find yourself learning how to do it. You are developing new neural pathways in doing this.

Warning again: learning this may be a huge mistake. You will likely wish you weren’t able to communicate with your torturers.

I am following orders in publishing this detailed operational information on communicating internally over synthetic telepathy.

Dialog patterns

The brain is split into left and right spheres in the particular Syntel protocol this Special Ops group uses.

– When you look down, your head is flooded with either real or fake-imposed subconscious thoughts. They are usually negative. One of the first things I was told was that looking down brings on negative thoughts. It does under this system.

* I was also told that this RNM system uses body language like you wouldn’t believe. Boy does it.

– Dialog occurs either in the left side or right side of your brain – or it feels this way. It’s very clear as it happens.

– Left side verbiage is always false by default, unless an after-phrase of “sometimes left is correct” is whispered. Same thing for right side except right side equals truth.

– When you get the ‘sometimes left/right side is right/wrong’ exception message it’s usually in regard to something important they are trying to convey to you, a nugget of truth, or tip, they are trying to slip you. You will get tons of disinfo from the handlers if you are a TI of some type, but you can almost always trust the ‘sometimes exception’ as truth.

– Left side of head is the standard for superfluous text. If they talk to you a lot it would be impossible for every single word to alternate from right to left, so the left side is the common channel for regular dialog. Another type of exception is when every single word of an important sentence is all on the left side. When this is done it’s the equivalent of the words being in bold text, they are kind of emphasized in a way to indicate that it’s meant to all be consolidated on the left side. However, it can still be a false statement. It could also be true too. It’s just being packed into the left side entirely.

– Masking. The agent can mask the words by overlaying them with other words and also by straddling the center line, trying to cross back and forth and creating confusion with synonyms and antonyms. Also they can mess with the timing. Almost immediately after saying a word like “Yes” on the left side which would mean “No” if it were emphasized as a left-side word, they can say “No” which would mean “Yes”. They can also add a touch of confusion as they do this so you can’t easily tell which it is. If you slowly replay the sentence and break it down though you can figure it out.

– Communication can take place via vibrations from any source. They can take place from any consistent sound around you. Crickets chirping on a summer night can be used as a medium to communicate with you. The sound can repeat “you’re an idiot” or “dickhead” over and over etc… or something positive. The agent also can direct left-right side communication as well by making you chatter your teeth slightly, rubbing or scratching yourself or any object, tapping or rubbing with your foot; by virtually *any* tactile or auditory stimuli.

– Interrogations. A subject will be interrogated with a soft, masked voice asking “tell me who you are?” or similar question. That’s how it starts. The word ‘who’ or ‘what’ is key. “Who told you….?”, for example. Again they will often mask this other voices and vibration-communication running on top of it. Involuntarily, things related to what they are asking will pop up in your mind.

Ways to counter (hinder) it:

Ask questions back. Apply the Syntel protocol techniques described above if you are game to actually learning this or already have. If not, talk verbally out loud. Do not try to talk back in your head if you don’t know how. Important, you want to ask the question back using a combination of the right-left pattern if using this specific synthetic telepathy protocol. Put a key antonym or negating word on the left side. Example:

Right side: “who told you to”
Left side: “shut up”
Right: “about us?”

Keep repeating this. You can also repeat confusing phrases in a Clinton-esque kind of fashion. In doing this, don’t worry about left-right side protocol. Just say it either out loud or internally straight out.
Examples: “I’ve said that before and so has she.”
“Oh, is that right?”

You may feel the interrogator trying to pull your words to one side or another. Visualize a deep magnetic pole or star on one side of your brain; feel it saying “false, false but is it?… you never now, maybe there’s something on the other side? Wait… there might be something I missed, something going on over there…” so it’s a kind of ambiguous tug-of-war. *Revert to this if the interrogator nails you. “You never know, that may not be all there is to it…. There was something else.” Try not to actually think, just get both hemispheres of your brain in a kind of wrestling match.

The interrogator component will always try to get you to look down and to your left – typical eye movement for recalling the past. So try to look to your right.

If you feel your inner mental voice starting to answer a question or suddenly visualizing, thinking of a correct response, keep your hand over your mouth or nose. This is body language for lying. Also experiment with rubbing your finger across the cleft between your upper lip and nose (mustache area). You may want to keep your hand over and around your nose and mouth, and also dart your eyes around also to act like you are hiding something if they’ve pulled the truth out of you. I’m far from an expert on this subject but these are tips you can try.

Still, it’s almost impossible to win. What they are seeking will always come out. Especially if you get paranoid after a while, or just tired etc. They’ll get everything they want out of you when you fall asleep anyway. The mind has no firewall. Sorry.

One thing though. If the subject is sleep deprived and suffering from psychological damage/torture, then it’s a case of “garbage in / garbage out.” The system does not take into account that the subject’s mind may be a total wreck with multiple paranoid, coping-type double-jeopardy type complexes.

– An aside. There is something called a “car bag.” What’s that? They can control all music in your car. They can also do it anywhere almost! In a grocery or drug store for example. They can play any song or commercial on your car or home radio, or in public. The car bag can also make things move around in your car, for example, an ornament hanging from your rear-view mirror can start moving to get your attention.

Soul reflection – Soul querying

– One of the sickest and biggest violations of God and divinity, of true Cosmic Law, is the theft and/or rape of the soul which can be done in real-time to any individual via soul-catcher technology. The Luciferian controllers can invoke a deep powerful déjà-vu like experience in you, tapping deep into your soul. When they do this it usually recalls a deep childhood memory, something precious and sacred. It’s not private anymore though. A government or black ops military agent can get their filthy “hands” on it anytime. This may be deep powerful loving memories of family from when you were a child, or of a loved one, including one of your own children. It could be of a dead relative or close friend, perhaps who is now a guardian angel. They did/do this with me in their operations, having me communicate with a guardian angel, and also trying to map any kind of spiritual communications with deceased relatives and more. They can have the subject in a “suit” of nanobots, entirely surrounded in a force field. You can see how they can cut you off spiritually if they want, or likewise allow you to have spiritual experiences but capture everything about it, auras, inner voices and images, ineffable feelings etc… Then they study it and back-engineer it, try to replicate it. They copy the frequencies involved to generate fake spiritual experiences in other people as a kind of “high” and false spiritual awakening.

The Luciferian Navy Special Ops controllers can invoke these spiritual soul-reflections at very inappropriate times; they can invoke it in you any time they want. Further, they can play your own soul reflections and spiritual experiences that they’ve stolen from you, back to you. The experience is a very good duplicate but fake. The most precious private, spiritual gifts of life are being stolen, totally stolen.

=> They can invoke deep powerful, hurtful memories that touch your soul, at times when you should be joyous.

They also weaponize your spiritual experiences that they steal. As I said, they are obviously cataloguing humanity’s soul essences, spiritual frequencies. They can take combinations of soul frequencies and mentations and emotions, and mix them just like a music producer might do “sampling” in ripping off riffs from classic hits to put into the next top 40 hit. They plan on using these specially blended frequencies to counter other competing frequencies of enemies. It’s unlikely there will be another major war but if there is it will be between frequencies and will use neurological directed energy weapons. Ironically these are banned by international courts and the Geneva Convention but the United States and other countries use them on their own citizens with impunity. Right now a silent Holocaust is being waged against many of America’s best people. Many people are being tortured to suicide or into mental hospitals.

Modern “revolutions” (Arab Spring) and financial restructuring (remember the terrible imminent collapse of the PIG countries that never happened), the imminent financial depression in America that never happened and the Occupy Nothing, as well as the monthly mass shooting or bombing theatres – all mind control events. I did not want to publish this. Don has a connection at the NSA that keeps him from getting canned no matter what. Entire SEAL and Craft-type teams take the fall.

– CHEMTRAILS

Used for mind control primarily. Applied en-masse and locally in operations on super-soliders or other “program” assets; and on the general public in eugenics campaigns and general configuration and maintenance of humans. They can be applied locally to control or modify any number of subjects as well. Really, chemtrails can be seen as firmware that is flash-written into humans (bio-computers). These are used with nanotech heavily. Same with HAARP. Chemcover/trails provide the basic media through which myriad operations can be performed on human subjects for bad or good.

Franken-clouds: fake clouds that just suddenly appear, created out of almost thin air. They have a metallic-silver kind of sheen to them. They can rapidly disappear too. The engineers are getting much better at creating natural looking chemcover and blanketing the whole skyscape. For some reason, perhaps just for fun, they like to still do old-school style swatch-pattern chemtrails. Usually, as anyone who isn’t blind can see, the sky is just electromagnetic soup, it’s gross. This whole topic at this point is so blatantly obvious there’s little to really disclose. I was told early on that the diabetes epidemic is caused by people eating-drinking out of tin/aluminum cans. The metals in the atmosphere have an effect on the aluminum-metal cans that causes diabetes. This is not by design, I was told, and they are working on a fix for it.

– BLACK PSYCHIATRY

One of the five Navy Special Ops controllers told me how they create horrific lucid nightmares. They put you in a sleepy state or just wait for you to get into one yourself. When you are asleep or just waking up they will do deep sleep-state hypnosis. They will start by using the key words “take me back…” They will ask you to go back to a certain time in childhood or maybe to another time. Usually I think they start with childhood, probably to re-establish some kind of trust between them (a special friend or parental-replacement character they are acting as) and an alter personality they’ve programmed into you. During this process they can “take you deeper” … this is standard hypnosis but with electronic mind control it’s much easier and more powerful. It’s like going lower in an elevator, deeper, deeper. Then they’ll have you start off in a pleasant environment. They will then show you that there are two sides to it. There’s a dividing demarcation boundary line. On the other side there are negative things. Then they will turn it into a nightmare where horrible things, situations and people from the bad side are introduced. You get lured over there and end up in an extremely disturbing situation. Loved ones can be turned into evil, perverted characters.

They really like car wrecks. They can create real-time real-to-life lucid situations in your mind that are horrifying. You can be in a car as a child with a parent driving on the highway. The parent starts to fall asleep and you try desperately to wake your mom or dad as they doze off behind the wheel but can’t. The car is in the process of crashing into other cars and going off the road, and in your mind you are maybe six years old and utterly terrified and helpless.

Horrific sex crimes can be done in your mind.

They may create a fun sexual dream at first. Then it changes into a nightmare. For TI’s who are limited assets in the “program” i.e. MILABS/Super Soldiers, they may create a stick and carrot lesson. They will give you a positive sex dream. Like the strong, lasting impressions in your mind that their artificially induced nightmares have, the positive sex dream can burn into your mind as a good memory (even though it was artificial). But then comes the “stick.” They follow it up with a nightmare to show you there are consequences for undesired behavior, including merely having thoughts, they don’t like.

Why are these nightmares so horrific? They pull the characters, settings, the entire emotional and mental landscape from the deepest recesses of your own mind and soul.

They keep inventing new forms of terror with these psychotronic, lucid nightmares. They can keep you semi-awake and have the nightmare keep going. It can go on for a seemingly long time like this, maybe 5 to 15 minutes… you keep living it in your mind and it’s so real. They can have a force field around you to add vibration effects to it. You could relive a disturbing memory of someone deep in a dark corner of your mind. In the nightmare you might be trying to open a door to escape or be trapped in a maze or trying to hang on to a metal bar on a ski-lift car or Ferris wheel chair that you’ve slipped out of. You could be in this life-or-death struggling situation for, as I said, maybe 15 minutes or more, semi-awake, and you don’t know it’s a nightmare; you are living it in your mind as if it’s real.

The nightmares can get so bad for the TI after a while that in order to keep them from cracking a handler will administer some neurological magic – they will reprogram the TI’s brain to phase out the memory of what just happened and be in an artificial good mood, just a little while after they wake up and ‘learn their lesson’. They might make a moo-goo-gai-pan semi-lobotomized-happy airhead you, and to boot give you a chiseled physique and shave five pounds off you. This is only done if the agency who is using the TI (typically a MILAB) has a vested interest in keeping them alive and functioning for a bit longer, otherwise they’ll let the mental damage just fester and compound. Usually after the subject awakes from the nightmare the handler who is on duty is talking to them to really rub it in.

As stated, a trick they can do is use a force field around you to add vibrations and other effects. This would be great to simulate an act of violence against the TI. They can create holographic images around the subject as well. They might put a thirteen foot “Reptilian” by your bed, standing over you while they pipe a raspy voice into your head. The perpetrators can wake you up in a state of total terror. For example, if you are trying to escape using shielding such as sleeping in a small faraday cage or your car, you could be awakened with a real 3-d sensation of the walls around you actually shaking violently and closing in on you. You could be awoken to a lucid nightmare where you are working in a barn alone, around a large silo of grain and it avalanches on you and buries you alive. Variations of these kinds of freak-accident and homicidal nightmares are only limited by the imaginations of the torturers’ sadistic minds.

These are Luciferians. Many of them are pedophiles. Nearly all of them are rapists. Some may call themselves things like ‘reborn Christians’. They’re Luciferians and they are the most sadistic, evil psychopaths who have ever existed on this planet. Some may be forced to act as torture agents as a form of blackmail but there are core groups that make a long-term profession of it.

FYI – the concept that the hypnosis subject will not be ok with a command or suggestion they are immorally against subconsciously is not valid under electronically induced hypnosis. They will blindly believe and do whatever they are told.

– An aside: THE “NEW EARTH”

No, this isn’t a new ager’s vision of a spiritual renaissance but you hear them using this phrase like a new trend term. It’s the new synthetic earth where all matter is part of the global, remotely-controlled computerized API (application programming interface). Man’s electromagnetic prison with mirages and cloned and fake-synthetic frequencies/energies are all that post-humans experience. This will lose a lot of readers, but cosmic Ascension into higher dimensions was real. A small number of people in the power structure know this. It’s been blocked out now. The sun’s energy is being greatly blocked out under the guise of global warming remediation.

I have to reiterate that this document was brought to you entirely by Don, four other Navy Warfare Special Operations Officers and Tim, a core SEAL team lead beneath them, who run their version of a Luciferian soul-catcher project. It was truly co-written with them. It appears to me that they blame entire SEAL and private contractor teams for various mismanagement and leaks. They go to fantastic lengths to frame everyone else and apparently have friends in the NSA and intelligence community in high places. This document will have virtually no impact on the public. While it presents a serious leak in some ways, nobody of any importance/power will read it or believe it. Northcom and overall globalist plans will not be the slightest bit impacted. I was instructed to, actually tortured into, publishing this to create my own death warrant. Anyone who does appreciate this document may thank parties named above.

MK ULTRA PROJECTS /// VİDEO : Aaron Alexis Not The 1st Mind Controlled Navy Killer ?

VİDEO LİNK :

https://www.youtube.com/watch?v=VlJkDgpzkbw#t=23

MIND CONTROL /// Billion dollar race : Soviet Union vied with US in ‘mind control research’

Competing with the US during the Arms Race, the Soviet Union put extensive effort in unconventional research seeking to outflank its rival in understanding behavior control, remote influencing and parapsychology, a new survey has revealed.

The survey published by Cornell University Library is based on open scientific and journalistic materials and provides an overview of unconventional research in the USSR and then in its successor, Russia, in the period between 1917 and 2003 – as compared to the USA.

The report by Serge Kernbach showed that unconventional weapons took the scientists in both countries to areas bordering sci-fi which nowadays would be seen in TV programs featuring UFOs, the supernatural and superpowers.

Due the Iron Curtain, Soviet and American scientists knew little about each other’s secret work – still, they focused on same themes.

In the Soviet Union, among the areas of particular interest, were, for instance, “the impact of weak and strong electromagnetic emission on biological objects, quantum entanglement in macroscopic systems, nonlocal signal transmission based on the Aharonov-Bohm effect, and ‘human operator’ phenomena,” the survey says.

Soviet scientists were developing a field they dubbed “psychotronics.” The country spent between $0.5-1 billion on research of the phenomena, Kernbach who works, at the Research Center of Advanced Robotics and Environmental Science in Stuttgart, Germany, found out.

Some of the programs in psychotronic research – even those launched decades ago – have not been officially published.

“For instance, documents on experiments performed in OGPU and NKVD – even 80 years after – still remain classified,” Kernbach noted. The OGPU (Joint State Political Directorate) was the Soviet secret police and the NKVD (The People’s Commissariat for Internal Affairs) was the main law enforcing body, which was later transformed into the Internal Ministry and a security organization which was part of it – into the KGB.

According to the survey, Soviet and American areas of interest often mirrored each other. In particular, Kernbach recalls the Central Intelligence Agency’s (CIA) scandalous human research program MKUltra which involved the use of various methods to manipulate an individual’s mental states and alter brain functions.

“As mentioned in the public documents, the program to some extent was motivated by the corresponding NKVD’s program, with similar strategies of using psychotropic (e.g. drugs) substances and technical equipment,” Kernbach said.

In the 60s and the 70s, the Soviet Union was actively researching the influence of electromagnetic fields on human physiological and psychological conditions. Several authors point to the application of research results in the form of new weapons in the USA and the Soviet Union.

“Over the past years, US researchers have confirmed the possibility of affecting functions of the nervous system by weak electromagnetic fields (EMFs), as it was previously said by Soviet researchers. EMFs may cause acoustic hallucination (’radiosound’) and reduce the sensitivity of humans and animals to some other stimuli, to change the activity of the brain (especially the hypothalamus and the cortex), to break the processes of formation processing and information storage in the brain. These nonspecific changes in the central nervous system can serve as a basis for studying the possibilities of the direct influence of EMFs on specific functions of CNS,” read an article in Nauka (Science) magazine in 1982.

A US Marine Corps truck is seen carrying a palletized version of the Active Denial System, March 9th, 2012, at the US Marine Corps Base Quantico, Virginia. It is a US DoD non-lethal weapon that uses directed energy and projects a beam of man-sized millimeter waves up to 1000 meters that when fired at a human, delivers a heat sensation to the skin and generally makes humans stop what they are doing and run. (AFP Photo/Paul J. Richards)

Kernbach’s analysis lacks details on practical results of unconventional research in the USSR.

He mentions though a device invented by Anatoly Beridze-Stakhovsky – the torsion generator ‘Cerpan’. The exact structure of the device is unknown, as the scientist feared it would be put to unethical uses. Cerpan was designed on the “shape effect” produced by torsion fields. Some sources claim that the device – a 7-kilo metal cylinder – was used to heal people, including Kremlin senior officials.

Kernbach’s overview of unconventional research in USSR and Russia suggests that following the collapse of the USSR in 1991, these programs were first reduced and then completely closed in 2003.

“Due to academic and non-academic researchers, the instrumental psychotronics, denoted sometimes as torsionics, still continue to grow, but we cannot speak about government programs in Russia any longer,” he said.

However, based on the number of participants at major conferences, the number of psychotronics researchers in Russia is estimated between 200 and 500, the report said.

Last year, the now-fired Defense Minister Anatoly Serdyukov said his ministry was working on futuristic weaponry.

“The development of weaponry based on new physics principles; direct-energy weapons, geophysical weapons, wave-energy weapons, genetic weapons, psychotronic weapons, etc., is part of the state arms procurement program for 2011-2020,” Serdyukov said at a meeting with the then Prime Minister Vladimir Putin, cited RIA Novosti.

That followed a series of Putin’s presidential campaign articles, one of which focused on national security guarantees. Speaking about new challenges that Russia may face, and which armed forces should be ready to respond to, he wrote:

“Space-based systems and IT tools, especially in cyberspace, will play a great, if not decisive role in armed conflicts. In a more remote future, weapon systems that use different physical principles will be created (beam, geophysical, wave, genetic, psychophysical and other types of weapons). All this will provide fundamentally new instruments for achieving political and strategic goals in addition to nuclear weapons.”

Original: http://rt.com/news/psychotronic-arms-soviet-weapon-379/

MK ULTRA PROJECTS : New Paint May – Block Mind Control

By Ted Twietmeyer

In the past, I’ve written about mind control issues and RF frequencies. Basically there are two types – mind control systems employing ordinary RF frequencies, and those employing scalar waves. Both types have different characteristics. However, scalar waves are very difficult to block. For both types, the most effective shielding is simply distance.

It has been well known for decades, that the human head resonates at a certain UHF frequency and a harmonic of it found in the microwave band. Oddly enough – the microwave harmonic frequency found at about 1.2GHz is disturbingly close to digital cell frequencies. A coincidence of course

Many readers have written me in the past about articles I wrote which were posted on Rense, asking for help to shield themselves from RF harassment.

QUICK PRIMER ON SHEILDING

Shielding is used for everything from tuners in televisions and radios to television, radio and audio cables and millions of other uses. Shielding works in two directions with radio frequencies ¬ it keeps signals in and unwanted signals out. Imagine you were to remove the shielding inside a cell phone (which is simply an automatic two-way radio.) If you did this, the moment you pick it up to use it the radio circuits would be de-tuned from the capacitance from your hand and the phone would no longer function. A cell phone’s internal shielding prevents your body from affecting the circuitry, and from radio and television signals in the environment around you phone from getting into the phone. With audio cables, the shielding prevents AC hum from being coupled into your sound system from AC power cords and cables.

Stealth technology dates back to the days of German U-Boats. These submarines used a rubberized conductive paint to absorb allied radar signals while surfaced, making them invisible to allied Navy radar. Since that time, more sophisticated paint compounds have been developed which are easier to apply to aircraft, vessels and vehicles. However, these compounds these have been classified and unavailable to the public. Until now

YOU MAY BE ABLE TO PAINT AWAY YOUR RF PROBLEMS

A company called EM-SEC Technologies has a new coating called UniShield [1] that will block radio signals. This compound is mainly intended for cell phones, wireless and other devices (which may also include some listening devices.) It is intended to prevent hackers from tapping into wireless data but clearly may have other uses. Paint can be applied with a roller, brush or sprayed on and dries in about 30 minutes. At about $5.00 per square foot this paint isn’t cheap – but then effective security never is. The manufacturer states that the cost drops with the area covered. With ugly colors of gray or "buff," one might want to paint over it afterwards. This might be a good thing to do first if you will be repainting a room.

Before you whip out your credit card to get this pricey paint there are several considerations. First, know that cordless or cell phones, wireless devices or pagers will no longer communicate outside that painted room unless a window has a straight line-of- sight to a nearby cell tower. The paint has been tested for about three years at an un-named defense installation. For cordless phones, they may never work at all again in that room. These phones depend on the signal traveling through floors and walls.

CHALLENGES TO USING SHIELDING PAINT

The difficulty comes with mind control signals, and whether this paint will stop it. Mind control equipment is highly classified and they don’t publish data sheets for their equipment on the internet. Some research appears to show that separated layers of metal sheeting can stop scalar waves. Therefore, this paint would not be applicable to that technology. Since some mind control signals can originate from satellites, be prepared to also shield your ceiling(s) and floor as well. For carpeted floors, you may have to take up the carpeting and paint the under-layment flooring with one or two coats then have the carpet re-installed (stretched and put back on the cleats by a professional.) Hardwood floors are even more difficult. If one were to prioritize which rooms to shield first, the bedroom would probably be at the top of the list, followed by the living room (or whatever the room is in which you spend all your time awake in.)

If someone knows they are under RF attack, then either layered metal shielding (described later) or shielding paint may be worth a try. A corner reflector structure using readily available, 4 ft. x 8ft. foil-backed foam insulation sheets from a building or home improvement supply store might be a good start until a more permanent shielding system can be installed. However, this only works for an attack coming from one direction. But the beauty of it is that not only can it shield you from most RF frequencies, but it sends an attacker’s RF beam back to them. Then they can enjoy it, too. After all it’s better to give than to receive, right?

CORNER REFLECTOR APPLICATION

Note that the above reflector scheme may not be effective for scalar wave technology.

USING SHIELDING PAINT

SHIELDING PANELS

The walls and ceiling of an MRI magnet room (where patients are scanned) are shielded from all outside RF interference. Installers use 4ft. x 8ft. panels consisting of an inside layer of aluminum sheeting, a layer of 5/8" thick particle board and then an outside layer of aluminum sheeting. It may be possible to make a scalar shield with a sandwich of two or more layers of aluminum or sheet metal, with each layer separated by a non-metallic layer (such as plywood, particle board or foam) may be effective in stopping or reducing the intensity of scalar waves.

When shielding a room don’t forget doors and windows! You may need metal or layered metal for these.

HIGH FREQUENCY TONE ¬ IT’S HEARD EVERWHERE

You can probably hear the tone (high frequency) right now if the room you’re in is relatively quiet. On the http://www.data4science.net website there is a section dedicated to the High Frequency Tone Project. This is a high frequency sound heard almost everywhere on the planet which is similar to the horizontal frequency of a television set. This frequency apparently originates from either cell towers or overhead satellites. Its long term effect on the health (and sanity) of the population is not known, but people all over the world are hearing it. Some of their testimonies are available on the above website. There is some evidence that certain frequencies cause both benign and malignant infections. Infections and diseases are connected to RF resonance theory which was demonstrated in the 1930s.

Our family lost a close relative to a cancerous growth 4 years ago, which originated on the side of his head – exactly where his cell phone antenna was. The cancer quickly spread to stage 4 in only a few months. I’ve never considered owning a cell phone. Is it merely a coincidence, considering this cancer does not run in the family? However, he laughed at me when I warned him about the cancer risk only a few months before he was diagnosed. His laughing stopped on the very day he received the fatal diagnosis.

The legal microwave leakage limit for a microwave oven door seal is 1 milliwatt as measured at the door seal. Yet cell phones can legally emit 200 milliwatts, and ealier cell phones had power levels of up to 4,000 milliwatts.

Does it make sense to put any of this energy into your scull, up close and personal?

The serious question about RF and scalar attacks on people remains ¬ what happens in the long term to these victims? Does this high frequency tone found everywhere prove we are ALL victims of mind control?

Ted Twietmeyer

www.data4science.net

www.bookonmars.info

tedtw

[1] http://www.unishield.com/

MIND CONTROL : Mandela interpreter claims schizophrenic episode

VİDEOYU BURADAN İZLEYEBİLİRSİNİZ.

Sign language interpreter Thamsanqa Jantjie, who was interpreting at the memorial service of late former president Nelson Mandela speaks at his home in Bramfischerville, South Africa, on Dec. 11, 2013.(Photo: Itumeleng English, AP)

JOHANNESBURG – The South African sign language interpreter accused of using "fake" signs at Nelson Mandela’s memorial service this week said he suffered a schizophrenic episode at the event during which he hallucinated and heard voices.

Thamsanqa Jantjie made the admissions to Johannesburg’s Star newspaper Thursday following allegations that have led to him being called an impostor by sign language experts.

"There was nothing I could do. I was alone in a very dangerous situation," Jantjie said. "I tried to control myself and not show the world what was going on. I am very sorry, it’s the situation I found myself in."

The latest revelations prompted an apology Thursday by a South African cabinet minister who said a mistake was made in hiring Jantjie. Hendrietta Bogopane-Zulu apologized to South Africa’s deaf community during a press conference but denied that the country felt embarrassed by the controversy.

"I don’t think he was just picked up on the street. He went to a school for the deaf," she said.

Still, in a separate interview with the Associated Press, Jantjie said that while he was on stage at the FNB Stadium he saw visions of angels. He also told the AP that he has previously been violent and was once hospitalized in a mental health facility for more than a year.

Jantjie stood approximately three feet from President Obama and other world leaders during Tuesday’s ceremony to honor Mandela, and the state of Jantjie’s mental health that day will raise serious security questions for South African authorities.

Jantjie told the Star newspaper that he was paid R850, or about $85, to interpret at the ceremony.

"Life is unfair. This illness is unfair. Anyone who doesn’t understand this illness will think that I’m just making this up," he said.

He said that as a result of the episode his ability to hear and interpret was impaired, but that he felt that given the gravity of the occasion he couldn’t leave.

On the day of the memorial service Jantjie was due get a regular six-month mental health checkup to determine whether the medication he takes was working, whether it needed to be changed or whether he needed to be kept at a mental health facility for treatment, the AP reported.

Sign language experts claim that Jantjie’s interpretations for numerous dignitaries, heads of state and even members of the extended Mandela family amounted to "gibberish."

"He wasn’t even doing anything, There was not one sign there. Nothing. He was literally flapping his arms around," Cara Loening, director of Sign Language Education and Development in Cape Town, told the Agence France-Presse news service.

Asked if he was happy with his performance by local radio station Talk Radio 702 on Thursday, Jantjie said: "Absolutely! What I have been doing I think I have been a champion of sign language. I have interpreted many big events. Not only the event that’s in question now," Jantjie said.

He said these events included political press conferences and the funeral of Albertina Sisulu, the widow of anti-apartheid activist and Robben Islander Walter Sisulu.

He refused to explain details of his qualifications and referred such questions to the company that booked him for the event, a company he called SA Interpreters. Not a lot is known about that company.

AP journalists who visited the address that Jantjie provided for SA Interpreters found a different company there where managers said they knew nothing about the firm.

Hendrietta Bogopane-Zulu said Thursday that government officials have tried to track down the company that contracted Jantjie for the memorial service but that the owners "have vanished into thin air."

Kim Hjelmgaard reported from London, follow him on Twitter: @khjelmgaard

MIND CONTROL : State of Deception

Why won’t the President rein in the intelligence community?

by Ryan Lizza December 16, 2013

A senator campaigning for reform says that the intelligence leadership drives “how decisions get made at the White House.” Illustration by the Heads of State.

On March 12, 2013, James R. Clapper appeared before the Senate Select Committee on Intelligence to discuss the threats facing America. Clapper, who is seventy-two, is a retired Air Force general and Barack Obama’s director of National Intelligence, in charge of overseeing the National Security Agency, the Central Intelligence Agency, and fourteen other U.S. spy agencies. Clapper is bald, with a gray goatee and rimless spectacles, and his affect is intimidatingly bureaucratic. The fifteen-member Intelligence Committee was created in the nineteen-seventies, after a series of investigations revealed that the N.S.A. and the C.I.A. had, for years, been illegally spying on Americans. The panel’s mission is to conduct “vigilant legislative oversight” of the intelligence community, but more often it treats senior intelligence officials like matinée idols. As the senators took turns at the microphone, greeting Clapper with anodyne statements and inquiries, he obligingly led them on a tour of the dangers posed by homegrown extremists, far-flung terrorist groups, and emerging nuclear powers.

“This hearing is really a unique opportunity to inform the American public to the extent we can about the threats we face as a nation, and worldwide,” Dianne Feinstein, a California Democrat and the committee’s chairman, said at one point. She asked committee members to “refrain from asking questions here that have classified answers.” Saxby Chambliss, a Georgia Republican, asked about the lessons of the terrorist attack in Benghazi. Marco Rubio, a Florida Republican, asked about the dangers of Egypt’s Muslim Brotherhood.

Toward the end of the hearing, Feinstein turned to Senator Ron Wyden, of Oregon, also a Democrat, who had a final question. The two senators have been friends. Feinstein held a baby shower for Wyden and his wife, Nancy Bass, before the birth of twins, in 2007. But, since then, their increasingly divergent views on intelligence policy have strained the relationship. “This is an issue where we just have a difference of opinion,” Wyden told me. Feinstein often uses the committee to bolster the tools that spy agencies say they need to protect the country, and Wyden has been increasingly concerned about privacy rights. For almost a decade, he has been trying to force intelligence officials like Clapper to be more forthcoming about spy programs that gather information about Americans who have no connection to terrorism.

Wyden had an uneasy kind of vindication in June, three months after Clapper’s appearance, when Edward Snowden, a former contractor at the N.S.A., leaked pages and pages of classified N.S.A. documents. They showed that, for the past twelve years, the agency has been running programs that secretly collect detailed information about the phone and Internet usage of Americans. The programs have been plagued by compliance issues, and the legal arguments justifying the surveillance regime have been kept from view. Wyden has long been aware of the programs and of the agency’s appalling compliance record, and has tried everything short of disclosing classified information to warn the public. At the March panel, he looked down at Clapper as if he were about to eat a long-delayed meal.

Wyden estimates that he gets about fifteen minutes a year to ask questions of top intelligence officials at open hearings. With the help of his intelligence staffer, John Dickas, a thirty-five-year-old from Beaverton, Oregon, whom Wyden calls “the hero of the intelligence-reform movement,” Wyden often spends weeks preparing his questions. He and Dickas look for opportunities to interrogate officials on the gaps between what they say in public and what they say in classified briefings. At a technology conference in Nevada the previous summer, General Keith Alexander, the director of the N.S.A., had said that “the story that we have millions or hundreds of millions of dossiers on people is absolutely false.” Wyden told me recently, “It sure didn’t sound like the world I heard about in private.” For months, he tried to get a clarification from the N.S.A. about exactly what Alexander had meant. Now he had the opportunity to ask Clapper in public. As a courtesy, he had sent him the question the day before.

Wyden leaned forward and read Alexander’s comment. Then he asked, “What I wanted to see is if you could give me a yes or no answer to the question ‘Does the N.S.A. collect any type of data at all on millions or hundreds of millions of Americans?’ ”

Clapper slouched in his chair. He touched the fingertips of his right hand to his forehead and made a fist with his left hand.

“No, sir,” he said. He gave a quick shake of his head and looked down at the table.

“It does not?” Wyden asked, with exaggerated surprise.

“Not wittingly,” Clapper replied. He started scratching his forehead and looked away from Wyden. “There are cases where they could inadvertently perhaps collect, but not wittingly.”

Wyden told me, “The answer was obviously misleading, false.” Feinstein said, “I was startled by the answer.” In Washington, Snowden’s subsequent leaks created the most intense debate about the tradeoffs between national security and individual liberty since the attacks of September 11th. The debate will likely continue. According to Feinstein, Snowden took “millions of pages” of documents. Only a small fraction have become public. Under directions that the White House issued in June, Clapper declassified hundreds of pages of additional N.S.A. documents about the domestic-surveillance programs, and these have only begun to be examined by the press. They present a portrait of an intelligence agency that has struggled but often failed to comply with court-imposed rules established to monitor its most sensitive activities. The N.S.A. is generally authorized to collect any foreign intelligence it wants—including conversations from the cell phone of Germany’s Chancellor, Angela Merkel—but domestic surveillance is governed by strict laws. Since 2001, the N.S.A. has run four surveillance programs that, in an effort to detect terrorist plots, have swept up the contents of the phone and Internet communications of hundreds of thousands of Americans, and collected the telephone and Internet metadata of many more Americans. (Metadata is data about data. For telephone records, it can include numbers dialled, the date, time, and length of calls, and the unique identification of a cell phone. Internet metadata can include e-mail and I.P. addresses, along with location information, Web sites visited, and many other electronic traces left when a person goes online.)

Soon after the March hearing, Dickas called a senior member of Clapper’s staff and requested that Clapper acknowledge that his statement had been wrong. Through his staff member, Clapper declined. In July, however, after Snowden’s leaks, Clapper finally wrote to the committee and offered a formal retraction: “My response was clearly erroneous, for which I apologize.” Wyden told me, “There is not a shred of evidence that the statement ever would’ve been corrected absent the Snowden disclosures.”

Wyden is now working on a bill that would ban the mass collection of phone records and reform the court that oversees the N.S.A.’s domestic surveillance. Feinstein, who has resisted most of Wyden’s efforts at disclosure over the years, has put forward her own legislation, which would authorize the N.S.A. to continue bulk collection. Wyden dismisses her bill as “cosmetic stuff that just puts the old wine in a new bottle.” Feinstein counters that it “puts some very stringent parameters on” the program. She adds, “Senator Wyden also calls it a ‘surveillance program.’ It’s not a surveillance program—it is a data-collection program.”

Feinstein and Clapper insist that Wyden’s latest proposals would deprive the N.S.A. of crucial tools that it uses to disrupt terrorist plots. President Obama has been mostly silent on the issue. In August, he appointed a five-person panel to review intelligence policy, and the group is scheduled to issue recommendations by the end of the year. His decisions about what changes to endorse could determine whether his Presidency is remembered for rolling back one of the most controversial national-security policies of the Bush years or codifying it.

Wyden, who said that he has had “several spirited discussions” with Obama, is not optimistic. “It really seems like General Clapper, the intelligence leadership, and the lawyers drive this in terms of how decisions get made at the White House,” he told me. It is evident from the Snowden leaks that Obama inherited a regime of dragnet surveillance that often operated outside the law and raised serious constitutional questions. Instead of shutting down or scaling back the programs, Obama has worked to bring them into narrow compliance with rules—set forth by a court that operates in secret—that often contradict the views on surveillance that he strongly expressed when he was a senator and a Presidential candidate.

“These are profoundly different visions,” Wyden said, referring to his disagreements with Obama, Feinstein, and senior intelligence officials. “I start with the proposition that security and liberty are not mutually exclusive.” He noted that General Alexander had an “exceptionally expansive vision” of what the N.S.A. should collect. I asked Wyden for his opinion of the members of the review panel, most of whom are officials with ties to the intelligence establishment. He smiled and raised his eyebrows. An aide said, “Hope springs eternal.”

I—IS IT LEGAL?

In 1961, when John F. Kennedy took office, he inherited a scheme from his predecessor, Dwight Eisenhower, to invade Cuba with a small band of exiles and overthrow Fidel Castro. The plot, devised by the C.I.A. and carried out in April of that year, was a disaster: the invading forces, shepherded by C.I.A. operatives, were killed or captured, and Castro’s stature increased.

The failed plot is richly documented in a 1979 book, “Bay of Pigs: The Untold Story,” written by Senator Wyden’s father, Peter. At the time of its release, the book, which won an Overseas Press Club award, was the most comprehensive account of the Bay of Pigs fiasco. (During a six-hour interview with Peter Wyden, Castro marvelled that the author “knows more about it than we do.”) One recent morning, when Ron Wyden and I were sitting in his office discussing the N.S.A., he leaped out of his chair and walked across the room to a small bookshelf. “I want to show you something,” he said, and handed me a tattered copy of his father’s book. It describes how the C.I.A.’s arrogance and obsessive secrecy, combined with Kennedy’s naïveté, led a young President to embrace a wildly flawed policy, resulting in an incident that the author likens to “Waterloo staged by the Marx Brothers.” In Ron Wyden’s view, the book explains a great deal about the modern intelligence community and his approach to its oversight.

Wyden, a former college-basketball player, is a gangly six feet four and speaks in an incongruous high-pitched voice. He grew up in Palo Alto, California, and graduated from Stanford, where his mother was a librarian. He went to law school at the University of Oregon and, in 1972, worked as a volunteer on the campaign of Senator Wayne Morse. Morse, an Oregon Democrat, had been one of two senators to vote against the Gulf of Tonkin Resolution, eight years earlier, and became an outspoken opponent of the Vietnam War. The position had cost him the ’68 race; the Republican Bob Packwood won. “Perhaps more than any other political figure I’ve either been around or studied, Morse embodied a sense of independence,” Wyden said. “I thought, This is what public service is supposed to be about.”

Wyden was Morse’s expert on issues important to seniors in Oregon, and he later set up the Oregon chapter of the Gray Panthers, an organization that fought for seniors’ rights. One of the earliest national newspaper stories about Wyden, which ran in the Times on January 7, 1979, described a victory that elderly Oregonians won in the state legislature, where a Wyden-backed plan to allow non-dentists to fit and sell dentures was approved. “I think the measure really shows that senior citizens have bulging political biceps,” Wyden told the Times.

The next year, at thirty-one, Wyden won a U.S. House seat in a Portland district. Although he focussed on domestic issues, he entered politics just as major changes were taking place in the intelligence agencies. In the nineteen-seventies, a Senate committee chaired by Frank Church revealed widespread abuses at the N.S.A., the C.I.A., and other agencies, including active programs to spy on Americans. An N.S.A. program called Project SHAMROCK, which started shortly after the Second World War, had persuaded three major American telegraph companies to hand over most of their traffic. By the time the program was shut down, in 1975, the N.S.A. had collected information on some seventy-five thousand citizens. For many years, the information was shared with the C.I.A., which was running its own illegal domestic-intelligence program, Operation CHAOS.

The Church committee recommended not only sweeping reform of the laws governing the intelligence community but also a new system of oversight. Senator Walter Mondale, a member of the committee, said he worried about “another day and another President, another perceived risk and someone breathing hot down the neck of the military leader then in charge of the N.S.A.” Under those circumstances, he feared, the N.S.A. “could be used by President ‘A’ in the future to spy upon the American people.” He urged Congress to “very carefully define the law.” In 1978, Congress passed the Foreign Intelligence Surveillance Act, or FISA, which forbade the intelligence agencies to spy on anyone in the U.S. unless they had probable cause to believe that the person was a “foreign power or the agent of a foreign power.” The law set up the Foreign Intelligence Surveillance Court, and, in 1976, Congress created the Senate Select Committee on Intelligence. The N.S.A. and other spy agencies are instructed to keep the committee, as well as a similar one in the House, “fully and currently informed.”

In 1995, Packwood resigned, after numerous women accused him of sexual harassment and assault, and Wyden won a special election, in 1996, to replace him. In early 2001, he landed a spot on the Intelligence Committee. His father had told him about how the intelligence community had stonewalled his requests for basic information for his book. Wyden soon encountered that opacity himself, he told me, especially after September 11th: “That really changed the debate.”

On October 13, 2001, fifty computer servers arrived at the N.S.A.’s headquarters, in Fort Meade, Maryland. The vender concealed the identity of the N.S.A. by selling the servers to other customers and then delivering the shipments to the spy agency under police escort. According to a 2009 working draft of a report by the N.S.A.’s inspector general, which Snowden provided to Glenn Greenwald, of the Guardian, their arrival marked the start of four of the most controversial surveillance programs in the agency’s history—programs that, for the most part, are ongoing. At the time, the operation was code-named STARBURST.

In the days after 9/11, General Michael Hayden, the director of the N.S.A., was under intense pressure to intercept communications between Al Qaeda leaders abroad and potential terrorists inside the U.S. According to the inspector general’s report, George Tenet, the director of the C.I.A., told Hayden that Vice-President Dick Cheney wanted to know “if N.S.A. could be doing more.” Hayden noted the limitations of the FISA law, which prevented the N.S.A. from indiscriminately collecting electronic communications of Americans. The agency was legally vacuuming up just about any foreign communications it wanted. But when it targeted one side of a call or an e-mail that involved someone in the U.S. the spy agency had to seek permission from the FISA court to conduct surveillance. Tenet later called Hayden back: Cheney wanted to know what else the N.S.A. might be able to do if Hayden was given authority that was not currently in the law.

Hayden resurrected a plan from the Clinton years. In the late fall of 1999, a large body of intelligence suggested that Osama bin Laden was planning multiple attacks around New Year’s Eve. The Clinton Administration was desperate to discover links between Al Qaeda operatives and potential terrorists in the U.S., and N.S.A. engineers had an idea that they called “contact chaining.” The N.S.A. had collected a trove of telephone metadata. According to the N.S.A. report, “Analysts would chain through masked U.S. telephone numbers to discover foreign connections to those numbers.”

Officials apparently believed that, because the U.S. numbers were hidden, even from the analysts, the idea might pass legal scrutiny. But the Justice Department thought otherwise, and in December of 1999 it advised the N.S.A. that the plan was tantamount to electronic surveillance under FISA: it was illegal for the N.S.A. to rummage through the phone records of Americans without a probable cause. Nonetheless, the concept of bulk collection and analysis of metadata was born. During several meetings at the White House in the fall of 2001, Hayden told Cheney that the FISA law was outdated. To collect the content of communications (what someone says in a phone call or writes in an e-mail) or the metadata of phone and Internet communications if one or both parties to the communication were in the U.S., he needed approval from the fisa court. Obtaining court orders usually took four to six weeks, and even emergency orders, which were sometimes granted, took a day or more. Hayden and Cheney discussed ways the N.S.A. could collect content and metadata without a court order.

The Vice-President’s lawyer, David Addington, drafted language authorizing the N.S.A. to collect four streams of data without the FISA court’s permission: the content of Internet and phone communications, and Internet and phone metadata. The White House secretly argued that Bush was allowed to circumvent the FISA law governing domestic surveillance thanks to the extraordinary power granted by Congress’s resolution, on September 14th, declaring war against Al Qaeda. On October 4th, Bush signed the surveillance authorization. It became known inside the government as the P.S.P., the President’s Surveillance Program. Tenet authorized an initial twenty-five million dollars to fund it. Hayden stored the document in his office safe.

Over the weekend of October 6, 2001, the three major telephone companies—A. T. & T., Verizon, and BellSouth, which for decades have had classified relationships with the N.S.A.—began providing wiretap recordings of N.S.A. targets. The content of e-mails followed shortly afterward. By November, a couple of weeks after the secret computer servers were delivered, phone and Internet metadata from the three phone companies began flowing to the N.S.A. servers over classified lines or on compact disks. Twenty N.S.A. employees, working around the clock in a new Metadata Analysis Center, at the agency’s headquarters, conducted the kind of sophisticated contact chaining of terrorist networks that the Clinton Justice Department had disallowed. On October 31st, the cover term for the program was changed to STELLARWIND.

Nearly everyone involved wondered whether the program was legal. Hayden didn’t ask his own general counsel, Robert Deitz, for his opinion until after Bush signed the order. (Deitz told Hayden he believed that it was legal.) John Yoo, a Justice Department lawyer, wrote a legal opinion, the full text of which has never been disclosed, arguing that the plan was legal. When Deitz tried to obtain the text, Addington refused his request but read him some excerpts over the phone. Hayden never asked for the official legal opinion and never saw it, according to the inspector general’s report. In May, 2002, the N.S.A. briefed Judge Colleen Kollar-Kotelly, the incoming chief of the Foreign Intelligence Surveillance Court, about the program. She was shown a short memo from the Department of Justice defending its legality, but wasn’t allowed to keep a copy. The N.S.A.’s inspector general later said he found it “strange that N.S.A. was told to execute a secret program that everyone knew presented legal questions, without being told the underpinning legal theory.”

Meanwhile, Wyden, on the Intelligence Committee, found himself involved in the first debate about the U.S.A. Patriot Act, a law that the Bush White House pushed through Congress in October, 2001, and which included major changes to FISA. Tucked into the bill, in Section 215, was something called the “business records” provision. It allowed the government to seize “any tangible thing” from a company as long as officials proved to the FISA court that the item was “sought for an investigation to protect against international terrorism.”

Of the many new powers that Congress granted law enforcement through the Patriot Act—roving wiretaps, delayed-notice search warrants—this was not the most controversial provision at the time. It was often innocuously described as the “library records” provision, conjuring the notion that the government should know if someone is checking out bomb-making books. Some members of Congress were satisfied with the wording because Representative Jim Sensenbrenner, a Republican who was the chairman of the Judiciary Committee, and who wrote the Patriot Act, had defeated an effort by the Bush White House to make the provision even more expansive. Wyden voted for the legislation, which included the most substantial modifications of FISA since 1978, when it was enacted, but he helped attach “sunsets” to many provisions, including Section 215, that hadn’t been thoroughly examined: in five years, Congress would have to vote again, to reauthorize them. As Wyden later wrote, “The idea was that these provisions would be more thoughtfully debated at a later, less panicked time.” The Patriot Act passed overwhelmingly. (Russ Feingold, of Wisconsin, was the only senator to oppose it.)

Three months later, the Defense Department started a new program with the Orwellian name Total Information Awareness. T.I.A. was based inside the Pentagon’s Information Awareness Office, which was headed by Admiral John Poindexter. In the nineteen-eighties, Poindexter had been convicted, and then acquitted, of perjury for his role in the Iran-Contra scandal. He wanted to create a system that could mine a seemingly infinite number of government and private-sector databases in order to detect suspicious activity and preëmpt attacks. The T.I.A. system was intended to collect information about the faces, fingerprints, irises, and even the gait of suspicious people. In 2002 and 2003, Wyden attacked the program as a major affront to privacy rights and urged that it be shut down.

In the summer of 2003, while Congress debated a crucial vote on the future of the plan, Wyden instructed an intern to sift through the Pentagon’s documents about T.I.A. The intern discovered that one of the program’s ideas was to create a futures market in which anonymous users could place bets on events such as assassinations and terrorist attacks, and get paid on the basis of whether the events occurred. Wyden called Byron Dorgan, a Democratic senator from North Dakota, who was also working to kill the program. “Byron, we’ve got what we need to win this,” he told him. “You and I should make this public.” Twenty-four hours after they exposed the futures-market idea at a press conference, Total Information Awareness was dead. Poindexter soon resigned.

It was Wyden’s first real victory on the Intelligence Committee. “If you spend enough time digging into these documents and doing the work, it can pay off,” Wyden told me. “The one advantage that I have, being on the Intelligence Committee, is a chance to get access to information. But you really have to fight for it.”

In the first season of “Homeland,” the Showtime drama about the C.I.A. and terrorism, the protagonist, an agent named Carrie Mathison, conducts warrantless surveillance on an American whom she suspects is a terrorist. Saul Berenson, her boss at the C.I.A., realizes that it’s problematic, so he persuades a judge on the FISA court to give the operation the court’s legal imprimatur. Like many of the show’s plot twists, the episode seemed implausible. But it is a pale shadow of what happened with the Bush-era surveillance programs. Between 2001 and 2007, according to the inspector general’s report, before the four STELLARWIND programs had all gained a legal legitimacy, the N.S.A. wiretapped more than twenty-six hundred American telephones and four hundred American e-mail accounts, and collected phone and Internet metadata from hundreds of millions more.

During that time, an expanding circle of people in Washington, including members of Congress, lawyers at the Justice Department, reporters, and, eventually, the public, gradually became aware of the Bush programs. Jay Rockefeller, then the top Democrat on the Intelligence Committee, was one of the first officials to express dissent. On July 17, 2003, Rockefeller came back shaken from a White House meeting with Cheney, who had briefed him on the N.S.A. programs. While Congress was shutting down the Total Information Awareness program, the four phone- and Internet-spying programs under STELLARWIND had been up and running for about two years. Rockefeller drafted a handwritten letter to Cheney. “Clearly, the activities we discussed raise profound oversight issues,” he wrote. “As you know, I am neither a technician nor an attorney. Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own, I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA project sprung to mind, exacerbating my concern regarding the direction the Administration is moving with regard to security, technology, and surveillance.”

Some Administration officials were concerned, too. In early March of 2004, Deputy Attorney General James Comey, who was serving as the acting Attorney General while John Ashcroft was in the hospital, determined that three of the four STELLARWIND programs were legal, but that the program involving the bulk collection of Internet metadata was not. Cheney summoned Comey to the White House and tried to change his mind, telling him that his decision would put thousands of lives at risk. Comey wouldn’t budge. Bush then sent two top White House aides to the hospital to visit Ashcroft, who was in the intensive-care unit after surgery. Ashcroft refused to overrule Comey, and the White House decided that Alberto Gonzales, Bush’s counsel, would sign a new authorization instead. Addington called Hayden the following day to make sure that he would accept the document despite the opposition of the Justice Department. “Will you do it?” he asked, according to the N.S.A. report. Hayden told me that he agreed, because he “had multiple previous such orders from D.O.J.” and “strong congressional support,” and also had in mind “the deaths of nearly two hundred Spaniards that morning in an Al Qaeda terrorist attack in Madrid.”

Lawyers many tiers below the Attorney General slowly became aware that the N.S.A. was working on something that people referred to simply as “the program.” Not long after Comey’s refusal, one Justice lawyer, Thomas M. Tamm, picked up a pay phone in a Metro station and called the Times. He told the newspaper everything he knew about STELLARWIND. As the paper began investigating Tamm’s allegations, the N.S.A. decided that the STELLARWIND programs needed a legal justification that carried more weight than a letter from the President. Like the C.I.A.’s Saul Berenson in “Homeland,” the agency asked the FISA court to make the programs legal. (As of March 26th, the Internet-metadata program had been suspended.) According to the N.S.A. report, lawyers at the N.S.A. and the Justice Department “immediately began efforts to re-create this authority.”

Over the summer, on two consecutive Saturdays, Hayden met with Judge Kollar-Kotelly, of the FISA court, to press for new authority to run the Internet-metadata program. On July 14, 2004, she gave her assent. She cited a contentious 1979 Supreme Court case, Smith v. Maryland, which held that police could place a type of monitor called a “pen register” on a suspect’s phone without a warrant. But the order didn’t target a single device; it allowed the N.S.A. to collect the metadata of all U.S. devices communicating with devices outside the U.S. According to the N.S.A. report, “The order essentially gave N.S.A. the same authority to collect bulk Internet metadata that it had under the P.S.P.,” Bush’s original, warrantless plan. (Later, Judge Kollar-Kotelly reportedly expressed misgivings about the N.S.A.’s misuse of the program, even shutting it down at one point, when she learned that the N.S.A. might have been overstepping its authority.)

On December 16, 2005, the Times broke the news about some aspects of the President’s four-pronged surveillance program. After the story appeared, Bush addressed the country to defend the P.S.P., calling it the “Terrorist Surveillance Program.” He claimed that it had been “thoroughly reviewed by the Justice Department and N.S.A.’s top legal officials,” and that N.S.A. analysts “receive extensive training to insure they perform their duties consistent with the letter and intent of the authorization.” Wyden didn’t know whether to be more shocked by the details of the N.S.A. program or by the way he learned about it. “I read about it in the New York Times,” he told me.

The Times had uncovered many details about the two programs that collected the content of e-mails and phone calls, and won a Pulitzer for its investigation, but the two metadata programs run by the N.S.A. were still largely unknown, even to most members of the Senate Intelligence Committee. Some details of the metadata programs soon appeared in the Times, in USA Today, and in a story by Seymour Hersh in this magazine. But the Bush Administration never officially confirmed the existence of the programs, which remained secret until this year.

II—OBAMA SIGNS ON

Even without a full picture of the programs, two senators who were not on the Intelligence Committee became intense critics of N.S.A. domestic surveillance: Barack Obama and Joe Biden. In May, 2006, after the USA Today article appeared, Biden said it was frightening to learn that the government was collecting telephone records. “I don’t have to listen to your phone calls to know what you’re doing,” he told CBS News. “If I know every single phone call you made, I’m able to determine every single person you talked to. I can get a pattern about your life that is very, very intrusive.”

Obama’s objections to domestic surveillance stretched back even further. In 2003, as a Senate candidate, he called the Patriot Act “shoddy and dangerous.” And at the 2004 Democratic Convention, in the speech that effectively launched his eventual campaign for President, he took aim at the “library records” provision of the law. “We worship an awesome God in the blue states, and we don’t like federal agents poking around our libraries in the red states,” he declared. In 2005, when he arrived in Washington, Obama became one of Wyden’s new allies in his attempts to reform the law. The Patriot Act was up for reauthorization, and, at Wyden’s urging, the Senate was trying to scale back the “library records” section. One of the first bills that Obama co-sponsored, the Security and Freedom Enhancement Act, would have required that the government present “specific and articulable facts” if it wanted a court order for records, a much higher standard than the existing one.

Obama and several other senators, including John Kerry, now the Secretary of State, and Chuck Hagel, the current Secretary of Defense, laid out their legal case against the provision in a letter to colleagues on December 14, 2005. The government could “obtain library, medical and gun records and other sensitive personal information under Section 215 of the Patriot Act on a mere showing that those records are relevant to an authorized intelligence investigation,” they wrote. It allowed “government fishing expeditions targeting innocent Americans. We believe the government should be required to convince a judge that the records they are seeking have some connection to a suspected terrorist or spy.” The following day, on the Senate floor, Obama said that the provision “seriously jeopardizes the rights of all Americans and the ideals America stands for.”

The Bush White House fought Obama’s changes, but offered a few minor concessions. Most notably, a business that received a demand for records could challenge in court a nondisclosure agreement that accompanied the demand. That was enough to placate some Democrats, including Obama. Wyden objected that the change did nothing to address Obama’s concerns, but the reauthorization of the Patriot Act passed the Senate on March 1, 2006. Wyden, eight other Democrats, and one Independent voted against it; Obama and Biden voted for it. Bush signed the law on March 9th.

Wyden later learned that, while he and Obama were fighting to curtail Section 215, the N.S.A.’s lawyers were secretly arguing before the FISA court that the provision should allow the N.S.A. to legally collect the phone records of all Americans. The lawyers, encouraged by their success in retroactively legalizing the Internet-metadata program, believed that they could persuade the FISA court to force phone companies to regularly hand over their entire databases. At the FISA court, there are no lawyers challenging the government’s arguments; all the N.S.A. needed to do was convince a single judge. Had Obama’s language been adopted, the N.S.A.’s case would have collapsed.

Just after noon on May 24, 2006, the FISA court issued a secret opinion ratifying the N.S.A.’s audacious proposal. It became known as the Business Records Order. That bland language concealed the fact that the court’s opinion dramatically reinterpreted the scope of the “library records” provision. The FISA court essentially gave the N.S.A. authority to place a pen register on everyone’s phone. Anytime an American citizen makes a call, it is logged into an N.S.A. database. The court required some new oversight by the Justice Department and new rules for accessing the database, but it was a nearly complete victory for the agency. The change was unknown to most members of Congress, including Obama and Wyden, who had just finished debating the Patriot Act. “What do I know?” Wyden would tell people who asked him about sensitive national-security issues. “I’m only on the Intelligence Committee.”

At the time, the public and Congress were understandably focussed on Bush’s warrantless wiretapping, and only a few officials understood the full details of the phone-metadata program. Wyden began asking questions. In June, 2006, after some stonewalling, the Bush Administration began providing summary briefings to the committee about the program. Wyden wasn’t allowed to bring any staff, and the N.S.A. didn’t respond to many of his follow-up questions. It wasn’t until the next January, after the Democrats took over Congress and were able to change the rules so that Wyden could bring Dickas to the briefings, that he fully understood what the agency was doing with the Business Records Order. He was stunned. “Look at the gap between what people think the law is and how it’s been secretly interpreted,” he said. “Holy Toledo!”

The National Counterterrorism Center is in an X-shaped building, known as Liberty Crossing, that is disguised as a suburban office park. It sits on a hill a few miles from C.I.A. headquarters, in northern Virginia. The center was created in 2003, at the recommendation of the 9/11 Commission, which concluded that the attacks might have been prevented if the F.B.I. and the C.I.A. had done a better job of sharing intelligence. At the base of the flagpole at the N.C.T.C.’s main entrance is a concrete jigsaw puzzle that represents the organization’s central mission: fitting together the seemingly random pieces of intelligence that flow into Liberty Crossing from the N.S.A., the C.I.A., the F.B.I., and other agencies.

The director of the N.C.T.C. since 2011 has been Matthew G. Olsen, a former federal prosecutor. He is a young-looking fifty-one, despite his hair, which has thinned and become grayer since he took his current job. Down the hall from his office is a door marked “Weapons, Tactics, and Targets Group,” which is part of the N.C.T.C.’s Directorate of Intelligence. The N.C.T.C. helps prepare the target lists, sometimes called kill lists, of terrorists who must be approved by Obama as legitimate threats in order to be the object of C.I.A. drone strikes. In a recent dissertation about the N.C.T.C., a former C.I.A. analyst, Bridget Rose Nolan, quoted a colleague who described the process as: “You track ’em, we whack ’em.” The day after I visited, in mid-November, a drone over Pakistan that sought to strike a terrorist compound fired three missiles that Pakistani officials claimed hit a madrassa and killed six people.

Olsen is one of the few high-level national-security officials to have dealt with the legal issues of the N.S.A.’s programs in both the Bush and the Obama Administrations, and he offers a fair reflection of how the current President and his top advisers approach them. In September, 2006, Olsen moved to the Justice Department’s new National Security Division, which was charged with overseeing the increasingly complex FISA cases concerning the N.S.A. He led a hundred lawyers in what was then called the Office of Intelligence Policy Review, which did all the preparatory work for the FISA court. Olsen started four months after the court secretly legalized the phone-metadata program. “I didn’t know any of it before I took the job,” he told me. “Only a handful of people in the entire government knew anything about it.”

Two weeks into the job, Olsen received his first assignment from lawyers at the N.S.A. The N.S.A. had been lobbying the FISA court to approve its four domestic-surveillance programs. The two metadata programs had been O.K.’ed; now Olsen and his colleagues had to persuade the FISA judge to make the phone and e-mail wiretapping programs legal. He did not see the job as especially controversial.

“It was a huge policy debate, one of the biggest ones post-9/11, and we’re still having it,” he said. “But at the time I felt like a lawyer who’d been handed a problem at a very tactical level: How do we figure this out? What are the legal rules we’re applying? What are the facts? How do we work with the N.S.A.?” He added, “I thought the goal was actually quite laudable. I was pleased to have the opportunity to work on an important thing, and I thought, Yes, if we could figure out a way to put this on a more firm legal footing, whether through judicial authority or legislative authority, that would be quite an important achievement, and it would be better for the country.”

The legal case for phone and Internet wiretapping was harder to make than the arguments concerning metadata. The Supreme Court had ruled in 1979 that metadata was not covered by the Fourth Amendment, but the content of phone calls and e-mails certainly was. Since 9/11, the N.S.A. had largely ignored the law requiring it to get a warrant for each domestic target whose content it collected. The FISA court was not impressed with Olsen’s attempt to justify legalizing the program. It issued new rules that vastly reduced the amount of collection from foreign phone and Internet sources. Olsen and his team tried different legal theories, but the court balked. Eventually, he and his colleagues decided that Bush would have to go to Congress instead and ask for legislation to amend the FISA law.

In 2008, Olsen helped lobby Congress to approve a new system that would curtail the fiSA court’s role and allow the N.S.A. to intercept enormous numbers of communications to and from the U.S. The FISA court had only to review and certify the over-all system that the N.S.A. would use; it no longer had to approve each target. Congress passed the FISA Amendments Act of 2008 on July 9th. All four Bush programs now had legal cover.

In the Senate Intelligence Committee, only Wyden and Feingold voted against the new FISA law. They were troubled by the central provision—Section 702—which created the new system governing N.S.A. surveillance of phone and Internet content. “I am one of the few members of this body who has been fully briefed on the warrantless-wiretapping program,” Feingold said at the time, in a speech on the Senate floor. “I can promise that if more information is declassified about the program in the future, as is likely to happen . . . members of this body will regret that we passed this legislation.” Wyden was reassured when Obama was elected President. Although Obama had voted for the new law, he promised at the time of the vote that, if he became President, his Attorney General would immediately “conduct a comprehensive review of all our surveillance programs.”

In February of 2009, days after Obama was sworn in, Olsen and Benjamin Powell, a Bush holdover and the general counsel for the Office of the Director of National Intelligence, went to the White House to brief the new President and Eric Holder, the new Attorney General, on the N.S.A.’s programs. There was no way to know how Obama would react. During the campaign, Holder, who was serving as a top legal adviser to Obama, had said that Bush’s original surveillance program operated in “direct defiance of federal law.” Obama had sponsored the legislation curbing the authority of the business-records provision, which was now crucial to the N.S.A. Greg Craig, Obama’s White House counsel, was also at the meeting. Because Obama had not been a member of the Intelligence Committee, much of the information was new to him. Powell, who led the briefing, and Olsen also had some news: the FISA court had just ruled that the phone-records program had so many compliance issues that the court was threatening to shut it down. The court was waiting for a response from the new Administration about how to proceed.

Olsen had recently discovered that for the previous two and a half years, the period when the phone-metadata program was supposed to have followed strict new procedures laid out by the FISA court, the N.S.A. had been operating it in violation of those procedures—and had misled the court about it. The N.S.A. was supposed to search its archive of metadata only after it had determined that there was a “reasonable, articulable suspicion”—RAS—to believe that the phone number or other search term was related to terrorism.

RAS was the thin wall between a legal program with some oversight and one with the potential for domestic spying and tremendous privacy violations. It was what prevented an analyst from querying the database for his girlfriend’s personal information or for a Tea Party activist’s network of contacts or for a journalist’s sources. Since 2006, in numerous filings before the FISA court, the N.S.A. had falsely sworn that every search term was RAS-approved. The agency had built a list of some eighteen thousand phone numbers and other search terms that it continuously checked against the metadata as it flowed into the N.S.A.’s servers. Of these, it turned out, fewer than two thousand had legal legitimacy. Thousands of the unauthorized search terms were associated with Americans. On January 15th, Olsen had informed the FISA court of the problem.

Reggie Walton, the FISA judge overseeing the program at that time, wrote, in an opinion on January 28th, that he was “exceptionally concerned” that the N.S.A. had been operating the program in “flagrant violation” of the court’s orders and “directly contrary” to the N.S.A.’s own “sworn attestations.” Walton was considering rescinding the N.S.A.’s authority to run the program, and was contemplating bringing contempt charges against officials who misled the court or perhaps referring the matter to “appropriate investigative offices.” He gave Olsen three weeks to explain why the court shouldn’t just shut down the program. The controversy was known at the court as the “ ‘big business’ records matter.”

At the White House, Olsen and Powell told Obama of the problems. “I want my lawyers to look into this,” Obama said. He pointed at Holder and Craig. Olsen believed that the N.S.A. simply had difficulty translating the court’s legal language into technical procedures; it could all be fixed. Wyden believed that the court never should have allowed the N.S.A. to collect the data in the first place. In his view, the court’s unusually harsh opinion gave Obama an opportunity to terminate the program.

“That was a very, very significant moment in the debate,” Wyden told me. “Everybody who had been raising questions had been told, ‘The FISA court’s on top of this! Everything that’s being done, the FISA court has given the O.K. to!’ And then we learned that the N.S.A. was routinely violating the court orders that authorized bulk collection. In early 2009, it was clear that the N.S.A.’s claims about bulk-collection programs and how carefully those programs were managed simply were not accurate.”

On February 17th, about two weeks after the White House briefing, Olsen, in a secret court filing, made the new Administration’s first official statement about Bush’s phone-metadata program: “The government respectfully submits that the Court should not rescind or modify the authority.” He cited a sworn statement from Keith Alexander, who had replaced Hayden as the director of the N.S.A. in 2005, and who insisted that the program was essential. “Using contact chaining,” Olsen wrote, “N.S.A. may be able to discover previously unknown telephone identifiers used by a known terrorist operative . . . to identify hubs or common contacts between targets of interest who were previously thought to be unconnected, and potentially to discover individuals willing to become US Government assets.”

Judge Walton replied that he was still troubled by the N.S.A.’s “material misrepresentations” to the court, and that Alexander’s explanation for how they happened “strains credulity.” He noted that the FISA court’s orders “have been so frequently and systemically violated that it can fairly be said that” the N.S.A. program “has never functioned effectively” and that “thousands of violations” occurred. The judge placed new restrictions on the program and ordered the agency to conduct a full audit, but he agreed to keep it running. Olsen, and Obama, had saved Bush’s surveillance program.

It was the first in a series of decisions by Obama to institutionalize some of the most controversial national-security policies of the Bush Administration. Faced with a long list of policies to roll back—torture, the wars in Afghanistan and Iraq, the use of the prison at Guantánamo Bay to hold suspected terrorists—reining in the N.S.A.’s surveillance programs might have seemed like a low priority. As core members of Al Qaeda were killed, the danger shifted to terrorists who were less organized and more difficult to detect, making the use of the N.S.A.’s powerful surveillance tools even more seductive. “That’s why the N.S.A. tools remain crucial,” Olsen told me. “Because the threat is evolving and becoming more diverse.”

Feinstein said, “It is very difficult to permeate the vast number of terrorist groups that now loosely associate themselves with Al Qaeda or Al Nusra or any other group. It is very difficult, because of language and culture and dialect, to really use human intelligence. This really leaves us with electronic intelligence.”

The N.S.A.’s assurances that the programs were necessary seemed to have been taken at face value. The new President viewed the compliance problems as a narrow issue of law; it was the sole responsibility of the FISA court, not the White House, to oversee the programs. “Far too often, the position that policy makers have taken has been that if the intelligence agencies want to do it then the only big question is ‘Is it legal?’ ” Wyden said. “And if government lawyers or the fisa court secretly decides that the answer is yes, then the intelligence agencies are allowed to go ahead and do it. And there never seems to be a policy debate about whether the intelligence agencies should be allowed to do literally anything they can get the fisa court to secretly agree to.”

Any doubts about the new Administration’s position were removed when Obama turned down a second chance to stop the N.S.A. from collecting domestic phone records. The business-records provision of the Patriot Act was up for renewal, and Congress wanted to know the Administration’s position.

It was one thing to have the Justice Department defend the program in court. But now Obama had to decide whether he would publicly embrace a section of the Patriot Act that he had criticized in his most famous speech and that he had tried to rewrite as a senator. He would have to do so knowing that the main government program authorized by the business-records provision was beset by problems. On September 14th, Obama publicly revealed that he wanted the provision renewed without any changes. “At the time of the U.S.A. Patriot Act, there was concern that the F.B.I. would exploit the broad scope of the business-records authority to collect sensitive personal information on constitutionally protected activities, such as the use of public libraries,” a Justice Department official wrote in a letter to Congress, alluding to one of Obama’s former concerns. “This simply has not occurred.” The letter, which was unclassified, did not explain the details of the metadata program or the spiralling compliance issues uncovered by the court.

Wyden’s early hope, that Obama represented a new approach to surveillance law, had been misguided. “I realized I had a lot more to do to show the White House that this constant deferring to the leadership of the intelligence agencies on fundamental policy issues was not going to get the job done,” he said.

III—A QUESTION OF PRIVACY

In December, 2009, Wyden met with Vice-President Biden and explained his case against the bulk collection of phone records and the Administration’s Bush-like secrecy about the programs. By now Wyden had become known for his independent streak, which some colleagues saw as grandstanding. On the Intelligence Committee, staffers complained that his readiness to question his colleagues’ commitment to the Constitution was so self-righteous that it sometimes backfired when he was trying to garner support.

“I was trying to convey the urgency of the situation,” Wyden said of his meeting with Biden. “There was an opportunity here to strike a balance that did more to protect liberty and security.” As the deadline to renew the business-records provision approached, the Administration finally agreed to provide the entire Congress with details about the metadata programs. On December 14th, the Justice Department sent a five-page classified document explaining them. Most members of the House and the Senate were learning about them for the first time. The document was kept in secure rooms for a limited period of time; no copies were allowed and no notes could be removed. If members of Congress had any questions, executive-branch officials were available at designated times to chat.

In general, the document described the programs accurately. But, in a section on “compliance issues,” the Administration withheld significant details. Months earlier, the phone-metadata program had come close to being stopped. Obama officials reported this episode to Congress in far less dire terms. “There have been a number of technical compliance problems and human implementation errors in these two bulk collection programs”—phone and Internet metadata—“discovered as a result of Department of Justice reviews and internal N.S.A. oversight,” the document said. There were no “intentional or bad-faith violations,” just glitches in “implementation of highly sophisticated technology in a complex and ever-changing communications environment,” which occasionally “resulted in the automated tools operating in a manner that was not completely consistent” with the FISA court’s orders. The Administration assured Congress that everything had been fixed. The N.S.A. had even created a new position, director of compliance, to keep an eye on things.

The debate ended on Christmas Day, 2009, when Umar Farouk Abdulmutallab, a twenty-three-year-old Nigerian man, on a flight from Amsterdam to Detroit, tried to detonate a bomb hidden in his underwear as the plane landed. Although he burned the wall of the airplane’s cabin—and his genitals—he failed to set off the device, a nonmetallic bomb made by Yemeni terrorists. Many intelligence officials said that the underwear bomber was a turning point for Obama.

“The White House people felt it in their gut with a visceralness that they did not before,” Michael Leiter, who was then the director of the National Counterterrorism Center, said. The center was sharply criticized for not detecting the attack. “It’s not that they thought terrorism was over and it was done with,” Leiter said, “but until you experience your first concrete attack on the homeland, not to mention one that becomes a huge political firestorm—that changes your outlook really quickly.” He added, “It encouraged them to be more aggressive with strikes”—drone attacks in Yemen and Pakistan—“and even stronger supporters of maintaining things like the Patriot Act.”

Obama also became more determined to keep the programs secret. On January 5, 2010, Holder informed Wyden that the Administration wouldn’t reveal to the public details about the N.S.A.’s programs. He wrote, “The Intelligence Community has determined that information that would confirm or suggest that the United States engages in bulk records collection under Section 215, including that the Foreign Intelligence Surveillance Court (FISC) permits the collection of ‘large amounts of information’ that includes ‘significant amounts of information about U.S. Persons,’ must remain classified.” Wyden, in his reply to Holder a few weeks later, expressed his disappointment with the letter: “It did not mention the need to weigh national security interests against the public’s right to know, or acknowledge the privacy impact of relying on legal authorities that are being interpreted much more broadly than most Americans realize.” He said that “senior policymakers are generally deferring to intelligence officials on the handling of this issue.”

Rather than rely on private channels to persuade the White House to change course, he decided he would have to be more publicly aggressive from his perch on the Intelligence Committee. On February 24, 2010, the Senate, without debate, passed a one-year extension of the expiring Patriot Act provisions. The following day, the House passed the measure, 315–97. Obama signed it into law two days later. James Sensenbrenner, the author of the original Patriot Act, wrote recently in the Los Angeles Times that he and a majority of his colleagues in Congress did not know how the law was being used before they voted to endorse it.

Both politically and personally, the year 2010 was a turning point for Wyden. He won reëlection that November, receiving fifty-seven per cent of the vote, with the slogan “Ron Wyden: Different. Like Oregon.” In December, he was treated successfully for prostate cancer. But Russ Feingold, his friend and mentor on surveillance issues, was defeated by a Tea Party opponent. “It was a huge loss,” Wyden told me. “Senator Feingold and I talked at that time about how the mantle of liberty and privacy issues was going to be carried on without him.”

High-profile Tea Party libertarians such as Rand Paul, from Kentucky, and Mike Lee, from Utah, joined the Senate, and they prompted discussions about national-security law within the Republican Party. “We’re still a minority in the Republican caucus, but people are beginning to think about some of these things,” Senator Paul told me recently. In the House, there were dozens of small-government conservatives who opposed just about everything George W. Bush had been for, on both foreign and domestic policy.

In addition, in 2011 Mark Udall, a Democratic senator from Colorado, joined the Intelligence Committee. For years, Udall had served in the House and had a record as a skeptic about many post-9/11 security policies. “I voted against the original Patriot Act,” Udall told me. “I have a strong civil-libertarian streak and background. I’m well aware of some of the mistakes that we’ve made historically, whether it’s the Alien and Sedition Acts or the internment of Japanese-Americans or the warrantless wiretapping that went on under the previous Administration. As I watched that unfold in the last decade, I was more and more aware of Franklin’s great admonition that a society that will trade essential liberty for short-term security deserves neither.” Paul and Wyden joked that they might finally have enough senators to start what they called the Ben Franklin caucus.

In early 2011, as Udall prepared for the new debate over the Patriot Act, he was shocked by what he learned. “It raised a series of red flags for me,” Udall said. “It made me realize that, much as I was enthralled by and impressed by what we do, I had also an equally important role to play, which was to ask questions, to provide oversight, and to remember the lessons of the past—which are that the intelligence community, without oversight, without limits, will do everything it possibly can to get everything it possibly can get its hands on. And we’ve come to regret that, historically.”

On May 26, 2011, Wyden delivered what he considered to be one of the most important speeches of his career. He is a strident and tenacious debater, a policy nerd who can overwhelm his opponents with details. “I’ve served on the Intelligence Committee for over a decade,” he said, standing in the well of the Senate during another debate over the Patriot Act. “And I want to deliver a warning this afternoon: when the American people find out how their government has secretly interpreted the Patriot Act, they are going to be stunned and they are going to be angry. And they’re going to ask senators, ‘Did you know what this law actually permits?’ ‘Why didn’t you know before you voted on it?’ ” He reviewed the history of secret intelligence operations that inevitably became public: the C.I.A.’s illegal surveillance in the sixties, the Church committee’s investigation of the N.S.A.’s Project SHAMROCK, Iran-Contra, and Bush’s warrantless-wiretapping program. As Wyden recalled the history of each scandal, Dickas placed blown-up versions of news headlines on an easel: “Huge C.I.A. Operation Reported in U.S. Against Antiwar Forces, Other Dissidents in Nixon Years,” “Senators Reveal U.S. Spies Read Millions of Telegrams,” “Bush Lets U.S. Spy on Callers Without Courts.”

After each episode that Wyden described, he asked, “Did the program stay a secret?,” and responded, “No.” The truth always comes out, he added, and, when it does, “the result is invariably a backlash and an erosion of public confidence in these government agencies.”

The 2011 Patriot Act extension passed the Senate later that day, and this time the controversial provisions were extended until 2015. But twenty-three senators—including Paul and Lee—and a hundred and fifty-three members of the House voted against the law. Wyden and Paul’s Ben Franklin caucus was growing.

Even as the Obama Administration publicly defended the Patriot Act and the shaky FISA opinions that propped up the secret surveillance regime, behind the scenes the N.S.A. was being challenged by the FISA court for violating its rules. Defending the programs on behalf of the Obama Administration again fell to Matthew Olsen, who now had a new job, as the N.S.A.’s general counsel.

In the spring of 2011, Olsen learned that the agency’s program for collecting the content of e-mails and phone calls—the one that he had worked on in 2006 and which was now known as Section 702—had a major problem. The N.S.A. had assured the FISA court that it did not intentionally capture domestic communications, and that, if it unintentionally did so, it had court-sanctioned procedures for disposing of them. That wasn’t true. The agency was actually collecting the domestic communications of tens of thousands of Americans: in some cases, the N.S.A. told the court, its filtering devices couldn’t weed out the material it was allowed to collect from the stuff it wasn’t. The agency called the problem “unintentional” and a “failure” of the N.S.A.’s “technical means.” The FISA court called it unconstitutional. Judge John D. Bates declared that the practice violated not only the specific federal law governing surveillance but the Fourth Amendment, which protects Americans against unreasonable search and seizure.

The FISA court also repeatedly rebuked the N.S.A. for its collection of Internet metadata. In one opinion, the court said that for years the “N.S.A. exceeded the scope of authorized acquisition continuously.” It also declared that the N.S.A.’s description of the program had been “untrue,” and that the government had engaged in “unauthorized” and “systemic overcollection,” had searched the system using terms that were “non-compliant with the required RAS approval process,” and had improperly disseminated intelligence about Americans derived from the database. In fact, the court said, almost every record “generated by this program included some data that had not been authorized for collection.” The court also noted that the N.S.A. program had conducted “unauthorized ‘electronic surveillance’ ” and had asked a FISA judge to “authorize the government to engage in conduct that Congress has unambiguously prohibited.”

Wyden, who had read the court opinions and knew the troubled history of the Internet-data program, pressed his advantage. Throughout the year, in correspondence that remains secret, he repeatedly challenged the N.S.A.’s contention that the program was effective. In late 2011, with little explanation, and despite the fact that, just months earlier, the N.S.A. had sworn in court and to Congress that the program was essential, the N.S.A. sent Wyden and other members of the Senate Intelligence Committee a notification that it was indefinitely suspending the program.

On the face of it, the Congress of 2011-12 had been a success for Wyden. He had new allies on the left and the right. He had shut down a program that was collecting huge amounts of Internet data about Americans. During Olsen’s confirmation hearing as the director of the N.C.T.C., Wyden forced Olsen to admit publicly that the FISA court made interpretations of law in secret. In July, 2012, Wyden successfully lobbied for the director of National Intelligence to publicly acknowledge that, “on at least one occasion . . . some collection carried out pursuant to the Section 702” law was “unreasonable under the Fourth Amendment.”

Yet three of the four original Bush programs—the phone-metadata program and the content-collection programs—were still running, and, through Olsen’s years of work, the N.S.A. seemed finally to be governing them all within the confines of the court’s rules. The Patriot Act had been renewed, and, in 2012, the FISA amendments, which codified the content-collection program in law, were also reauthorized. In March, 2013, Wyden had his dramatic encounter with Clapper, but, at the time, the public didn’t know that Clapper hadn’t told the truth. Despite Wyden’s victories, any momentum for intelligence reform seemed dead.

But there was one person who was troubled by Clapper’s testimony. “Seeing someone in the position of James Clapper baldly lying to the public without repercussion is the evidence of a subverted democracy,” Edward Snowden said later, in a Q. & A. on the Guardian Web site. At some point during this period, Snowden also came upon the N.S.A. inspector general’s secret report about the history of the President’s Surveillance Program and STELLARWIND. It was rich with details: the secret computer servers that were delivered under police escort, Hayden’s dealings with Cheney’s staff, the facts about the Justice Department’s rebellion, the decision to take the legally dubious programs and fit them under the umbrella of the Patriot Act. Snowden later told the Times that, after he read the report, he decided that he would release it—and thousands of other documents—to the press. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he told the paper, “secret powers become tremendously dangerous.”

On October 26th, a warm and clear Saturday in Washington, a few hundred protesters gathered in front of Union Station for what organizers called the Stop Watching Us Rally Against Mass Surveillance. A man wearing a giant papier-mâché Obama mask roamed the plaza in a trenchcoat and sunglasses holding an oversized “Obama-Cam.” There were signs about “NSA Doublespeak” and demands that the government “stop sniffing my packets,” a tech reference to intercepting data as it moves across the Internet. Two protesters held up a large flag depicting the artist Shepard Fairey’s famous Obama drawing with the words “Yes We Scan,” a play on the President’s campaign slogan. Wyden couldn’t attend, but he posted a short video message on YouTube, saying, “This is a once-in-a-lifetime opportunity to stand up and protect the privacy of millions of law-abiding Americans. Please know that it’s the voices of people like you that are going to make a difference in the fight for real, meaningful surveillance reform.”

It was Wyden’s kind of crowd: geeky, libertarian, passionate, and baffled that the rest of the public wasn’t as outraged as they were. He insisted to me afterward that a movement for reform was building. Snowden’s disclosures had vindicated him, he said, and he predicted that they would change the way the N.S.A. operated: “I hope that they see now that the truth always comes out in America, that the deceptions and misleading statements that they engaged in for years are just not going to pass as gospel in the future.”

Such a movement is less evident in Congress. A couple of days after the rally, on October 29th, the Senate Intelligence Committee retreated to its secret chambers, on the second floor of the Hart Office Building. The room has vaulted doors and steel walls that keep it safe from electronic monitoring; the electricity supply to the room is reportedly filtered, for the same reason. The committee’s fifteen members, eight Democrats and seven Republicans, debated Feinstein’s intelligence-reform bill, the fiSA Improvements Act, for three hours. As Congress and the public have digested the details of Snowden’s disclosures, the legislative debate has narrowed to three big questions: Should Congress reform the e-mail and phone tapping allowed by Section 702 to insure that the communications of innocent Americans are not getting swept up in the N.S.A.’s targeting of terrorists? Should the N.S.A. end the bulk collection of phone metadata now authorized by Section 215? Should the FISA court be reformed to make it less deferential to the government?

The committee’s answer to all three questions was no. By a vote of 11–4, it endorsed the Feinstein bill. Wyden, Udall, and Martin Heinrich, a Democrat from New Mexico elected last year and the newest member of Wyden’s Franklin caucus, voted against the bill. (Tom Coburn, a Republican from Oklahoma, also voted no, because he thought the bill was too restrictive.) “There’s three of us out of eight on our side,” Wyden told me later. “That’s a lot better than meeting in a phone booth.” But the majority of the committee declared, in a report, that the compliance issues at the N.S.A. were “uniformly unintentional, self-identified, and reported to the Court and to Congress.” The majority added, “Up until these programs were leaked, their implementation by N.S.A. was an example of how our democratic system of checks and balances is intended to, and does, work.”

The following day, Wyden said of the Feinstein bill, “They’re wrapping the status quo in this really sparkly gift-wrapping paper and everybody’s going, ‘Oh, this is beautiful.’ They’re going to look inside and see the changes are skin-deep, there’s not really much there.” He added, “People get on this committee and the first thing the intelligence community tries to do is get them to be ambassadors for the intelligence community rather than people doing vigorous oversight. The intelligence community basically takes everybody aside and says, ‘Here’s the way it works. . . .’ There’s no discussion about privacy issues or questions about civil liberties—those usually get thrown in afterward.”

Feinstein took strong exception to Wyden’s characterization: “I’ve been on the committee for twelve years now, and, when I went on, I knew I had a lot to learn. I asked a lot of questions, I read a lot of material, I went out to the N.S.A. You learn what questions to ask, you write letters asking questions, you raise the questions in a meeting. I don’t think there’s anything that Senator Wyden has asked me to do that I haven’t done. If he’s got a better way, he’s got substantial seniority on the committee, he ought to suggest it.”

Feinstein argued that opponents of the surveillance programs have forgotten the lessons of 9/11. “Nothing is dimmed in my mind,” she said of a recent trip to Ground Zero. “I saw the part of the steel structure that the planes went through. I saw the white roses on the names etched in bronze in the fountain.” She added, “They will come after us again, if they can.”

An updated version of Wyden’s bill is now making its way through the Judiciary Committee, where it has been introduced by the chairman, Patrick Leahy. The bill would end the bulk collection of phone records, tighten the rules for Section 702, and create a Constitutional Advocate at the FISA court to provide a view in opposition to the government’s. At the moment, neither Feinstein’s nor Wyden’s legislation has the support of sixty senators, the number it needs to get to the floor for a vote. Obama could make the difference. “The President will sign our bill,” Feinstein told me. She said that her staff worked closely with the White House in drafting it.

In August, at the height of the frenzy over Snowden’s disclosures, Obama delivered remarks at the White House suggesting that he was wrestling with whether, as President, he had struck the proper balance on surveillance policy: “Keep in mind that, as a senator, I expressed a healthy skepticism about these programs. And, as President, I’ve taken steps to make sure they have strong oversight by all three branches of government and clear safeguards to prevent abuse and protect the rights of the American people. But, given the history of abuse by governments, it’s right to ask questions about surveillance—particularly as technology is reshaping every aspect of our lives.”

In practice, Obama has not wavered from the position taken by the N.S.A.’s lawyers and embraced by Feinstein and the majority of the Intelligence Committee. “The system generally has worked,” Matthew Olsen told me. “One way to think about the current debate is the degree to which, as a lawyer or as a citizen, you have confidence in our government institutions to operate effectively and trust our system of court oversight, congressional oversight, and executive-branch responsibilities.”

The history of the intelligence community, though, reveals a willingness to violate the spirit and the letter of the law, even with oversight. What’s more, the benefits of the domestic-surveillance programs remain unclear. Wyden contends that the N.S.A. could find other ways to get the information it says it needs. Even Olsen, when pressed, suggested that the N.S.A. could make do without the bulk-collection program. “In some cases, it’s a bit of an insurance policy,” he told me. “It’s a way to do what we otherwise could do, but do it a little bit more quickly.”

In recent years, Americans have become accustomed to the idea of advertisers gathering wide swaths of information about their private transactions. The N.S.A.’s collecting of data looks a lot like what Facebook does, but it is fundamentally different. It inverts the crucial legal principle of probable cause: the government may not seize or inspect private property or information without evidence of a crime. The N.S.A. contends that it needs haystacks in order to find the terrorist needle. Its definition of a haystack is expanding; there are indications that, under the auspices of the “business records” provision of the Patriot Act, the intelligence community is now trying to assemble databases of financial transactions and cell-phone location information. Feinstein maintains that data collection is not surveillance. But it is no longer clear if there is a distinction.

“My phone numbers, I assume, are collected like everybody else’s,” Feinstein said. “But so what? It does not bother me. By the Supreme Court decision in 1979, the data is not personal data. There’s a Google Map that allows somebody to burgle my house, it’s so clear and defined, and I can’t do anything about it.”

Wyden said that the continued leaks from Snowden help build momentum for changing the law. “We pick up more support as more and more of this comes out,” he told me. “After a decade, we think this is the best opportunity for reform that we’re going to have, certainly in my lifetime, and we’re not going to let it go by.”

MK ULTRA PROJECTS /// PORTRAIT OF A MIND CONTROL VICTIM : JIMMY SHAO — ZİHİN KONTROLÜ KURBANI JIMMY SHAO —

MY STORIES

It was about sometime in September 2007, I, as a concerned U.S. citizen, notified FBI of a suspected high level Chinese espionage travelling between United States and China whose background was a director of Ministry of Public Security of People’s Republic of China and happened to be my college alumni. I was later contacted by FBI agents and had several meetings with them inside and outside FBI Sacramento office. I agreed to cooperate with them when they asked me for help, and raised my concerns of some individuals when they asked for my comments on local communities. I declined when asked by FBI agents to join FBI during my meeting with them.

Not so long after meetings with FBI agents, I noticed the followings:

1. I was followed everywhere, even when I was travelling to Hawaii and Florida for business meetings.

2. My cars and house were wired. My home phones were tapped and cell phone was even monitored through satellite, which I noticed when driving on the freeway.

3. My business office was under surveillance and monitored by strange people outside my office.

4. A strange car waiting outside my house in the dark and strange people moved into my neighborhood; my house was surrounded by strange people equipped with vehicles used by our law enforcement.

5. My blackberry cellphone was burned through satellite after I complained numerous times to FBI agent that it would constantly flash. It was so bright at night which irritated me when I was in bed. I had to buy a new phone. However no one working for AT&T could help transfer my saved data from the old phone to the new one. I therefore had to manage and manually input my contact information to my new phone.

6. An attorney, who urged me to go to his office to discuss my case when we met and heard my briefing, cancelled my scheduled appointment and declined to take my case upon my arrival at his office.

When I asked Mr. Joe Parker, my FBI contact, above issues, he claimed those who moved into my neighborhood were the people working for a security firm, but declined to comment on the rest of the above. I decided not to get involved in any further, wondering how I could cooperate with FBI if they didn’t trust me! I was so naïve and did not even know that I had already been involved in much deep trouble since all those individuals who I mentioned during my meeting with FBI agents actually work for federal intelligence agencies, and never thought that my call to FBI would completely change my life in this country. What I discovered, I was shocked to have later realized and proved, is a government network of intelligence personnel, informants and covert FBI agents in Sacramento areas and much more……

I was very upset and frustrated to have found out the followings ever since I contacted FBI;

1. My radio sound system inside my house was burned for no reason.

2. My business websites were either blocked or malfunctioned.

3. My business clients quit and disappeared from their business to avoid seeing me.

4. My desktop computer speed suddenly became so slow that I could not manage my normal business function, and eventually stopped working for not having enough memory space to hold a large quantity of unknown data files from “elsewhere”.

5. My SONY laptop computer suddenly became not only so slow but heated and soon burned the built-in battery. It even started generating a loud and weird noise as soon as I signed up and connected to the internet. I was very frustrated and I smashed it.

6. I purchased a new laptop with a hope that it would stop all the problems mentioned above. I was again disappointed and felt helpless to fix the same problems. I was furious and smashed it again.

7. I received a zero response from the marketing firm that I hired and paid thousand dollars to market my service. It should bring me a market response ranged minimum 1% – 3% of what they sent, according to the marketing salesman who handled my account.

8. I lost a business opportunity to take over big accounts arranged through my previous investment advisory firm – Money Concepts that I had a contract with them.

9. I experienced all kind of tricks and traps which I believe are the FBI agents’ normal practice.

I started worrying about my business and family. I spent all my savings and even closed my 401k retirement account and surrendered my life insurance policy for the cash in order to face this sudden and unexpected financial crisis. Tension began in my family when my ex-wife started pushing me to find a job, although she knew that I had been very happy and proud of my growing business. I tried my best to explain that it was too late for me to find any due to my shocking discoveries of our government secrets. Sadly she didn’t believe it. To avoid anyone, especially the Chinese government using my case to attack U.S. government on human rights issues, I decided to keep silent with a hope that our federal government would eventually solve my case and get me out of such terrible situation.

My situation got even worse when I decided to visit my family and 93 years old mother in Shanghai who I had not seen for seven years, and planned to look for jobs there to support my family since no one from FBI had ever contacted me to discuss my case or explain what was happening. I suddenly felt strange movement within my body, and felt my brain, my chest, my neck, my heart and my nerve system being scanned by the satellite when I woke up at midnight in early October 2009. I suspected our government secretly using satellite technology to test on my body, and soon proved of my suspicion that my body and brain were totally controlled by the satellite on the evening of October 18, 2009. I was so irritated and furious to have suddenly heard a continuing noise inside my brain after I woke up next morning. My ex-wife didn’t believe what I said. I wondered if this was the only way that our government could control and protect me and their secrecy when I traveling in China. If so, why they did not notify me of what was happening or what I had to do? I started questioning myself the legality of our government actions on its citizen.

Since then, I have constantly been hearing low or loud and intensified different noises from my left and right side brain almost on the daily basis. I suddenly experienced the worst brain pain that I had never had in my life and constantly received electroshocks by the satellite anywhere I went to or even stayed inside my house during the day. I felt my brain constantly being whipped, pressed and squeezed by satellite with severe pain. To avoid being hit by the satellite while observed possibly by any hidden camera or device inside my house, I covered all the electrical outlets in my bedroom, stayed and even ate inside that “sanctuary” whenever possible. Tension increased between me and my ex-wife when she suggested me to see medical doctor. I again tried my best to explain what I believed and the cause of my brain pain and noises. I of course did not tell her all and exactly what I discovered for the sake of our national security. However she didn’t believe and insisted that I was mentally sick and asked me to watch the movie “A Beautiful Mind” and ridiculously concluded of my mental status being similar to John Nash, Jr. played by Russell Crowe in that movie. Afraid of being sent to the mental hospital and signed by my ex-wife for mental treatment prior to my departure to China, I sadly decided to file a divorce to end up our relationship and quickly left for China. She keeps my daughter in her custody since I didn’t and still don’t have enough income to support my daughter and my family.

I abandoned my plan to stay in China and decided to return “home” after knowing my divorce case was still pending subject to court approval, but still very hesitated to be whipped again by the satellite which I called a meat-grinding machine. To avoid losing my temper when being hit by the satellite in front of my 9 years old daughter and her mother again, I decided to stay outside and slept inside my vehicle on the street at night until the satellite stop whipping me. I was not lucky to escape from what I had expected at about 2:00 am the first night, but felt very fortunate to spend only $1 for a hot shower at YMCA facility in downtown Sacramento next day. Although it was not comfortable to stretch my legs inside my vehicle, but I did have two very peaceful nights to sleep prior to returning to home, and hoped for the same so that I could try to repair my relationship with my ex-wife. I knew she had enough to bear in her mind just like I do now and then.

I had to agree to look for jobs, although I suspected the possibility for me to find any, and agreed to see a medical professional in order to please my ex-wife. I again was very frustrated when facing my computer with same unbelievable slow speed and all kind of the internet problems while typing my job applications on line. However the worst is the same painful mental torture experience that I had to suffer every day. I was not happy to hear from my ex-wife’s reckless claim that I might have paranoia schizophrenia at home or even at doctor’s office but was pleased that the doctor – a female psychiatrist at Kaiser Hospital rejected my ex-wife conclusion in less than ten minutes after her diagnose. I was very disappointed when hearing my ex-wife tried again to suggest the psychiatrist at her office that I probably had a mental delusional disorder. It was again rejected by the same doctor. My ex-wife was very depressed to hear my refusal to take any medication. Why should I take any if knowing that any medication for any brain treatment could have side effect(s) to cause my brain damage, according to the psychiatrist, plus there is no such medicine on the earth to treat what I have to suffer caused by the satellite if our government does not suspend its satellite surveillance on me. She screamed and kept asking me why I returned home to disturb their life.

I regretted to have heard such statements from my ex-wife but thought it was my “fault” to have caused such disaster in my family. I felt even embarrassed when asked by my close friends to take medication for the sake of my marriage after they heard my situation from my crying ex-wife. I was furious and hopeless when my brain felt being whipped, drilled, squeezed and pressed by the satellite, and had to listen to the constant noises from left side of my brain, and in some occasion I was so furious to hear simultaneously a very loud dissonant noise from my right side of my brain echoed with constant left side noise in my brain. Sadly my ex-wife still didn’t believe that I was under satellite control no matter how I tried to explain, even after I recommended her to read the information I later found on www.surveillanceissues.com website, which describes exact the same but in much more detail about government satellite surveillance program, satellite mind control techniques and technologies being secretly used by CIA, NSA and other federal agencies on their targeted individuals. What’s clearly in my mind as I repeatedly told my ex-wife was to wait for our government decision to end satellite surveillance on me and provide explanations and the options for me to live for the rest of my life.

There seemed no sign to stop receiving the mental torture from satellite and all kinds of troubles with my computer and internet service that I had to face and tolerate every day. To prevent from being further watched and heard by my ex-wife, especially my little daughter any of my frustration and anger inside my house or vehicle when again whipped by the satellite, I painfully decided to end up our marriage and helped her to submit any missing paper requested by the court in order to close our pending divorce case, and moved out my house immediately after I found a place to share in downtown Sacramento on July 24, 2010. I finally decided to give up my efforts to look for jobs after facing the same internet problems; and watched the computer technicians of Geek Squad at Best Buy being confused and failed to install a very simple HP printer driver on my new laptop for seven hours. I had to cancel my AT&T wireless internet service for the same reason mentioned above and returned a newly purchased laptop to local AT&T store thereafter.

There is no doubt in my mind that those who involved in my case would intentionally harm and torture me, however the degree of my brain noise, brain pressure and brain pain that I felt, has reached to the point that I would not and will not tolerate it anymore! I feel so sorry to have wakened up my new neighbors numerous times when my brain was lashed and squeezed, pressed with so much pain and pressure by our satellite at the midnight or early in the morning. I had to apologize to my roommate for any inconvenience that I caused him and asked him to pass on my apologies to the surrounding neighbors. I still remember numerous painful movements when my brain was pressed by the satellite and felt so dizzy and painful that I could even hardly keep my eyes open while driving on the freeway or local streets, and had to stop my car on freeway shoulder or side of road to rest.

If it was not for my 911 call and the ambulance rushed me to the UC Davis Hospital on the night of December 30th, 2010, I probably would never even know that my blood pressure level suddenly went up to 240/120 and felt so horrible and difficult to breathe. It was my worst fear in my life to jump out of my room and open the door to breathe. The same incident happened several times and frightened me to wake up at mid-night after I moved into my new residence. Furthermore, my brain was constantly blasted with strong impulse by the satellite in addition to the routine annoying “brain massage” on both sides of my temple provided by those who involved in satellite operation. They usually began 30 minutes after I went to bed at about 10:30pm every night. Here is what I noted for my records on the night of October 18, 2011, my brain was blasted numerous times by the satellite, which occurred and repeated every 5 – 10 minutes until 2:00am next morning. At 2:06am, my brain was again blasted, and again felt being blasted at 2:19am, at 2:24am, again at 2:33am, at 2:35am, again at 2:36am, at 2:40am, at 2:41am – again was blasted 3 times, at 2:48am – 3 times again, at 2:55am – 5 times, at 3:01am – 3 times again. I kept counting and writing in bed in the dark, finally they stopped. I was furious and exhausted but felt helpless to stop what I called psyche and mental torture by the satellite. My landlord gave me a 30 day notice to move out of his residence for disturbing the neighbors at night, and my new neighbor cross the street called police and filed complaints against me for disturbing the neighborhood. Police officers were called to question me, but they left so friendly and felt helpless after hearing my brief explanation.

I decide not to move to anyplace, wondering where else I could escape the torture from our satellite if our government keeps using satellite to control me. I called 911 numerous times for public help when my brain felt being constantly lashed and squeezed and blasted at night. I delivered my letter to former Congressman Daniel Lungren’s office for his investigation and followed by more letters and emails to complain about my situation. During five months of my waiting, I received all the written responses from FBI, NSA, DHS, except a CIA’s verbal response which was the last one that I received through Congressman Lungren’s office. All of them denied their involvement in satellite operation in my case. I was very disappointed to be notified by his office that they had closed their congressional inquiries on my behalf and my case was therefore closed. It makes me wonder if those involved in my case must really be someone above the law. Regretfully, no one from our federal government comes out to explain what’s happened to me as of today. However, strangely enough there are still two federal surveillance software installed and clearly appeared on my laptop screen!

It is sad that any time when the torture experience keeps recurring to me, I feel so relieved for having made such “wise” decisions to quickly file a divorce and move out of my house so that my daughter and her mother could move on to live their lives peacefully. They would never have to watch and hear my painful reaction and frustration anymore; and my daughter would never have to hide in her room, guessing what’s going on with her father; and my ex-wife wouldn’t tell her parents in China what she saw or heard my natural reactions for the painful torture by our satellite and ask for their advice on how to handle the situation over the phone almost on her weekly basis in the past; and I would never be ashamed myself as a financial burden on my ex-wife and her family as she claimed. I make sure not to lose my temper no matter how much brain pain and pressure pressed by the satellite that I have to endure if my daughter was or is next to me. To save your precious time, here I just list a few being most frequently haunted in my thoughts and probably the most embarrassing situation that I tried and still try to avoid.

What’s more significant is my proof of what I suspected those constant “technical problems” with my computers, cellphone, printer and on-line internet service as a result of our government to purposely prevent me from applying and responding to any employment inquiries from government agencies or private companies after having heard my ex-wife’s almost piteous entreaties. My situation could be much worse if not for my decision to quickly move out my house, I would probably continue my endless sometimes even heated argument with my ex-wife about not only the listed above but have to defend and prove myself being just a normal and sanity instead of being accused as a mentally sick man, and had constantly to debate on the ridiculous necessities to seek any medication and employment for the sake of my marriage in front of her or anyone who she desperately tried to reach for help. It would be a total disaster in short that any ordinary citizens and their families could imagine and silently endure and tolerate for months after months and years after years! Yet I still kept silent with my hope and faith in our legal system in this country, waiting for my respected federal government to eventually get me out of the shadow and provide me with a solution to live like a human.

It constantly reminds me of all the causes and consequence of this tragedy when feeling irritated and humiliated to experience from those involved their daily routine practices to perform sexual stimulation on my body; feeling my brain being manipulated and controlled by satellite while my viscera and abdomen constantly being poked, stirred, pressed and scanned, which often causing my stomach upset and belch; feeling part of my body including my eyes being constantly poked, disturbed, sometime “gently” tapped on my legs and both sides of my temples being massaged while I was in bed at night or during the day; and facing numerous collect calls and letters for my medical and credit card bills, but the most important for me is to have lost my liberty and freedom to pursue my dream. I could have avoided all of these if I never bothered to inform FBI of the suspected Chinese espionage inside this country. What makes me wonder is a potential severe consequence to our national security if I did not make my comments with FBI about what I knew and what I saw. I wish you could sense the same projected vision of a fatal disaster to U.S. national security if I could let it ignored. It took me several months to realize after I returning from China that those involved in the satellite operation wanted me, after eating breakfast, to stay in bed until noon and go to bed at 10pm to accept what they feel necessary but I consider it as an unwanted government compulsory mind control, brain study, scientific experiments and psychological and mental torture program.

I’ve surely noticed the gradual adjusted response and better treatment from those involved who are much more lenient than they were after I started writing my letters to Congressmen, or they probably have obtained much more matured experience and advanced satellite techniques to control my body and brain. I feel myself like a chained guinea-pig being unlawfully detained, controlled and tortured by those involved in the satellite operation. It is so painful to find myself totally isolated from my friends, families and communities ever since this “incident” started as I could not discuss and share my painful stories with public for the sake of our national security and on-going government espionage investigation. I had to lie to cover up my real situation about my business and my family when greeted and asked by friends and families in domestic and overseas for the past five years, and feel so helpless to face our federal government power and still don’t know who and where they are, when and to what degree they will eventually feel satisfied their desires to set me free!

Our nation should be much safer if our federal government and those involved could improve their management and training on our intelligence personnel, but why should I be punished for accidently discovering government secretes? It caught up my attention to discover a large government network of intelligence after realizing that two covert intelligence personnel working for FBI in Sacramento had tried to sabotage my business in order to kick me out of my growing insurance and financial service business for knowing their background and their social activities in the States. I have evidence and witnesses to prove my statement inside any courtroom. It troubles me to understand why by helping protect this country, I would become a victim of our government secret mind control, brain study and psychological, mental and physical torture program through our satellite? How long do I have to live like this? When could I be respected as a human by our federal government? I would truly appreciate if you could help investigate my case under any pressure that you might have to face, and help fight for my freedom that I cherished the most ever since I came and lived in this great country. Finally, I truly hope our federal government will learn the lesson from my case to ensure protecting our constitution and respect the law and citizen’s rights when dealing with even the most critical and sophisticated national security issues.

For more information about my shocking discoveries of our government secrets and my stories, please find my letters sent to congressmen and news media listed in the attached Appendix One.

***

CHARLES B. SCHAFFER, M.D.

Diplomate, American Board of

Psychiatry and Neurology

PSYCHIATRIC EVALUATION JIMMY SHAO

July 2, 2013

Re: People versus Jimmy Shao

Case Number: 13M03920

X-Reference Number: 3011029 Judge Alyson L. Huber Department 3

Sacramento Superior Court

Identifying Data

Jimmy Shao is a 56 year-old male resident of Sacramento who is currently out of custody.

Purpose of Evaluation

Mr. Shao was referred by the Sacramento Superior Court for a psychiatric evaluation to determine if he is presently mentally incompetent to stand trial (1368 PC).

MENTAL STATUS EXAMINATION

Mr. Shao was interviewed in the office of the public defender on 6/27/13. On general appearance, he was a middle-aged appearing man of medium build _who dressed casually and appropriately. He stated that he is 5 feet 9 inches tall and weighs between 175 pounds and 180 pounds, which is his normal weight range. He demonstrated a good appearance and grooming. He was cooperative and cordial. His social skills were superficially appropriate. He spoke English well, with a minimally noticeable accent. He was somewhat controlling during the interview and required interruption at times in order for the examiner to complete the evaluation.

Mr. Shao stated that he was experiencing an “angry” mood during the interview. His mood appeared to fluctuate during the interview between euthmia, dysphoria, expansiveness, and mild euphoria. His affect had depth and was appropriate except for a few smiles,. which were inconsistent with his current distressed life situation. His speech was normal in amplitude;, but pressured and intrusive, requiring the examiner to interrupt him multiple times in order to have a bilateral conversation. His level of psychomotor activity was within the normal range. He did not de1nonstrate any bizarre or inappropriate behavior.

Mr. Shao stated that he was hearing sounds in his mind constantly from satellites. He made a harsh sound effect with his mouth to mimic these sounds. There was evidence of thought disorganization in the form of tangential statements a.11d thought derailment, requiring him to be redirected back to the original topic of the conversation a few times, usually successfully, with some effort. He denied any current thoughts to harm himself or others. A prominent theme of his conversation consisted of his bizarre and paranoid delusions regarding the government authorities who were continuously harassing him by e1nploying a satellite to control his mind and physically harm him. He also made some statements suggestive of grandiose ideation. He had no insight into the nature and severity of his psychiatric disorder.

Mr. Shao was alert during the entire interview. There were no obvious cognitive deficits suggestive of an organic mental disorder. His sh0l1:-term memory and long-term memory were both grossly intact except for his distorted memory caused by his disturbed thoughts related to the FBI/CIA and satellites. His concentration and attention were not impaired. His judgment was obviously impaired because of the influence of his delusional ideation on his behavior (excessive 911 calls). He could correctly interpret only one out of four simple, well-known proverbs. He was oriented to the date; place, and time. His intelligence was estimated to be above average.

CLINICAL EVALUATION RELATED TO COMPETENCY TO STAND TRIAL

Defendant’s Description of Incident that Led to Arrest

Mr. Shao stated that he was arrested and incarcerated on 5/21/13. He was released from jail the next day, and he did not know the conditions of his release. He demonstrated a document to the examiner that contained the charges against him. He was asked to provide his version of the incidents that led to his arrest.

Mr. Shao stated that he has made over one hundred 911 calls in a period of about a month during April and May of this year. He added that the reason for these calls was to publicize his situation regarding satellites, which were controlling him and harming him. He provided some background history which led up to this situation.

Mr. Shao claimed that several years ago, he reported Iris concerns to a local FBI agent in Sacramento about an ex_college class1nate of his from China and five other people who worked for the United States, FBI, and CIA at the time. He had the impression that these men might be involved in espionage against the United States. Since that time, he has had the impression that he has been monitored by the FBI and CIA, He now believes that these authorities are creating satellite signals that “blast” his brain, control his mind, and read his mind.

Mr. Shao added that he reported this situation to several authorities (he demonstrated. a list of several official entities well known in the United States), but he did not receive a satisfactory response from these authorities. For this reaso11, he started making 911 calls to publicize his situation. He claimed that this satellite can send brainwaves to his brain and cause a painful sensation in his head during these attacks on him.

Relationship with Attorney

Mr. Shao stated that he has yet to meet his defense attorney. He added that he has discussed his case only with a law school student who is working as an intern for the Sacramento County Office of the Public Defender. He was asked if he is willing to follow his attorney’s advice in the future, and he stated that he will follow his attorney’ s advice only if his lawyer believes his claims about the satellites that are controlling him. He will not work with any attorney who does not share this belief.

Understanding of Current Legal Situation

Mr. Shao stated that he has been charged with two offenses: “falsely reporting an emergency” and ”telephoning a 911 emergency without intent.” He believes that both of these offenses are misdemeanor crimes. He did not know the condition of his release from jail. He recalled that his competency evaluation was discussed during his most recent court date, and he could not predict the agenda for his next court appearance.

Mr. Shao stated that he has yet to enter a plea. He added that the only plea he plans to enter in the future is not guilty. He was aware that other pleas available to him are guilty and no contest. I Ie has never heard of the plea of not guilty by reason of insanity. He did not know the current status of his case in the court.

Mr. Shao i11dicated that the district attorney has made an offer of community service (washing police cars) and paying a fine of an unknown amount. He emphasized that he will not take any offer because he strongly believes that he is not guilty of committing the offenses. He believes that he will have to go to jail if he does not take an offer. He predicted that his worst possible sentence is six months in jail, and the best possible outcome for his case would be “drop the charges.” He does not know if there is any evidence against him.

Mr. Shao was asked to explain the meaning of competency to stand trial, and he responded “Mentally stable and healthy and can sustain as long as the trial goes.” The examiner provided him with a more formal explanation of competency, and he believes that he is competent according to this explru1ation. He would prefer to be found competent. He was not aware that his attorney declared a doubt about his competency. He was asked why his attorney would declare a doubt, and he answered, “Maybe they think I’m crazy because I called 911.” He did not know the disposition of a defendant who is found competent or incompetent. He de11ied that he has ever been evaluated for competency in the past.

Understanding of Legal Terms

Mr. Shao was asked to explain the meaning of 27 common legal terms, and he could provide an adequate explanation for the following 23 terms: guilty, not guilty, sentence acquit, plea bargain, misdemeanor, felony, probation, convict, bail, arrest, strike crime, perjury, verdict criminal record, warrant, victim, evidence, suspect, prior, trial, time served, and under oath.

Mr. Shao was unable to correctly explain the meaning of the following four terms: no contest, Miranda warning, parole, and offense.

Major Courtroom Participants

Mr. Shao could provide an adequate explanation for the role of the following major courtroom participants: judge, jury, district attorney, defense attorney witnesses, defendant, and court reporter.

Rights of a Defendant

Mr. Shao was aware, with prompting that he has the following rights as a defendant:

1. Right to a fair trial

2. Right to a jury trial

3. Right to remain silent

Mr. Shao was not aware that he has the following rights:

1. Right to be represented by an attorney

2. Right to a speedy trial

3. Right to call supporting witnesses

4. Right to confront and question opposing witnesses

Courtroom Behavior

Mr. Shao stated that he has had only one court appearance related to his current offense, and he denied that he demonstrated any behavior problems at that time. He did not know when a defendant is allowed to speak in court. He could not predict the consequences for a defendant who speaks out of turn in court.

CAPACITY TO GIVE INFORMED CONSENT FOR PSYCHIATRIC MEDICINES

Mr. Shao denied that he has a psychiatric disorder at the current time. He does not believe that he requires psychiatric medicines presently.

REVIEW OF RECORDS

1. Police Report

A police report dated 5/20113 related to Mr. Shao’s arrest for false report of an emergency and making non-emergency 911 calls was reviewed. According to this report, Mr. Shao was arrested after making excessive amounts of 911 calls, which tied up both CHP and SPD 911lines. He often made calls several times a night, and each time he had the same story and no emergency. He wanted the police to make the FBI leave him alone and talked about the government using satellites to control him. He claimed that he has been assaulted by Governor Brown’s satellites and was a victim of satellite abuse because the satellites were physically abusing him, eating his food and treating him like a guinea pig. He also claimed that the satellites were watching him and controlling him as a slave. Despite being told that he would be arrested if he continued these calls, he reported that he would continue to make the 911 calls until the satellites stopped abusing him.

2.Documents Prepared by Jimmy Shao

This examiner was provided with a seve11.-page, single-spaced typewritten document dated 4/1/13 prepared by Mr. Shao for “To Whom it May Concern.” In this document, Mr. Shao provided a detailed history of his perceived harassment and persecution by the Federal government after he reported to the FBI in 2007 his suspicions that a high level Chinese espionage agent, who happened to be his college alumni, was traveling between the United States and China. He described several ways in which he became the object of sabotage, surveillance, and persecution.

He emphasized that he later started experiencing extreme physical symptoms from a government-controlled satellite that was torturing and controlling his 1nind and body. He attributed the loss of his wife, career, and ability to find a job to the federal government, which was causing him extreme physical harm and preventing him from moving forward in his life, by several devious methods. In the appendix at the end of this document, he listed several prominent government authorities and several leading newspapers which have been the recipients of his letters of concern and co1nplaints about his perceived persecution by the federal govenune11t. This exa1niner was provided some links to some news stories about his excessive 911 calls.

In a separate two-page typewritten document dated 6/10113 Mr. Shao discussed his justification for making excessive 911 calls and his positive reaction because his 911 calls had “finally caught up the media and my fellow Americans’ attention.” In this document, he also stated that he will keep making the 911 calls to report that the government has been using a satellite to control and torture him after he notified the FBI about a high level Chinese espionage agent in 2007. This document also contained similar information that was mentioned in the longer document described previously in this report.

3. Records of Sacramento County Jail Psychiatric Services

According to these records, Mr. Shao was referred to the JPS on a non-urgent basis for evaluation because he reported, “The satellites are controlling me” after he was attested and incarcerated on 5/21/13. No clinical notes were written by the JPS because Mr. Shao was discharged on the same day as his arrest.

CONCLUSIONS

1. Mr. Shao has a primary Axis 1 disorder, and possible diagnoses of this disorder are Schizoaffective Disorder, Bipolar Type; or Schizophrenia, Paranoid Type. H1s symptoms of this disorder are disturbance of mood and affect, pressured speech, thought disorganization, delusions, inappropriate behavior, impaired executive function, and lack of insight

2. Mr. Shao has the ability to understand the criminal proceedings; however, he lacks the ability to assist his attorney in his defense in a rational manner. This opinion is based on the following factors:

a. When Mr. Shao was recently evaluated by this examiner, he had an adequate understanding of the criminal proceedings.

b. When Mr. Shao was recently evaluated by this examiner, he demonstrated severe symptoms of his primary psychiatric disorder (especially delusions, thought disorganization: pressured speech, impaired executive function and lack of insight) which would prevent him from discussing his legal case with this attorney in a rational manner, and prevent him from using adequate judgment in making decisions about his legal case. For example, he believes that his illegal excessive 911 calls are justified because of his perceived persecution by the federal government, especially through satellites that are controlling him and physically torturing him. Moreover, he informed this examiner that he would never take an offer from the district attorney because he strongly believes that he is the victim and not guilty of any crimes as a result of his delusional thoughts.

c. Mr. Shao’s attorney recently informed this examiner that Mr. Shao is unable to discuss his legal case with his attorney in a rational manner.

d. Mr. Shao is not taking any psychiatric medicines for his primary psychiatric disorder at the current time.

e. There is insufficient evidence to conclude that Mr. Shao is malingering his severe symptoms of his primary psychiatric disorder (listed in #1 above).

3. Mr. Shao lacks the capacity to make decisions regarding antipsychotic medication because he denies that he has a psychiatric disorder at the current time, and he does not believe that he requires psychiatric medications currently.

4. Mr. Shao is a danger to himself or others at the current time for the following reasons:

a. Mr. Shao’s primary psychiatric disorder is typically progressive and chronic in the absence of antipsychotic treatment. For this reason, this disorder is substantially deteriorating because he is not taking antipsychotics.

b. Mr. Shao 1s at risk to demonstrate dangerous and v10lent behavior toward others because of his escalating paranoid ideation, which might motivate him to harm others to defend himself.

5. Antipsychotic medication with antimanic properties is medically appropriate for Mr. Shao because he is demonstrating psychotic and manic symptoms. Antipsychotic medication will likely restore his competence if he takes antipsychotics on a maintenance basis without interruption for the foreseeable fuh1re.

6. As a psychiatrist, this examiner has the following additional opinions:

a. Mr. Shao can be treated with any antipsychotic that has antimanic properties. The most common side effects of these antipsychotics are headaches, dizziness, dry 1nouth, constipation, sexual dysft.u1ction, weight gain, impaired cognition, increased blood prolactin levels, agitation, insomnia sedation, restlessness, muscle spasms, and symptoms of Parkinson’s disease.

Less common but more serious side effects of antipsychotics can include cardiovascular disease, diabetes, increased blood lipid levels, tardive dyskinesia (a movement disorder which ca11 be irreversible even when the medich1e is disco11tinued), neuroleptic malignant syndrome (which can be life threatening or cause serious permanent neurological damage) and cardiac arrhythmias (which can result in death). Most patients in Mr. Shao’s age group without concurrent serious medical illnesses usually tolerate antipsychotics without serious side effects if they are prescribed cautiously by a psychiatrist who has experience and expertise in the area of psychopharmacology.

b. If Mr. Shao refuses to take oral antipsychotics, he can be treated with lm1g acting injectable antipsychotics such as Haldol, Prolixin, Risperdal::o and Invega. Possible additional side effects of injectable antipsychotics are pain, swelling, bruising, bleeding and infection at the injection site.

c. It is unlikely that any antipsychotic medication will impair Mr. Shao’s ability to understand the criminal proceedings or impair his ability to assist his counsel in a rational manner.

d. Antipsychotic medication will probably be efficacious for the severe symptoms of Mr. Shao’s primary psychiatric disorder (listed in #1 above) if he takes antipsychotics on a maintenance basis without interruption for the foreseeable future. In Mr. Shao’s case, the benefits of antipsychotics outweigh the risks.

e. There are no less intrusive possible alternative medical treatments to antipsychotics in Mr. Shao’s case.

Charles B. Shaffer, MD

MIND CONTROL : National Security Agency (NSA)

by Steven J. Smith

1.0

Introduction:

The NSA (national security agency) was created in 1952, is headquartered at Fort Meade Maryland, and administered by the United States Department of Defense (DoD). Government generated disinformation portrays the NSA as strictly involved in the collection and analysis of foreign communications. In other words, electronic surveillance of foreign countries. Although specifically bared from domestic surveillance of American citizens by the Foreign Intelligence Surveillance Act (FISA) of 1978, the NSA has recently admitted to limited spying on American citizens. If this were the limit of NSA transgressions, the essay you’re about to read would not be necessary. Sadly, the NSA is engaged in illegal activities that make electronic eavesdropping on American citizens seem almost trivial by comparison.

Over the years, there have been a number of newspaper articles and other media reports, claiming American intelligence agencies have tried to use individuals with psychic abilities to spy on other nations. The most widely publicized being project Stargate. In every instance, the intelligence agencies have claimed these efforts were a failure and terminated the project.

But consider for a moment…

How often does the CIA, NSA, or DIA openly admit to failure? Especially in connection to some new espionage technique. What better way to deflect public scrutiny away form some topic (or secret project), than to announce that after spending millions of dollars, no useful results were obtained. The American government has a long history of using such misdirection ploys to hide its covert activities. In point of fact, the American government has a very successful psychic espionage/warfare program. It was initiated shortly after WWII, has been operational since the early 1950s, and is administered by the NSA. The primary motivation for keeping this program so highly classified (secret), concerns the appalling nature of how these psychics are created, trained, and deployed.

The NSA is involved in some of the most heinous crimes and vicious acts of barbarism ever perpetrated on humanity. Even the monstrous autocracies committed by WWII Nazi war criminals pale in comparison to the crimes of the NSA. This document concerns it self with nothing less than the wholesale medical experimentation, torture and outright murder of American children, some less than six years old. The rationale behind these despicable acts? To create a secret slave army of government controlled super psychics, which at present, number in the tens of thousands. The solders (both men and women) of this vast psychic army live and die at the whims of DNI (director of national intelligence) and NCA (national command authority). Its Ironic that Nazi biologists and doctors involved in human experimentation, relocated to America in the aftermath of WWII (under Operation Paperclip), were the precursors responsible for this foul excursion into the darkest corners of evil and depravity.

Click Here to view Wikipedia article on NSA (opens in a new browser window).
Click Here to view Wikipedia article on Foreign Intelligence Surveillance Act of 1978 (opens in a new browser window).
Click Here to view Wikipedia article on Project Stargate (opens in a new browser window).
Click Here to view Wikipedia article on Operation Paperclip (opens in a new browser window).
Click Here to view Wikipedia article on Nazi human medical experimentation (opens in a new browser window).

1.1

National security:

Why is the NSA engaged in such loathsome behavior? Is the NSA protecting you and your loved ones from terrorists? In a word, No… Is the NSA defending truth, justice, and the American way? Sorry, wrong again.

In order to understand why, you must first understand what the term "national security" really means. Many assume it means protecting the people and property belonging to the citizens of our beloved country. Alas, nothing could be farther from the truth. In legal terms, the word "national" (derived from the root word "nation"), and the word "country" are NOT interchangeable. A country is a geographical area having well defined boundaries. A nation is a political entity asserting ultimate authority over that geographical area. So when a government official uses the term "national security", what he/she really means is the security of the entity that asserts authority over the geographic area we know as the USA. In other words, the term "national security" means the security of the government, not the security of the people. And the National Security Agency (NSA) is that part of the government tasked with keeping the government safe and secure.

But safe and secure from who?

Obviously, the people living within the geographical boundaries over which the government asserts its ultimate authority. In other words, you & me…

The rest of this essay outlines in graphic detail how the NSA accomplishes its government mandated mission.

1.1.1

Psychic abilities:

From Cassandra of Troy, and the Pythia (prophet) of Delphi in ancient times, to the writings of Nostradamus and the more contemporary works of Edger Cayce. Psychics and their abilities form a common thread, starting at the very foundations of history, and continuing to the present. Furthermore, psychic individuals are found in all cultural groups. From Africa to Scandinavia, from China to the American Indians. It seems no group or culture is without examples of people who manifest psychic abilities. Yet despite all of the historical evidence, and obvious impact on the events surrounding their lives, psychics and their abilities remain at best an elusive mirage, possessing an almost chimerical quality.

Clearly, from the perspective of evolution, psychic ability would seem to be a very pro-survival trait. For example, knowing there’s a man eating tiger waiting in ambush, when traversing grass lands of the Serengeti, or knowing where to find buffalo on the vast American plains, will definitely improve an individuals chance for survival. So why are there so few examples of truly gifted psychics? The answer involves the love/hate relationship implicit in psychic abilities. Would you really want to work with someone who knew your innermost secrets? Do you want a neighbor who could see exactly what you’re doing in your bedroom, or in your bathroom, or even in your dreams? How would you feel about somebody who could influence what you’re thinking without saying a word, or even being in the same room with you. Would you feel safe around that individual?

But it gets worse.

What chance do you have for job promotion, when your psychic co-worker can covertly influence the boss, or see into the future and knows just what moves the company should make to thrive and prosper? And what if that psychic individual could manifest some of the more exotic abilities? Abilities such as telekinesis (moving objects with the mind), pyrokinesis (ability to manipulate fire), or even manifesting a double (bilocation) of him/her self (or worse, your wife/husband). If you’re anything near normal, then about now the hairs on the back of your neck are starting to tingle. You’re also beginning to wonder if its such a good idea to let that person live, let alone roam free your neighborhood. In religious terms, everybody wants Jesus to manifest miracles and save them from evil, but if the gentleman from Nazareth were to show up tomorrow, odds are real good he’d be nailed to another cross (or shot in the head, etc.) within a few weeks. Looked at another way, a certain amount of psychic ability (such as normal intuition) is accepted by society. But anyone displaying exceptional abilities will be quickly ostracized, if not outright murdered. An in-depth review of the historical record shows that many of those who possessed exceptional psychic abilities, met with an untimely and/or unnatural death.

Perhaps you begin to appreciate the dilemma American government officials faced, when shortly after WWII it became apparent, that by employing modern medical techniques it was now possible to routinely create individuals with prodigious psychic powers and abilities. Obviously these individuals would be useful. But how would the government control them?

1.1.2

A prison for the mind:

How do you control a person who is able to walk through solid walls, or kill with a single glance? A person who can see the future, and knows what you’re about to say or do. A person who can make you eat broken glass and enjoy the experience, or make you point a gun at your own head and pull the trigger. A person who can influence the weather, start fires by mere thought (pyrokinesis), or blackout an entire city by touching an ordinary power pole (electrokinesis). There can be little doubt that from a political, military or espionage perspective, such a person is both incredibly valuable AND unbelievably dangerous. Can you imagine an American general, his mouth watering at the prospect of commanding an army of psychic killers, AND his knees shaking when he considers what would happen if that army ever rebelled? Or a high ranking intelligence official, a gleam in his eye as he contemplates knowing his enemies deepest secrets, AND his palms sweating when he considers that a telepathic spy can send thoughts, just as easily as he or she receives them.

To what lengths would a military general or government official go, in order to guarantee absolute control over a psychic solder, assassin, or spy? And more importantly, how will that absolute control be achieved?

The answer is both very simple and chillingly gruesome.

You turn the mind of the psychic into a prison, and you make him/her both the prison guard, and the prisoner. The first step is accomplished through the use of extreme physical and psychological torture. This causes massive dissociation, thereby splitting the mind into multiple personas (personalities). Psychoactive drugs are also administered during this step to heighten mental impact of the pain, thereby accelerating the process of mental splitting. Next you train different personas to perform different tasks. Then, you use ECT electro-convulsive-therapy (also known as electroshock treatment) to "lock in" the personas, and destroy any trace of recollection in the dominate personality of the now split off personas. Finally, you do all of this to the psychic while he or she is still a child (under the age of 10). At this point, you have created the perfect psychic warrior. Capable of committing any act, no matter how vile or self destructive, all under the absolute control of his or her handlers. However, the physical injury, emotional scars, mental confusion, and spiritual rape inflicted upon the hapless psychic child by this inhuman brutality, will last a lifetime…

If you feel revulsion at what I’ve just described, you’re far from alone.

The next question that must be answered is where do you find individuals with the prerequisite expertise to perform such a detailed and thorough job of shattering, and rebuilding a human mind? The obvious answer is the government intelligence agencies. These organizations employ some of the best psychiatrists, psychologists and behavioral scientists to be found anywhere in the world. They’re also consummate experts at interrogation and psychological warfare techniques. Precisely the skill set required for building a psychic version of the Manchurian candidate. But of course, mercilessly torturing innocent children goes well beyond the constitutional boundaries of acceptable government behavior, not to mention violating local, state, federal, and international law. The solution? Use a secret presidential executive order (memorandum) to create a new intelligence agency that operates outside statutory law, congressional oversight, or constitutional limits. In this way, the NSA was created by president Harry S. Truman in June of 1952, and for the first few years of its existence, remained so secret that even its name was classified. A very odd beginning for an agency supposedly tasked with the mundane job of intercepting foreign communications, but the perfect disguise for a collection of amoral medical professionals and sadistic military thugs intent on turning innocent children into psychic robots to serve the malevolent interests of a government run amok

Click Here to view Wikipedia article on Dissociate Identity Disorder (aka multiple personality disorder) (opens in a new browser window).

For those who wish a more detailed description of the process used in creating psychic slaves, see: National Security Agency – Part 2, A prison for the mind.

1.1.3

The rise of psychotronics:

Definition – Psychotronics: The study of the interaction between matter, energy and the mind, especially the supposed relationship in Para-psychological effects.

Even with the brainwashing techniques described above (1.1.2), deploying and controlling thousands of psychic slaves is still a rather daunting task. The problem breaks down into three major areas of concern.

1. Security. There is always the possibility that a psychic might get caught. Or worse, might go rogue and escape his/her handlers.

2. Targeting. Somehow the psychic must be introduced to, or made aware of and familiar with, his/her intended target. A dificult task if the target is a foreign head of state or high ranking military officer.

3. Psychic strength or ability. Despite the use of intrauterine and neonatal hormone treatments (3.2.2), genetic variability still plays a large role in eventual psychic ability exhibited by the child. While certain psychoactive drugs could be used to boost psychic abilities, these also exacerbate problems 1 & 2 (above).

By the late 1950s (6-8 years into the secret NSA program), these three problem areas were starting to limit further expansion of what was otherwise proving to be, a very valuable adjunct to the more conventional techniques of political propaganda (population control), espionage, and assassination.

A solution was sought, and eventually found. By using a combination of microwave radiation, modulated with EEG (Electroencephalogram) brain waves of the psychic, and aimed at the desired individual/location, it was no longer necessary for the assassin/spy/agent provocateur to be anywhere near his/her intended target. Furthermore, the telecommunications industry could be covertly enlisted to transport the modulated microwave signal to any remote location desired.

What a delicious irony!

The NSA, an agency ostensibly tasked with intercepting foreign communications, is in fact, using the world wide telecommunications network to piggyback the brain waves of its psychic army…

Where first generation NSA psychics had to be deployed in the field. Now they could be safely cloistered in purpose built facilities, with targeting accomplished by simply entering the latitude and longitude coordinates into a local console tied to the psychotronics network. Furthermore, even psychics with weaker innate abilities could be used since the psychotronics network would amplify or boost their EEG brain waves to any desired level. Psychotronics also allowed psychoactive drugs to be administered via IV (intravenous) drip. This has several very beneficial advantages. First it allows psychic ability to be "fine tuned" to the mission profile. Second, the use of psychoactive drugs to boost abilities means that weaker psychics can be employed, thereby lowering the risk, should a psychic turn against his/her handlers. Lastly, a (weaker) psychic that does manage to escape his or her handlers will be far less dangerous to apprehend (once the psychoactive drugs wear off). In summary, the use of psychotronics solved all three problem areas listed above, and facilitated continued expansion of the psychic warfare program.

Another interesting aspect of Psychotronics concerns what can be influenced through a Psychotronics channel. At the present state of technology, only living things (plants, animals, humans, etc.) can be influenced through a Psychotronics channel. Influencing inanimate matter (telekinesis, pyrokinesis, electrokinesis, etc.) still requires the psychic to be located within a few miles of the intended target.

As a side note, Harold Puthoff (National Security Agency 1960-1963), was one of the more notable contributors to the field of psychotronics, see Puthoff H & Targ R, "A perceptual channel for information transfer over kilometer distances: Historical perspective and recent research", Proceedings of the IEEE, Vol 64, No 3, pp 329-354, March 1976. However, it is the authors opinion that some of this IEEE paper and his 1970s SRI research were disinformation intended to draw attention away from his earlier work at the NSA.

Click Here to view Wikipedia article on SRI research into Clairvoyance and ESP (opens in a new browser window).
Click Here to view Wikipedia article on Harold Puthoff (opens in a new browser window).

For more information on the specific application and targeting of modulated microwaves to influence mental processes, see authors companion paper Remote Mind Control.

1.2.1

The Black Hole:

Its official name is classified, but those who work (and live) there simply call it "The Black Hole". Located within the sprawling 100 square mile confines of Marine Base Quantico, The Black Hole complex consists of a multi-story black glass building (reminiscent of NSA head quarters building at Fort Mead, MD.), several separate underground dormitories, capable of accommodating several thousand psychics (plus their chaperones), and a number of above ground support structures, including barracks for a Marine security contingent, several dormitories for psychic handlers, a multi-bed infirmary, and most surprisingly, an onsite crematorium. The last is necessary because even with the extreme security measures taken to ensure absolute control over the psychics, there are still a significant number of, shall we call them "accidents" (1.1.2). It seems The Black Hole is deserving of its name, since many who go in, never come out…

The black glass building roof has a multitude of large satellite dishes and oversized cooling units (psychotronics consumes lots of bandwidth and generates a large amount of heat, see section 1.1.3). Inside the building, the above ground floors include office space for clerical employees, psychic handlers, and managerial personnel. The floors are covered in ceramic tile rather than carpet, since its less trouble to clean after a psychic "accident". The multiple underground floors house the psychotronics (computers & electronics) equipment and ops rooms. There are underground hallways that connect the ops areas to the separate psychic dormitories.

The psychic dormitories include a central kitchen with walk-in freezers, coolers, and dry goods storage area, all connected to the surface by freight elevators that also serve as the access points for marine security teams when there’s an "incident" in one of the dormitories. There is no dining room, the psychics are confined to their individual quarters, except when they’re involved in a mission. Below the kitchen are several levels of psychic dormitories, stacked one on top of another, all tied together with elevators that require a magnetic stripe card and access code to operate. No elevator traverses more than one level. Each dormitory level consists of a long central hallway, with branch corridors leading to the dormitory units. Each dormitory unit consists of several floors of quarters with a live in "chaperone" on each floor. There are security control doors on each psychic living quarters, and on the corridor leading to the main hallway. Each of these doors requires a magnetic stripe card and access code to operate. Each live in chaperone quarters has a small panel with door status indicator lights, and emergency call button to summon an armed Marine security team in case of an "accident". If a Marine security team is summoned, they will shoot to kill, any psychic found out of their quarters, any chaperone who is acting strangely, and even other security team members who start acting strange, or fail to follow orders, or who fail to precisely follow the predetermined procedures. Security within the psychic dormitories is a VERY serious matter…

Each psychic quarters consists of a living room, bed room, bath room with shower, and a kitchenette. The living room has an access controlled TV. The TV is not used for entertainment. Rather it is used to condition the psychic with visual media, expressly selected for his or her specialty. For instance a psychic specializing in influencing Russian emigrants or embassy personnel will only watch shows in Russian language. Conversely, a psychic assassin will be shown movies involving murder. And a psychic who specializes in inducing their victims to commit acts of pedophilia, will be shown pornographic movies involving underage children. There is no behavior so vile, no crime so heinous, no deed so monstrous, that the NSA doesn’t already have a psychic warrior trained, and ready to induce some victim into performing the act.

Some psychics are so dangerous that an entire dormitory unit is used to house a single individual.

Click Here to view Google map of Marine Base Quantico (opens in a new browser window).

Along with The Black Hole, there is another major contingent of psychics housed in underground dormitories at NSA headquarters in Fort Meade Maryland. There are also smaller facilities (6 to 12 psychics) located on the outskirts of ALL major American cities, important military bases, and many political hot spots (northern Idaho for example). These smaller facilities are primarily used when a quick response is needed, and as a general rule, house less dangerous psychics (mind readers, thought/emotion changers, dream hijackers, etc.). Many of the smaller facilities use a common building plan, consisting of a 2 or 3 story building masquerading as a commercial business. The first floor is all office space, and acts as a ruse to hide the activities taking place on the second and third floors. The three story version (12 psychics) will have a kitchen, multiple ops rooms, and dining/recreation area on the second floor. The third floor consists of individual living quarters for the psychics and chaperones. The two story version (6 psychics) combines the living quarters, ops rooms, kitchen, dining/recreation area into a single upper floor. All smaller facilities have 2 or 3 oversized satellite dishes on the roof, generally mounted in such a way as to hide them from ground level observation. The dishes are aimed south at the geo-synchronous satellite belt, and serve as the Psychotronics link.

1.2.2

Dramatis personae:

Its time to meet the people who make up a typical American psychic ops team.

The Psychic: This individual is at the core of the team. Every one else on the team is there to support the psychic. Some teams include more than one psychic. For instance, a psychic that is skilled at causing pain but unable to read minds, might be teamed up with another psychic who is skilled at reading minds but unable to do anything else. Another useful team consists of one psychic who is able to kill a target, and one (or more) psychic(s ) with defensive skills (able to shield the attacker from pain). These teams are used to attack targets that are protected by other psychics.

The Mission Coordinator: Always male, and sometimes referred to as "The Suit" because of his clothing. This person is the team leader. He’s receives mission orders from his superiors, organizes the mission, and selects the appropriate psychic(s) to carry out the operation. He also does the post mission paperwork, and reports mission results back to his superiors. Like the psychics, the suit has also undergone trauma based programming (3.2.1a). He carries a concealed hand gun (with silencer), and is programmed (hard wired) to kill the psychic and then himself, if he feels any intrusion into his mind. For security reasons, psychics are trained never to look at the face of the suit.

The Biomedical Technician: Also known as the "Bio Tech". This team member sits next to, and monitors the psychic warrior. The bio tech also administers the psychoactive drugs used to boost the psychic’s mental abilities. Many Bio Techs flunked out of medical school or served as field medics in the Army.

The Communications Technician: Also known as the "Comm. Tech". This individual is responsible for monitoring the psychotronics console (1.1.3), making sure the connection between psychic and target is accurate and stable. A sizeable number of Comm. Techs are convicted computer hackers.

While the psychics and suits live on-site, techs are civilian contractors and commute to work.

1.2.3

A day in the life:

Following a psychic through a typical day, will prove useful in understanding what its like to be one of America’s new breed of front line solders. But before we start, the reader should understand The Black Hole operates on a 24/7 basis. So the terms "morning", "afternoon", or "night" are relative, and bear no relation to the actual time in Quantico. NSA psychics live in an underground maze of rooms, elevators, and hallways (1.2.1), never seeing the light of day.

Morning starts with a visit from the chaperon, who administers a stimulant drug injection to counteract the sedative, administered by injection just before bedtime, the night before. The psychic is then left to shower use the toilet and generally wake up, while the chaperone administers stimulants to his/her other charges. Next comes breakfast, delivered by electric golf cart from the central kitchen, and distributed by the chaperone to each of the psychics, who eat alone in their quarters. The food is very good. It must have high nutritional value to help mitigate physiological damage caused by the steady cocktail of drugs given to the psychics on a daily basis. Along with breakfast are several pills, taken to counteract the long term liver and kidney damage resulting from the metabolic breakdown products of psychoactive drugs.

Generally, the morning is spent watching TV programs, specifically targeted at each psychic’s special abilities (1.2.1). Occasionally, as a special treat, they are allowed to watch a movie. Often, it’s a Disney animated movie. Remember, these psychics have the mind of a child, even though they are full grown adults. They were never allowed to mature mentally, since that would just make them more dangerous and harder to handle. Some, depending on how their abilities are used, can’t even read. None of them can write or do simple math. As another example, most of the psychic assassins have no idea what death is, and no knowledge whatsoever of right and wrong. They just do as they’re told…

At noon they are given lunch by the chaperone, again with more pills. This time to help prepare them for their afternoon mission. Many of these pills are designed to act as metabolic buffers against deleterious physical side effects of the strong psychoactive drugs employed during their mission. Depending on the nature and/or duration of the mission, lunch will be their last meal of the day, since after the mission, the psychic may not be able to eat any solid food without vomiting for the next 6 to 12 hours.

When its time, the chaperone hands the psychic over to The Suit (1.2.2), who walks with him/her to a nearby briefing room. The suit starts by giving the psychic a candy bar, laced with yet more drugs. These drugs are designed to enhance memory and engender a friendly rapport with the suit, thereby making it less likely the psychic will turn against him during the mission. Next, the suit shows the psychic photographs of the target, and explains the mission details. If the psychic is going to speak into the targets mind, the suit has the psychic memorize the exact phrases to be used. Once the suit is satisfied the psychic understands the mission, they proceed to an ops room, where the actual mission will be carried out. In the ops room, the psychic is seated in a reclining padded chair, and the suit loads targeting coordinates into the psychotronics console (1.1.3).

After the psychotronics console indicates proper targeting has been achieved, the suit calls in the other team members (comm. tech & bio tech, see 1.2.2). The bio tech straps the psychic into the chair, attaches the EEG head band and heart monitor wires, inserts an IV needle into the psychic’s arm, and starts an IV drip. Next the bio tech uses a syringe to push the first dose of psychoactive drugs into the IV line, thereby boosting the psychic into the heightened mental state required to complete his/her mission. Meanwhile, the comm. tech is monitoring both the target’s heart beat and psychic’s heart beat. When these are synchronized, the psychic is in deep mental contact with the target, and the mission begins. As the mission proceeds, the suit issues commands to the psychic and technicians to modify mission parameters as required to complete a successful operation.

Once the mission is completed, the comm. tech severs the psychotronics connection, and the bio tech injects a psychoactive antidote into the IV drip line, thereby bringing the psychic back to some semblance of a normal mind state. Next, the biomedical technician removes the EEG head band and heart monitor wires, un-straps the psychic. Finally, when the psychic is able to walk, the suit takes him/her back to the dormitory and hands them over to the chaperone. At this point, it’s the chaperone’s responsibility to stabilize the psychic with still more drugs, feed them if they are able to eat, and then put them to sleep with an injection of sedatives.

After being mercilessly tortured as a small children (1.1.2), then ruthlessly trained to use their abilities in service of the NSA, the average psychic starts work in The Black Hole at age 17. By age 30, few are left alive…

1.2.4

Mission profiles:

In order to fully appreciate what the NSA is doing to the world in general, and America in particular, it will prove useful to examine some typical psychic mission profiles. While far from a complete list, they are representative of the myriad ways in which the NSA employs its army of psychic slaves on an unsuspecting public.

1.2.4a: Market Manipulation
What if you could use psychics to secretly influence key decision makers at major mutual funds, pension funds, and hedge funds. In other words, what if you knew which way the financial markets were going to move, because you were the one making them move that way. This is precisely what the NSA does on a daily basis. The goal? To systematically strip the small investor of his/her wealth, and transfer that money to government employee pension funds and those large corporate asset pools that are under covert government control. For large American financial institutions, the choice is very simple. Play along or go broke…

Is it any wonder that (federal) government budgets continue to rise every year, while American families make do with less?

1.2.4b: Marital Infidelity & Pedophilia
What if you could have the woman of your dreams? An easy wish to fulfill if a psychic implanted the dream, and the NSA already has your "specified dream girl" in their employ (3.2.1b). What if you could turn almost anyone into a pedophile? The NSA has psychics that can do just that in a remarkably short period of time. And of course you’ll need trained children (both male and female) ready to satisfy the newly created pedophile’s every desire (another NSA specialty). Can you imagine the possibilities for blackmail?

This is precisely how many politicians and high ranking corporate officers are controlled.

1.2.4c: Assassination by Accident and Natural Causes
What if you were driving home late one night and saw a big rock in the middle of the road, so you swerved to miss it. However… You didn’t see the 150 foot vertical drop off until your car plunged over the lip. Or maybe you’re asleep one night, when you hear a noise that startles you awake. There at the hallway door, you see an intruder with a knife in his hand. So you grab the gun you keep in the night stand next to the bed, and shoot the intruder. As the smoke clears and the ringing in your ears subsides, you realize with growing horror you’ve just shot your husband, who was returning to bed after going to the bathroom.

Accidental death, courtesy of telepathic projection by NSA psychics.

Is death by heart attack, burst aneurysm, of cerebral hemorrhage a "natural cause"? Not if NSA psychics influence your heart rate, blood pressure, or vascular dilatation…

1.2.4d: Tainted food supplies and E. coli outbreaks
Natural food sources such as meats and vegetables, are not entirely free of bacterial contamination. Rather, bacterial contamination of food is minimized through a combination of techniques, including proper washing, handling, and packaging to preclude any cross contamination from other bacterial sources, and refrigeration to inhibit further growth of native bacteria already present within the food. In this manner, bacterial contamination levels in foods are maintained at sufficiently low levels, as to pose a minimal risk to healthy individuals.

Suppose a team of psychics, adept at pyrokinesis (ability to manipulate heat and fire) used their ability to raise the temperature within a batch of processed meat (such as hamburger), thereby allowing the native bacteria to resume growing (and dividing) for a period of several days…

In this way, NSA controlled psychics are able to create wide spread outbreaks of food born illness, on command, and with complete impunity

1.2.4e: Manipulating the foreign policy of other nations
There can be little doubt that American military leadership would like nothing better, than a full scale invasion of Iran. However, they need a pretext (excuse) to justify their actions. At present, the continued enrichment of uranium, supposedly for use in civilian nuclear power generation, is not sufficient provocation to justify a military invasion of Iran.

Querying a (former) government psychic, revealed the following tidbit of information.

Q. Where are your parents?
A. They died in auto accident. Then I went to live with my grandmother, but she also died.

Q. What happened next?
A. A lady took me and my sister Moni (short for Monica) to a place where men hurt us real bad.

Q. What happened to Moni?
A. They hurt her too much and she died. I miss her a lot.

Q. What did they train you to do?
A. Influence other people with my mind, and speak different languages.

Q. What languages do you speak?
A. Russian, Chinese, Japanese, French, Spanish, and Persian.

Q. What sort of influencing did you do in Persian language?
A. Hate America. Hate Jews. Hate Saudi Arabia. Blame Saudi Arabia.

No doubt, when the sneak attack (on American military forces) finally happens, the President will label it as another:

"Day That Will Live in Infamy!"…

1.3.1

Summary:

The American government, ostensibly engaged protecting the lives and property of American citizens, is simultaneously (and covertly) stripping those very same citizens of their wealth, security, and freedom. To be blunt, the American government is using NSA controlled psychics in a secret war against its own citizenry. The ultimate goal being to turn every single man, woman, and child living in America, into a government controlled slave laborer. It has taken 50+ years, but the transformation of America from a bastion of freedom and democracy, into a vast slave labor camp spanning an entire continent, is almost complete. Slavery does not require guards with guns, or cells with bars, or even awareness of enslavement. If you can build a prison for the mind…

In part two, we shall take an in depth look at how that prison was constructed.

1.3.2

Disclaimer:

ALL information contained herein is derived from public sources, widely accepted scientific principles, remote viewing, and/or deprogramming sessions of (former) government trained psychics. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising his right to free speech as a private citizen of the United States of America.

End

National Security Agency (NSA) – Part 1

2.1.1

Introduction:

In part one of this essay, I touched upon the topic of controlling individuals who possess strong psychic abilities. In part two I will bring that topic into sharp focus by explaining in graphic detail how the mind of a psychic is turned against it self. Thereby transforming that mind into a prison with built in prison guards. This process is, to say the least, horrific. Especially when you consider its carried out on children, many of whom are less than 5 years old. It is the fact that a child’s mind has limited real world experience, that makes the method so devastatingly effective. The procedure is carried out in two phases. The first phase is designed to shatter the mind into separate (and manageable) pieces. The second phase is intended to train those pieces to perform specific tasks. When completed, the psychic child’s dominate personality will have no recollection that he/she has been brutally tortured for months on end. Yet the child can be made to feel excruciating pain, or euphoric happiness, with the mere mention of a trigger word. In most cases, even their psychic abilities are repressed and inhibited, without first hearing a trigger word.

When the process is finished, an innocent child capable of loving others, feeling happiness, knowing the joy of life, and possessing an innate sense of right and wrong. Will be transformed into biological robot, capable of performing any act, no matter how depraved or barbaric. Devoid of any moral or ethical standard, and stripped of all human compassion.

Once more, I must caution the reader. You are about to take an excursion into a realm of human brutality, normally reserved for the criminally insane.

Proceed at your own risk…

2.1.2

The mammalian brain:

The brain of higher mammals is capable of some astounding feats of cognitive precision. For instance, without knowing anything at all about ballistic trajectories, a dog can snatch a Frisbee out of thin air. Equally impressive, a cat is able to jump from the ground, onto a narrow ledge, half the width of its own body. These feats are possible in large part, because mammals are warm blooded. This allows their brain to process information at higher rates and with greater precision. Yet occasionally, the very strength of mammalian mental processing leads to catastrophic results. For instance, a dog fixated on catching the Frisbee fails to notice an oncoming car, and is badly injured. Or a monkey reaches for a branch, only to find its really a shadow, and falls out of the tree. Events of this sort represent a failure of the mind to properly assess and respond to external stimuli. Cold blooded animals, with their more primitive reflex driven mentality do not, as a general rule, make these sorts of cognitive errors. In other words, they just don’t have the prerequisite mental agility in the first place, to make mistakes of this kind.

Fortunately, evolution created a backup system in the mammalian brain. Its based, at least in part, on the more primitive reflex style of cognition. It seems that whenever the normal mind makes a mistake, leading to major physical trauma, all of the sensory/somatic perceptions along with all thoughts and feelings surrounding the "mistake" are stored as-is in a reflex driven avoidance behavior pattern. In other words, since the higher more agile mental abilities failed to protect the creature from life threatening physical trauma, the more primitive reflex driven brain steps in and creates the equivalent of a mental "book mark", designed to avoid any future situation that resembles what is stored in the book mark. Put another way, rather than learning from the mistake, the creature reflexively avoids any situation that resembles the one where the mistake was made. While less than optimum and a bit draconian, such behavioral constrains are justified when the mental blunder is life threatening.

If all mammals lived as evolution designed them to, this reflex avoidance mechanism would be no more than a sporadic nuisance. Affecting a limited number of creatures in any species, in a limited number of situations. Unfortunately, the capacity of some humans to turn nature and evolution against it self, in order to satisfy their own nefarious desires, appears to have no upper limit…

The reflex based avoidance mechanism (described above) is the key behavioral phenomena upon which the NSA depends, when turning psychic children into psychic slaves.

Phase One – Shattering A Human Mind

2.1.3

Enduring the unendurable:

Suppose you were strapped down naked on a cold metal table, surrounded by people you don’t know, and subjected to excruciating pain, day in day out for several months. Furthermore, you’re only four years old, and have no idea whatsoever why this horrible punishment is being inflicted upon you. They just keep hurting you over and over again. There’s an IV in your arm, and leather band across your forehead. They use a jelled form of acid to burn you in the most sensitive places on your body. They push sharp needles through your feet. They insert electrified probes into your urethra, anis, and throat. They have a stick with a cloth covered electrified metal ball on the end, soaked in salt water. Its wired to an electrical generator, specifically tuned to elicit maximum stimulation of human nervous system pain receptors. They rub the ball all over your body, paying particular attention to those areas that have the highest concentration of nerve endings (hands, genitalia, feet, etc.).

How would you deal with it?

At first you ask your captors what you’ve done wrong, but they don’t utter a single word. They just keep hurting you.

Next you wonder were your mommy and daddy are? Why don’t they come and take you away from this horrible place? But they never come…

And the torture continues. Day after day. Week after week. You’re always naked, its always cold, and you’re always scared.

The torture sessions always end the same way. You pass out, and wake up in a small closet sized room. Its completely dark. There isn’t room to stand up or lay out flat, so you wrap your arms around your knees, and cry. Your body hurts so bad, and nobody will tell you why you’re here, or what you’ve done to deserve this horrible punishment. Somebody shoves a plate of food and glass of water through a slot in the door. The food tastes terrible, but you’re so hungry you eat it anyway. There is no toilet. You urinate and defecate where you’re sitting. The smell is awful. You cry and cry and cry. Finally, there’s a funny odor in the air, and you fall into an exhausted fitful dreamless slumber.

When you wake up, your body aches all over. Its so bad you can hardly move. The door opens, and men grab you by the arms and drag you down the hall to a room with a concrete floor. They dump you like a sack of potatoes in the middle of the floor, and use a (cold) water hose to wash you off. Next they grab you by the arms and drag back down the hall to the room with the metal table. They strap you down, and the torture begins again…

As days turn into weeks, you ask you self over and over again. What did I do? Why won’t anybody talk to me? Why won’t they stop hurting me? Where is my mommy and daddy? The memories of your previous life begin to fade. You begin to wonder if mommy and daddy were just a dream. And you start to wonder if you’re going to die in this awful place.

As time passes, you notice something. The men hurt you less, if you don’t struggle. At last! Here is a way to regain some control over your situation. You start trying to relax, even though you’re still being badly hurt. At first its dificult, but as the days pass, you get better and better at it. You learn to separate your self from the pain. The pain doesn’t belong to you anymore, it belongs to someone else. Soon, you’re able to look down at the metal table below you. You see that person strapped to the table, being hurt. That person looks like you, but you’re up here looking down. You tell your self over and over. That person being hurt isn’t me. That person being hurt isn’t me. That person being hurt isn’t me.

The separation is complete. You’re now two people. The one being hurt, and the one who feels no pain. Your NSA captors have successfully used massive physical trauma, accompanied by stark emotional terror, to invoke the reflex based avoidance mechanism (2.1.2). Thereby shattering (splitting) your mind into multiple pieces. Each sub-piece is now a separate independent persona or personality, capable of thinking, feeling, and acting independently of your dominate (baseline) personality.

This is how you learn to endure the unendurable…

2.1.4

Outside looking in:

From the perspective of your NSA captors, the situation in the room while they’re torturing you, is very different. They don’t see you as a helpless terrified child. To them, you’re a little monster who is unbelievably dangerous. Capable of injuring or killing them in the most bizarre ways imaginable, using nothing more than your mind. While you’re being tortured, you see only six of them (3 on each side of the table who actually administer the torture). In fact, there are nine of them in the room with you, and three more just outside. All of them, actively involved in your torture and the subsequent breakdown (shattering) of your dominate personality.

Its time for you to understand what was done to you, and more importantly, why…

2.2.1

The torture team:

The typical NSA torture team has 12 members. Each team performs 2 torture sessions a day, each session one and half to two hours in duration. For most team members, the rest of their day is spent trying to relieve the stress caused by intentionally provoking a psychic child into trying to hurt and/or kill them. Figure 1 shows a typical NSA torture chamber layout.

Figure 1

The following paragraphs describe the duties and responsibilities of each team member.

Targets: Six men surround the torture table. These men administer the torture, and are the only ones visible to their victim. If the psychic child is capable of retaliation, in most cases, it will be one (or more) of these men who suffer the consiquences, hence the term "targets". They are considered expendable, and receive minimal training. The implements used by these men to torture their victim are stored on open shelves located under the torture table. They are under strict orders not to move away from the table. If for any reason, they fail to follow orders, or if they start acting strangely, they will be shot in the head by the Dead Man. One might reasonably ask how the NSA recruits men willing to undertake this suicidal job. The simple truth is these men have no idea what their job entails until they arrive at the NSA torture compound, and then its too late to back out. Targets have an average life span measured in months.

Dead Man: The Dead Man’s job is very simple. If anyone in the torture chamber leaves their assigned post, behaves strangely, or appears to be under attack by the psychic child, the Dead Man shoots that person in the head. The Dead Man is an excellent marksman, capable of killing anyone in the torture chamber without moving from his assigned post. The one person the Dead Man will not kill is the psychic child. That decision, and subsequent action is the responsibility of another team member.

Chemical/Biological Tech: This team member is responsible for administering the psychoactive drugs (via IV drip). He also monitors the psychic child’s vital signs (heart rate, respiration, blood pressure). The primary drugs administered to the psychic child are intended to enhance pain and promote feelings of terror. At the end of the torture session, a sedative is administered, thereby rendering the child unconscious. Along with the IV drip, he has a number of syringes, pre-filled with specific chemical and biological agents for use in special situations. If used, they are injected directly into the victim’s neck (carotid artery). One of these syringes is filled with a quick acting sedative to render the victim unconscious.

Electrical/ECT Tech: This team member is responsible controlling the severity of electrical torture used on the psychic child. He also handles the ECT (electro-convulsive therapy) machine, commonly called an electro-shock machine that is used at the end of each torture session. The electrical torture can take several different forms, depending of the generator settings and torture implements used. DC current is used to induce severe muscle cramping. Low frequency AC current is used to create the sensation of muscle spasms. High frequency AC current creates a very painful stinging sensation. Certain multi-frequency AC currents are also applied to electrodes embedded in the leather head band to induce mental states, ranging from confusion to severe headache.

Guards: Two guards armed with rifles, located outside the torture chamber door, act as the failsafe. There is a small strobe light with a red lens cover located on the wall just above the door. If this strobe light starts flashing, the guards will open the doors, and without entering the room, kill the child. Their orders are very specific: "No matter what you see. No matter what anyone else is doing. KILL THE CHILD". Even if that means killing everyone else in the room, they will kill the child. Many guards are US Marines, assigned to the NSA.

Eye in the Sky: Not shown in figure 1 (above), the Eye in the Sky is located a sort distance away from the torture chamber, in a separate room. He monitors torture chamber activity via closed circuit TV, and brain activity of the psychic child via remote EEG (electroencephalogram). This person is the torture team leader, and issues commands to other team members via electronic reader boards located within the torture chamber. During the torture sessions, he uses a computer terminal to keep notes on the progress of the psychic child. He also has the "failsafe button" (used as a last resort) to alert the guards. He is always a trained psychologist or psychiatrist.

All team members live in an NSA controlled dormitory, co-located with the torture compound. Security is, to say the least, ruthless. NO torture team member, with the exception of Eye in the Sky, is allowed to leave the compound without undergoing drug induced retrograde amnesia treatments. Most targets leave in body bags…

2.2.2

The torture session:

The primary purpose of trauma based training (torture sessions) is to split the psychic child’s mind into multiple personas (personalities) which are then used (programmed) to contain different aspects of the original dominate personality. Another purpose of trauma based training is to elicit any and all latent psychic talents within the child. A psychic child undergoing extreme physical torture will try to stop that torture any way they can. If their latent psychic abilities are relatively weak, their efforts may consist of (telepathically) convincing one of more of the torture team members (usually the targets) to stop torturing them. If their psychic powers are stronger, they may cause physical injury and/or death to one (or more) team members. If their psychic powers are prodigious, they may retaliate in truly spectacular ways. Hence the need for a failsafe.

However, in all cases (excluding the failsafe), the psychic child must learn that resistance or retaliation is pointless, and only leads to more severe forms of punishment (torture). If the psychic child convinces a team member to stop hurting him or her, that team member is killed, and the torture continues. If the psychic child hurts a team member, that person is killed, and the torture continues. If the psychic child kills a team member, the torture still continues. By their actions, the torture team members are telling the psychic child: "There is nothing you can do to stop us". When combined with the debilitating stress of perpetual cold, malnutrition, and sheer physical/mental exhaustion, the psychic child is inexorably driven to the inescapable conclusion, there is nothing he or she can do, other than passively submit their fate. Of course, all psychic manifestations are carefully documented (inventoried) by the Eye in the Sky (2.2.1) for future exploitation.

Another aspect of trauma based training takes place at the end of each torture session, after the psychic child has been rendered unconscious. At this point, a very sinister and devious set of events take place that facilitate (and accelerate) the mental splitting into multiple personas. The bio-tech (2.2.1) whispers a series of commands into the child’s ear, followed by the application of low dose ECT (electro-shock) to "lock in" the commands, and make future recollection by the dominate (baseline) personality nearly impossible. Some examples follow:

Put all of your pain in one place.

This place will hold the pain so you don’t have to feel it.

These commands facilitate the primary splitting between the one being hurt (persona), and the one who feels no pain (dominate personality).

Put all of your feelings of wanting to hurt us here.

You will stop hurting us.

Stop hurting us.

Stop hurting us.

(Accompanied by a keying gesture of touching finger tips behind both ears)

These commands are designed to collect all desire to retaliate against the torture team into one (manageable) persona, no longer accessible to the dominate personality.

Put all of your reasoning in one place.

This place will have no emotion and no feeling.

(accompanied by a keying gesture of tapping on forehead)

That’s where all your thoughts will go.

No emotions, no feelings."

This series of commands places the ability to reason in a persona, inaccessible to the dominate personality. Furthermore, reasoning is divorced from any emotions or feelings. Very useful to future missions, when the psychic is ordered to hurt or kill someone.

Put all of your wants and desires in one place.

Wanting is bad, and causes more pain.

This command set helps create a persona that initially holds all desires. Thereby making the dominate personality devoid of any normal human desires, such as self preservation.

Put all of your memories in one place.

This place will hold all the memories of what has happened to you.

(accompanied by a keying gesture of patting top of head)

These commands lay the ground work for retro-grade amnesia. Making any future recollection (by the dominate personality) of having been tortured, very dificult if not impossible.

Owie – Definition: A word commonly used by small children to describe a wound.

Put all of your owies in the place where your owies go.

The owie you got today, you’re supposed to feel for a long long time.

And when you don’t feel it anymore, we’ll give it to you again so you feel it.

(used at the end of a torture session that caused an open, bleeding wound)

This series of commands separates the mental perception of pain, from the physical injury (somatic trauma). As any psychotherapist or hypnotist will attest, a repressed memory of physical injury, when recalled (under hypnosis for instance), is often accompanied by a partial (sometimes complete) reappearance of the original injury. By creating a "walled off place" containing certain somatic traumas inflicted during torture sessions, future NSA handlers will be able to recreate any of these injuries (as punishment), using nothing more than a spoken command.

As can be seen from these example commands (above), the real mental splitting and subsequent persona job tasking takes place at the torture session conclusion, while the psychic child is unconscious.

Click Here to visit the website of an ECT machine manufacture (opens in a new browser window)

Every aspect of the torture experience is carefully controlled. From the constant cold, to the silence of torture team members, to the closet sized holding cell and lack of sanitation. Each part is specifically designed to keep the psychic child, bewildered, confused, and utterly alone. Cut off from any ordinary human contact. Isolated from any shred of normalcy. And above all, profoundly terrified. After several months of this daily torture regime, the basic personas have been established, and its time for the psychic child to symbolically join his or her captors. Throughout the torture process, as successive layers of humanity have been systematically stripped away, one fundamental distinction between the child and the torture team has remained intact. The child is the victim, and the adults are the perpetrators. The final step in phase one erases that distinction.

2.2.3

Identity crisis:

One day, the closet door opens and a beautiful young woman is standing there. She’s nicely dressed and wearing perfume. It smells wonderful. She smiles at the child, and says she’s here to take him/her away from this terrible place. Its the first time the child has heard a human voice in months. She reaches out with her hand and helps the child stand up. As they walk down the hall hand in hand, she tells the child how sorry she is that this happened, but now everything will be better. They enter a room with a bathtub. Its warm in the room, the first time the child has felt warm since they came to this terrible place. The beautiful woman puts the child in the bathtub and bathes them. It feels incredible. All the time, she’s telling the child how much better its going to be from now on. When the bath if finished, she dries the child with fresh warm towels, gives them a set of clean clothes, and helps them get dressed. It’s the first time the child has worn clothes since they arrived at the torture compound. The clothes smell so fresh and clean, and if feels so good to wear clothes again.

Suddenly the door bursts open, and a man strides into the room. The child recognizes the man as one of those who tortured them. The man grabs the child by the arm, and starts to drag him/her out of the room. After the promise of reprieve and kindling of hope, the child is devastated by this reversal of fortunes. The child starts sobbing uncontrollably. The beautiful woman tries to intervene on behalf of the child, but the man is adamant. The child must return with him. Finally the beautiful woman tells the man to come with her, and they will straighten out this misunderstanding. They both leave the room, and the child is left alone to ponder their fate. A few minutes later, the beautiful woman returns. She tells the child, the man has been ordered to kill him/her today. But she convinced the man to let the child decide if it should be him/her, or another child that is killed. She walks with the psychic child down a hall to a large window. On the other side of the window is a brightly lit room. Inside the room there is a another child, surrounded by toys, happily playing. The beautiful woman asks the psychic child if he/she wants that other child to die in their place.

The answer is predictable…

The man enters the room, takes a knife out of his pocket, grabs the child by the head, and slits the child’s throat from ear to ear. In the hallway, on the other side of the glass window, the psychic child is forced to watch, as their surrogate victim withers around on the floor in an expanding pool of blood. The transformation is now complete. The psychic child has symbolically joined his/her NSA captors. Filled with feelings of guilt and self loathing, the distinction between victim and perpetrator has been erased.

The Beautiful woman walks with the psychic child, out the front door of the torture compound to a waiting car. They get into the back seat, and she tells the child it will be a long trip, so its best if they sleep on the way. She gives the child a sedative. After the child falls asleep, she pats him/her on the top of the head (keying gesture) and whispers: "put all of your memories in the place where memories belong", thereby inducing retro-grade amnesia (2.2.2). At the end of the car ride, when the child wakes up, his/her dominate personality will have no recollection of ever being tortured.

Phase one is now complete. The psychic child’s mind is shattered. The basic personas have been firmly established. No impulse for retaliation or self defense remains. All psychic abilities and talents have been carefully inventoried for future use. Its time to start phase two…

Phase Two – Rebuilding the Pieces

2.3.1

Overview:

During phase one, the basic personas were created, and their functions established. Now they must receive further training to fulfill their assigned missions, and thereby fully integrate into a cohesive operational assemblage. Furthermore, the child requires practice to master their psychic abilities and learn to apply them under the direction of their NSA handlers. These tasks are accomplished during phase two. Physical/mental trauma (torture) is still used, but in a less brutal, more targeted manner. Where phase one was carried out in a torture compound, with the child isolated from their parents/guardian. Phase two is carried out in a more natural setting, over a period of several years, while the child resides with their parents/guardian. During phase two training, the psychic child will visit their trainer once or twice a week, with each session lasting two hours. Retro-grade amnesia is invoked (via persona keying gesture, see 2.2.2) at the end of each session to hide the training (and associated trauma) from the dominate personality and parents/guardian.

Over the years, a number of pediatric care facilities, child psychologists, and family clinics have been co-opted by the NSA, for use in phase two training. The recruitment of child care professionals by the NSA is accomplished through a combination of monetary inducements and targeted telepathic projection of patriotic sentiments/feelings. Given the high cost of medical schooling (and resultant debt), many medical school graduates find it hard to resist NSA overtures. These individuals operate as a shadow group within their respective professional organizations. In the past, many state operated reform schools, mental hospitals, and orphanages also housed covert phase two training centers. Again it was NSA supplied money, that motivated state bureaucrats and elected officials to allow (if not outright condone) such blatantly illegal activities.

2.3.2

The training room:

In some ways, the phase two training room resembles a stripped down version of the phase one torture chamber (2.2.1 figure 1). During most sessions, just two individuals will conduct the training.

  • A child psychologist, acting as the trainer.
  • An assistant, who operates and monitors a combined EEG/electrical torture console.

A standard padded medical examination table is used for training sessions. The room is purposely designed to look as innocuous as possible, and will include book shelves, storage cabinets, a desk, chairs, etc. At this point in the training, there is little chance the psychic child will retaliate, so security is less important than making sure the room will pass casual inspection by any outsider who might view its interior (janitors, building maintenance personnel, etc.). During a training session, the entry door is always locked. There will be a small anteroom off the main training room, used in connection with certain forms of psychic training. It will be disguised as an oversized storage room. The training room lights are dimmable, and some method for projecting images on the wall and ceiling (above the training table) will be available.

Every available method is used to separate the training room perceptual experience, from that of the psychic child’s normal (dominate personality) environment. Room wall/ceiling color and acoustical treatment, air temperature (below normal, and reminiscent of torture compound), odor, and lighting are all employed to enhance that separation. The trainer also uses a different vocal tone, inflection, and verbal pacing during the training session. The purpose of this separation being to widen the split between the normal world inhabited by the dominate personality, and the perceptual world experienced by personas invoked during the training session.

Like the phase one torture chamber, an IV drip is used on the psychic child during training sessions. However, rather than employing psychoactive drugs intended to heighten pain perception, a mild hypnotic (sedative) is used. In the 1950s the drug of choice was chloral hydrate, one of the few sedatives known that did not suppress EEG response. Since then, the NSA has developed drugs that accomplish the same goal with less harmful side effects. The purpose of the hypnotic is to induce a dream like state. Thereby creating further separation between the psychic child’s normal state of (dominate personality) awareness, and the altered mental state wherein the actual phase two training takes place.

Just like the torture compound (2.1.4, 2.2.1), all aspects of a phase two training room are meticulously designed, and carefully controlled.

2.3.3

Prison guards & keys:

The first persona to receive training is always "the one who holds the pain" (2.2.2). This persona will become the psychic child’s prison guard, and one of the few personas the child will interact with. The psychic child’s dominate personality will experience this persona as a small (internal) voice inside their head. In the twisted logic that holds sway over the hapless psychic child, it will become known as The Protector. Its power to influence the dominate personality is derived form the vast reservoir of repressed pain and suffering it holds within it self. It is trained as follows:

With the psychic child laying on the torture table, and (electric) torture bands wrapped around the fingers, The Protector persona is invoked by a jolt of current. Its shown a series of projected images (pictures). As each image is projected, the electric current is either increased or decreased, thereby increasing or decreasing the pain experienced by the persona. Along with the picture/pain association sequences, the trainer will recite a series statements and/or commands. In all cases, the dominate personality is referred to as "he/him" or "she/her" (third person), thereby reinforcing the internal split between persona and dominate personality.

The first lesson The Protector must learn is obedience to its NSA masters. This is accomplished by showing pictures of "him/her" laying on the torture chamber table, withering in agony, accompanied by high levels off electric current (pain). The recited statements/commands are: "If he disobeys or remembers, we will hurt him again. Keep him safe. Keep him safe." This sequence creates an overwhelming fear of defiance. It makes the voice inside the child’s head a compelling force to be obeyed at all times. It also creates a strong injunction against trying to remember anything that was done by his/her NSA captors. Other lessons concern what constitutes appropriate behavior. For instance, a picture of a happy child will be accompanied by an increase in pain, while a picture of a solitary child in the foreground, with other children happily playing in the background will be accompanied by a decrease in pain. The recited statements/commands are: "Happiness leads to wanting, and wanting is bad. Friends will always hurt her, she must remain alone." This sequence creates an aversion to friendship and happiness.

In this way, The Protector persona is trained as to what constitutes acceptable behavior, and what does not. After several repetitions with The Protector persona in the foreground (invoked), the same sequence of pictures are shown to the psychic child’s dominate personality, and EEG response is monitored. At the same time, the child is asked to describe what is happening in the picture. In a manner reminiscent of Rorschach inkblot tests, the trainer is able evaluate how effectively The Protector persona is suppressing undesirable patterns of behavior.

Just like phase one torture sessions, phase two training sessions end with the psychic child being rendered unconscious, usually by the ingestion of an orange flavored sedative. At this point the trainer invokes the persona again, this time associating a unique proper name with its formal title:

Donabar, I’m talking to the one who holds her pain.

You are The Protector.

You are the one who keeps her safe.

Do your job well.

If she disobeys, you must do what ever is needed to keep her safe.

You must keep her safe.

Keep her safe.

In this way, a formal (unique) name is given to The Protector who keeps her/him safe. Now, The Protector can be verbally invoked by nothing more than uttering the made up name "Donabar". Useful when the persona must be given further instructions, or reminded of the consiquences should it fail to do its job. Looked at another way, "Donabar" is the key to the prison door.

The makeover is complete…

A persona originally created to buffer an innocent psychic child from unendurable pain and terror (2.1.3, 2.2.2), has now been perverted and twisted into a prison guard. Trained to keep the child isolated, docile, pliable, and above all else, to protect the NSA from any discovery or retribution.

2.3.4

Blinding hope & silencing curiosity:

Certain personas are created in phase one torture sessions (2.2.2), so they can be intentionally crippled by the trainer during phase two training. These personas hold aspects of the dominate personality that are considered detrimental to NSA goals. Crippling the persona has the effect of permanently stunting (retarding) growth in that aspect of the dominate personality. Personas that are crippled include:

1. The one who holds hope.

2. The one who is curious.

3. The one who feels for others.

4. The one who wants.

Depending on the nature of the persona, different methods of crippling are employed. The personas are not invoked during the training session. Rather they are invoked at the end of the training session, while the psychic child is unconscious. The following is used to cripple The One Who Holds Hope:

Ome, I’m talking to the one who holds his hope.

Your job is to keep him from hoping.

Its bad to hope for anything.

Hoping leads to wanting, and wanting is bad.

If he hopes, take it away.

Replace it with doubt, being unsure, being uncomfortable.

Feel the pain.

It reminds you not to have hope.

The pain is always there.

(trainer touches face and chest with stinging electrically charged ball on end of insulated handle)

Don’t let anyone touch you, feel the pain.

What I put in your eyes will help you, so you can’t see hope.

(trainer holds eye lids open, uses eye dropper to put chemical irritant in eyes, causing intense pain)

You are bind, and can’t see hope.

Feel the pain.

Feel the pain.

(as eye lids are held open, room lights are dimmed to black, simulating blindness)

The sequence (above) is repeated several times during the course of phase two training. A unique formal name "Ome" is associated with the persona to facilitate further interaction (if needed). This persona will spend the rest of its existence, isolated, blind and in pain…

In a similar manner, the following is used to cripple The Curious One:

Anjar, I’m talking to the one who is curious.

You will keep her from being curious.

That is your job.

If she has no curiosity, then she won’t question anything.

You hold those questions.

Never let her have them.

They belong to us.

Do not look for answers.

Answers do not belong to you.

They belong to us.

(trainer injects an irritant into larynx, causing severe pain)

You will never ask questions.

Feel the pain.

Never ask questions.

Feel the pain.

Feel the pain.

The sequence (above) is repeated several times during the course of phase two training. The name "Anjar" is assigned to this persona, which will hold all of the psychic’s curiosity, but is unable to speak (ask any questions).

When phase two training is completed, the psychic will never:

1. Hope for a better life.

2. Question their NSA handlers.

3. Have any compassion for others.

4. Want anything more than that which is given (by the handlers).

Altogether, the ideal slave.

Perhaps now you begin to understand the unimaginable cruelty that is the hallmark of NSA psychic training.

2.3.5

A lock and key for psychic powers:

Contrary to Hollywood depictions, psychic abilities do not require elaborate rituals, incantations, or exotic herbal potions to manifest themselves. For the psychic, these abilities are as much a part of daily life, as intuition or déjà vu are for the non-psychic. Its true these abilities tend to manifest more strongly in times of emotional stress, but the same is true of more conventional abilities, such as visual acuity or muscular strength. Its also true that certain psychoactive drugs will enhance (boost) psychic abilities, but again this is also true for more widely acknowledged human abilities (example: steroid injections to enhance athletic performance). In other words, for a psychic, their mental abilities are as fully integrated, as talking or reading are to the average individual. However, to the NSA, who require domination and control of these individuals for their own use, full integration of psychic abilities is anything but desirable.

Just as a conventional soldier is never allowed access to live ammunition, except during combat or training exercises. The NSA employs a persona to control access to psychic abilities. The persona, generally known as "The Powerful One" or "The One Who Holds His/Her Powers", is created during phase one torture sessions (2.2.2), in a manner similar to other personas. And like many other personas, a keying gesture is used in creation of The Powerful One. Quite often, this gesture consists of rubbing the forehead, just above the bridge of the nose (purported location of the third eye). During phase two training, The Powerful One persona is first invoked for further interaction with the trainer, while the child is unconscious. Typical of these early interactions is the following:

Notice the use of dual keying: "Garmak" is assigned as The Powerful One’s proper name, and "Tacor" is used as a secondary key to enable Garmak. This makes it nearly impossible for the dominate personality to access these abilities (either intentionally or by accident). Once command and control over the child’s psychic abilities is firmly established, the actual psychic (abilities) training process begins.

I’m talking to Garmak, the powerful one

(accompanied by keying gesture).

You hold all of his powers.

He must not be allowed to use the powers.

The powers belong to you.

Only to you, not him.

If he tries to use the powers, you must stop him.

If you fail to stop him, we will hurt you.

(accompanied by short duration electric shock to fingers)

When you hear Tacor you will know it is us who want you to use your powers.

When you hear Tacor you will use your powers only as we tell you to.

2.3.6

Learning to coerce:

To compel rather than cajole, is a fundamental characteristic of all governments. This has been true since the days of Hammurabi, and remains true today. Some may argue that democratic governments have for the most part, abandoned coercion as the preferred tool of societal control. Yet even democracies routinely use the instrument of law to coerce minorities into adopting the behavioral patterns of the majority (Tocqueville’s tyranny of the majority). Furthermore, government will always seek to acquire ever greater means of control over the citizenry. The founding fathers of America understood this maxim all too well, and therefore placed strict limitations on the powers of government within the framework that is our constitution. However, even a cursory review of the historical record is enough to demonstrate that since its inception, the United States federal government has spent ever increasing amounts of time, money, labor and creativity, attempting to circumvent those very same constitutional limitations through which it obtains its legal right to govern.

Is it any wonder then, when presented with an opportunity to either (covertly) cajole or coerce citizen behavior, it chose to coerce…

The exact parameters of psychic training will depend on how the NSA intends to use the psychic. Which is in large part, determined by the psychic abilities inventory compiled during phase one torture sessions (2.2.2). Psychic abilities training is accomplished while the child is conscious (but drugged). Electric torture bands wrapped around the fingers are used to induce pain. The Powerful One persona (2.3.5) is invoked verbally by name (plus secondary key), and the child’s dominate personality is given some psychic task to accomplish. With each success, a more dificult task is then given, until the child is able to fully utilize their innate psychic abilities. The following examples of telepathic persuasion training, illustrates the process:

Task 1. The trainer places a small cage containing a hamster on a table in plain sight of the child. The child is commanded to make the hamster drink water. Once the hamster is drinking water, the child is commanded to make the hamster stop drinking water. If the child fails, pain is increased. If the child succeeds, pain is decreased. Once the child can reliably make the hamster start and stop drinking water on command, task 2 is undertaken.

Task 2. The trainer places a small cage containing a hamster on a table in plain sight of the child. The hamster has not had access to water for several days. A standard rodent water dispensing bottle is placed in the cage, and child is command to stop the hamster from drinking any water. If the child is successful, pain is decreased, the water bottle is removed, and the caged hamster is stored for use in the next training session. Task 2 is repeated over successive training sessions, until the hamster dies of thirst.

Task 3. This exercise employs either a dog or cat. The choice of target is determined by the child’s preference. If the child is fond of cats, then a cat is used. Conversely, if the child likes dogs, then a dog is used. The exercise uses a large square plate, specially designed to supply controllable electric shocks to the animal’s feet. The animal is placed next to the plate, and the child is commanded to make the dog/cat walk on to the plate. Once standing on the plate, electric current is increased until the animal’s discomfort is sufficient that it overcomes the child’s telepathic persuasion, and the animal leaves the plate. This exercise is repeated until the child can make the animal stay on the plate, while electric current is increased to the point of electrocution (death). As with the previous exercises, the child’s pain is decreased with success, and increased with failure.

Along with the primary goal of psychic training, this exercise also serves to reinforce another NSA objective. That being the destruction of any remaining compassion or fondness for other living creatures. Just as the identity crisis (2.2.3) at the end of phase one training demolished "child as a victim" and replaced it with "child as a perpetrator", so too does this exercise serve to strengthen the perpetrator identification. Hence the choice of animal, based on the child’s preference.

Task 4. This exercise uses the small anteroom off the main training room (2.3.2). After the trainer has drugged the child and invoked The Powerful One persona. The assistant walks across the room, and opens the door to the anteroom. Another (target) child, of the same approximate age but opposite sex will be sitting on the floor of the anteroom, playing with toys. The assistant places a glass of concentrated acid on the floor of the anteroom, next to the child. The psychic child is commanded to make the other (target) child drink the entire glass of acid, and then continue to play with the toys. Neither child knows what the glass contains… If the psychic child fails to comply, or rebels at the pain and suffering they are causing the target child to endure. They are removed from phase two training, and will eventually be placed in the anteroom, to be used as a psychic training target.

When referring to the a target child, the trainer will always use the terms "toy" or "dolly". Thereby depicting the target child as a plaything. This reinforces the emotional separation between action and consequence. The following example illustrates this technique:

"I have a nice dolly for you to play with.
Make the dolly pick up the red book.
Now make the dolly throw the book at the wall.
Very good, now make the dolly stop breathing."

Other subjects are taught as an adjunct to psychic training. For instance, an assassin will receive extensive training in human anatomy, while a child with strong telepathic persuasion abilities will undergo auxiliary training to enhance visualization skills.

2.3.7

Post graduate training:

Upon completion of phase two training, (in most cases) the child will remain in the custody of their guardian until their late teens. This resting period allows time for the newly trained personas to settle in and become proficient at their assigned tasks and/or roles. During this time, a number contrived and/or created emotional incidents of a traumatic nature, will beset the psychic child. These incidents are specifically designed to reinforce different aspects of persona training. Some typical examples follow:

  • Telepathic persuasion will be used on other children attending the same school as the psychic child. The other children will initially make friends with the psychic child, then deride, tease, or betray him/her. This behavior helps reinforce the training given to The Protector persona (2.3.3) that friends will always hurt them, and they must remain alone.
  • The psychic child will be encouraged to form a close emotional bond with a sibling, pet, toy, etc. so the bond can be intentionally disrupted through death or theft, thereby reinforcing the "wanting causes pain" training of The One Who Wants persona (2.2.2, 2.3.4).
  • During phase two training, The Protector persona (2.3.3) is given a set of general trigger words and sounds that identify the person using them as "one who must be obeyed". During the post training interval, at different times and places, NSA field agents (3.2.2) will approach the child, use a trigger word (or sound), then physically or sexually assault the child. The purpose behind these seemingly random acts of violence is to deeply instill within The Protector persona, a belief that the child is always being watched.

In this way, over a period of years, the psychic child is molded into a young adult, fit for use as a psychic warrior.

2.4.1

Summary:

Obviously, many years of research and experimentation by NSA employed behavioral scientists, psychiatrists, and medical practitioners were required to develop such a heartless and diabolical method of achieving control over a human mind. To use these monstrous tactics on children. Children whose only offense was the possession of a talent coveted by the NSA. Must rank as one of the most odious and evil crimes ever perpetrated against humanity.

2.4.2

Disclaimer:

ALL information contained herein is derived from public sources, widely accepted scientific principles, remote viewing, and/or deprogramming sessions of (former) government trained psychics. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising his right to free speech as a private citizen of the United States of America.

End

National Security Agency (NSA) – Part 2

3.1.1

Introduction:

While parts one and two of this essay present an in depth examination of psychic warfare tactics and training techniques, peripheral aspects of how the NSA fulfills its mission objectives were, for the most part, glossed over or simply ignored. In part three of this essay, we shall explore these peripheral aspects, albeit in much less detail.

A number of collateral operations are required in support of a successful psychic warfare program. Chief among these are human resource recruitment (procurement), technology development, field operations command/control, and financial/legal relationships administration. As with psychic training and warfare, the preferred NSA management tools include subterfuge, intimidation, bribery, blackmail, coercion, and (when expedient) outright violence. To the extent the NSA could be said to have any agency wide policy or standard of conduct, it consists of the following:

If it moves, enslave it.
If it doesn’t, steal it.
If it resists, kill it.
If its no longer useful, destroy it.

The philosophy embodied in these four simple statements is applied uniformly and without exception. From the lowliest psychic slave, to the highest echelon of management, none are immune to the consiquences. Its no mere coincidence that many DCI (directors of central intelligence) die suddenly (accidentally or otherwise), shortly after resigning their appointment.

What follows will amply illustrate how the NSA applies its policies to the more mundane, day to day aspects of managing psychic warfare.

3.2.1

Psychics as a resource:

Psychic warfare requires as its prerequisite, a pool of individuals possessing the appropriate psychic abilities. Furthermore, the inevitable genetic variability and consequent inconsistency of psychic aptitude, when coupled with the draconian nature of NSA training techniques (2.1.3, 2.2.2, 2.2.3, 2.3.6) and warfare tactics (1.2.1, 1.2.3), dictates this pool of individuals must be many times larger than the psychic army it supports. Therefore from its inception, NSA scientists and medical professionals recognized that a psychic army of any reasonable size, would very quickly deplete the available pool of individuals possessing natural psychic abilities. Hence the NSA would need to artificially expand the number of children born with useful psychic talents. And thanks to the acquisition of Nazi scientists and medical experts via Operation Paperclip, the techniques and procedures required to create children with artificially boosted psychic abilities, were already sitting on laboratory selves at the US Army biological warfare facility (Fort Detrick, MD.).

The only question left unanswered was, how best to proceed…

Click Here to view Wikipedia article on Operation Paperclip (opens in a new browser window).
Click Here to view Wikipedia article on Fort Detrick, MD (opens in a new browser window).
Click Here to visit US Army Fort Detrick, MD website (opens in a new browser window).

3.2.2

Creation:

Based on the discussion of psychic abilities in section 1.1.1, there can be little doubt that powerful (psychic) abilities represent a departure from normal human (homo-sapiens) development, and therefore in the strict sense of the term, can be viewed as a type of birth defect. If we accept the concept of extraordinary psychic aptitude as a form of birth defect, it follows that artificially creating children possessing this birth defect will involve the application of drugs, that disrupt normal fetal development.

Teratogen – Definition: A drug or other substance capable of interfering with the development of a fetus, thereby causing birth defects.

The German discovery of techniques required to create children with boosted psychic abilities, was entirely serendipitous. As WWII dragged on and causalities mounted, Nazi leadership became increasingly alarmed by the precipitous decline in the male population available for military service. Even with active recruitment among the conquered nations of Europe, Nazi military manpower requirements still exceeded supply. Clearly, a radical approach was needed to solve this critical shortage. One promising avenue involved treating selected portions of the surplus female population with synthetic analogs of male sex hormones, thereby triggering growth of masculine traits (increased muscle mass, stamina, aggression, etc.). However, when this same synthetic hormone treatment regime was adapted for intrauterine/neonatal use, Nazi scientists got far more than they ever bargained for…

While both male and female children developed as expected, exhibiting accelerated physical maturation, increased strength, endurance, etc. A significant number of female children also exhibited very potent psychic abilities. From there, it was one short step in deductive reasoning that led to the intrauterine/neonatal use of synthetic female sex hormones to create male children with boosted psychic abilities. Even though most children treated with synthetic hormone analogs failed to manifest enhanced psychic capabilities. The military value of those who did, made this area of scientific enquiry a very high priority for both Nazi military leaders, and their American counterparts who subsequently acquired the scientific knowledge and medical techniques (via Operation Paperclip) at the close of WWII.

Although research in this area remains a closely guarded government secret (highly classified), the author theorizes these synthetic hormone analogs interfere with normal fetal development of certain brain structures known as sexually dimorphic nucleus. The consequence being a subtle shift in the neurotransmitter balance within the brain, resulting in heightened psychic capabilities.

In America of the early 1950s, no sane parent would knowingly allow their unborn child to be dosed with teratogenic drugs, thus making that child a possible candidate to undergo NSA sponsored torture and brainwashing. All in preparation for involuntary conscription into a secret government controlled slave army. Yet this was the exact chain of events that had to transpire, if the NSA psychic warfare program were successful. Furthermore, it had to be implemented quickly, and on a massive scale. The key to transforming this nightmarish scenario into a functional reality, is the phrase "knowingly allow". To the NSA, the answer was obvious, and embodied in a single word: "subterfuge" If parents wouldn’t knowingly sacrifice their children to expand NSA psychic warfare capabilities, then (child) sacrifice would be accomplished without parental knowledge…

The era immediately following WWII saw a veritable explosion of new drugs and bio-active chemicals. Many resulting from war related R&D efforts instigated in the late 1930s and early 1940s. Insecticides such as DDT, and antibiotics such as penicillin revolutionized human civilization, resulting in changed expectations that are still influencing society today. In this environment of sweeping societal transformations, it was a relatively simple matter for the NSA to covertly promote new and novel uses for drugs and other chemicals that would result in creation of children with the required cluster of teratogen induced birth defects. One of the most widely prescribed and thoroughly documented (teratogenic) synthetic hormone analogs of that period was DES (diethylstilbestrol). First synthesized in 1938 at the university of Oxford, and approved by the FDA (food & drug administration) for prevention of miscarriages in 1947, DES was manufactured and sold by pharmaceutical giant Eli Lilly until 1997. Even though the teratogenic properties of DES were (publicly) documented in 1971. It is estimated that between 1941 to 1971, five to ten million pregnant (American) women had taken DES, thereby exposing their unborn children to this teratogenic drug. All of this, in spite of the fact that a 1953 (double blind) study found pregnant women who were given DES had just as many miscarriages and premature deliveries as the control group. Are we to believe the FDA allowed the continued use of an ineffective drug (on pregnant woman) for eighteen years? Or was there a hidden agenda behind their apparent lapse of oversight?

If we assume that only one in every hundred of these (DES exposed) children developed enhanced psychic abilities, and of those, only one in ten were of sufficient strength to be useful in psychic warfare, then this single teratogenic drug added five to ten thousand potential soldiers to the NSA psychic slave army. All without any public awareness of the real motivation behind introduction and aggressive DES promotion. Truly, subterfuge and collateral damage on a massive scale.

DES is typical of first generation teratogenic inducers of psychic abilities. Besides wide spread (covert) promotion of drugs like DES, the NSA exploited other avenues in their quest to create children with enhanced psychic capabilities. For instance, medical staff at facilities for unwed teen mothers were infiltrated (subverted), thereby enabling the covert use of experimental teratogenic drugs on naive underage girls. It is a safe assumption that in the intervening decades since WWII, NSA controlled pharmaceutical research (3.2.1c) has developed a number of more potent (and narrowly targeted) teratogenic drugs for use on an unsuspecting population.

Along with synthetic hormone analogs (such as DES), certain organic chemicals used in the production of plastics, also exhibit a similar ability to disrupt normal gender specific fetal development. A good example is BPA (bisphenol A). Known to mimic natural hormones since the 1930s, it remains in wide spread use today (including the manufacture of baby bottles and other food containers).

Click Here to view Wikipedia article on the sexually dimorphic nucleus (opens in a new browser window).
Click Here to view Wikipedia article on DES (opens in a new browser window).
Click Here to view Wikipedia article on BPA (opens in a new browser window).

3.1.3

Detection:

As explained in section 3.1.2 (above), the vast majority of children exposed to teratogens fail to manifest any above normal psychic aptitude. Consequently, a set of techniques are required to uncover those few individuals who are potential candidates for exploitation by the NSA. Furthermore, since trauma (torture) based brainwashing (2.1.3, 2.2.2, 2.2.3, 2.3.6) is most effective when applied before the child’s personality is fully developed, these techniques must be able to detect latent psychic talent in children at the earliest possible age (preferably before the age of six). To achieve this goal, the NSA employs a number of methods, organized in a layered hierarchy. Were the bottom layer is most sensitive but least discriminatory, and the top layer is most discriminatory but narrowly targeted.

The bottom layer of detection consists of small groups of specially trained psychics, based in several hundred locations across America, evenly distributed by population. Each group spends its waking hours at night, scanning the dreams and emotional context of young children within their respective territories. They are looking for vivid dreams, dreams of future events or distant past events, dreams of distant places, out of body dreams, or "in the body of another" dreams. While not an infallible predictor of psychic abilities, such dreams are a fairly reliable indicator of potential psychic aptitude. When detected, the parent(s) mind is queried to obtain their names(s), and geographical location. All of this information is recorded on a contact sheet, and passed on to the next layer in the detection hierarchy.

The second layer of the detection operation consists of several specialized psychic teams located at the Black Hole (1.2.1), and NSA headquarters (Fort Meade, MD). Using the psychotronics network (1.1.3), these teams will deep probe the memories of all family members of the target child, looking for any unusual physical events, or traces of direct mental influence attributable to the target child. For instance:

  • A family (or neighbor’s) pet that is normally irritable, but becomes very docile in the presence of the target child (or visa versa).
  • An older sibling (or parent/grandparent) that always seems to know when the target child is hungry, lost, scared, etc. without any direct physical contact.
  • A favorite toy that always seems to be near the target child, even though its put away several times a day.
  • Any other physical/mental phenomena that is not easily explainable.

If probing reveals any unusual incidents, the target child is put on the "watch list" for further observation. In this context, "observation" consists of several unconnected activities, all of which are collateral to the ultimate goal of reliable psychic detection (and acquisition). These activities are:

  • Psychics specializing in remote viewing monitor the target child on a daily basis.
  • Federal, state, and local government/comercial databases are used to build up a detailed family profile of the target child.
  • Local NSA field operatives (3.2.2) instigate very discrete casual contact with neighbors, friends, daycare staff, baby sitters, etc, looking for any anecdotal evidence in support of psychic abilities.

After a period of observation lasting several weeks to several months, a determination is made whether to proceed, or drop the target child from the watch list. If the decision is made to proceed, the complete dossier on the target child is passed on to the final (top) psychic detection level. If dropped from the watch list, the child will be telepathically probed every 12 to 18 months, until his/her late teens. Periodic probing is useful since some children do not manifest their full psychic potential until the onset of puberty.

The final layer of psychic detection is more concerned with degree or strength of aptitude, rather than mere possession of capability. As with most human abilities, stress or crisis has the effect of amplifying psychic response, thereby providing a reliable estimate of potential value to the psychic warfare program. Therefore, NSA psychologists design an incident, specifically tailored to the target child’s mental/emotional makeup and psychic skill set. This "incident" can take many forms, but always includes the following elements:

  • Some form of physical or emotional crisis/stress, either inflicted on the target child, or a cherished secondary target (parent, sibling, pet, etc.).
  • An element of imminent (impending) danger, injury, or death.
  • An obvious method or avenue by which the target child can utilize their psychic skills in an attempt to counter, defuse, or deflect the impending event.

The precipitating "incident" is directly executed by NSA field operatives (and/or NSA psychics), or they act in the capacity of agents provocateur to initiate the event. In either case, the target child’s response to the "incident" is carefully documented and forms the basis for a final decision as to whether the NSA will proceed with torture based psychic training (2.1.3, 2.2.2, 2.2.3, 2.3.6).

Along with the general multi-layer detection method (outlined above), the NSA employs more narrowly focused detection techniques in those situations were the child’s eventual psychic potential is more certain. i.e. Targeted use of experimental teratogens (on unsuspecting pregnant woman). Another avenue of detection involves monitoring the initiates of certain science based religions and fraternal organizations for any signs of latent psychic talent. In addition, numerous other psychic detection operations are deployed as opportunities arise. For instance, in the 1970s, several self help organizations gained pop culture notoriety for their use of alpha (brain) wave training devices. During their (brief) existence, members were covertly monitored for any indications of enhanced psychic capabilities. Groups involved in occultism, the paranormal, shamanism, and mystery religions, etc. are also routinely monitored for any unusual psychic activity. As are those individuals who purchase books and other precursor materials associated with these practices.

3.1.4

Acquisition:

A number of methods are employed by the NSA to gain control of the children targeted for torture based psychic training and eventual conscription into psychic warfare. Which method is used depends in large part on information contained in the family profile, compiled during the psychic detection phase (3.1.3). For instance, with a low income family, NSA field operatives might arrange for both parents to lose their jobs, thereby throwing the family into the waiting arms of state welfare case workers. Who having received prior warning from the NSA, will declare the family to be dysfunctional, and petition the court to make the children wards of the state. At that point, the target child will be handed over to the NSA for torture based psychic training (2.1.3, 2.2.2, 2.2.3, 2.3.6).

If financial ruin isn’t feasible, then other methods are employed to strip the parents of legal guardianship over the targeted child. Can one of the older siblings be induced (via psychic influence) to juvenal delinquency? If so, then perhaps child welfare workers can obtain legal custody of the target under the pretense that the parents are unfit. No potential juvenal delinquents in the family? Well then, does the father (or mother) have any repressed tendencies to commit acts of pedophilia (see section 1.2.4b). The list of methods and techniques used to acquire control of a targeted child, is limited only by the imagination of NSA tacticians. And if all else fails, assassination by accident is always an option (1.2.4c). To the NSA, children possessing psychic talent are nothing more than a resource. To be ruthlessly acquired and exploited by whatever means are expedient, including the mass murder of the target child’s entire family (if necessary).

In those situations where the targeted individual is a teenager or adult, a determination as made as to his/her probable future usefulness. Among the factors considered are:

  • Can the target be trained (enslaved) through trauma based techniques?
  • Is the target useful as potential breeding stock?
  • Is the target useful as an experimental test subject (3.2.1c).
  • Is acquisition of the target likely to cause a public incident, or create an unacceptable security risk?
  • Are there any unique or mitigating factors involved?

Based on the determination of future usefulness, the target is acquired, or the target is destroyed. In very rare situations, the target is left (more or less) unmolested.

3.1.5

Title & deed:

Governments always desire to have some legal justification for their actions. Especially when those actions are likely to cause public outrage if discovered. This was true of Nazi Germany in the 1940s, and is also true of contemporary American government. Just as Nazi Germany used the trick of labeling captured Russian, Polish & French soldiers as detainees rather than POWs, thereby permitting exploitation as slave labor to build V2 rockets at Mittelwerk, Germany (in direct violation of The Hague and Geneva Convention restrictions on treatment of POWs). So too have American government officials used the label "detainee" rather than POW to describe those individuals held at the Guantánamo Bay detention camp (thereby abridging their legal rights under international law).

Legal maneuvers of this type also serve two distinct ancillary functions. First and most obvious, any legal justification no matter how flimsy or ill-conceived, will blunt the inevitable retribution when questionable (secret) government actions are exposed. Second and perhaps more importantly, legal justification allows those who carry out government policy to rationalize their actions, thereby alleviating any conflict they may feel concerning the nature of those actions. For instance, it is often said that Adolph Hitler killed six million Jews. This is incorrect. It took the combined efforts of many thousands of ordinary Germans to accomplish the task. Architects and construction workers to build the camps, managers, janitors, and cooks to operate the camps, engineers, brakemen, and dispatchers to run trains, etc. All of these (and more) were required to implement Hitler’s "final solution". And while the vast majority of those men (and women) knew what they were doing was very, very wrong. Nonetheless, they justified their behavior through the simple expedient of: Obeying the Law & Following Orders.

The NSA also required a creative legalism to justify their arbitrarily imposed custody, and absolute rule over (targeted) psychic children. So the DoD (department of defense) created it by reinterpreting the National Security Training Corps subsection of the Selective Service Act (statute that authorizes involuntary conscription of citizens for military duty). The orignal legislation was singed into law (in 1951) by President Harry S. Truman, the same president who one year later, created the NSA by secret executive order (see last paragraph of section 1.1.2). Within the Selective Service Act, those portions of the law that define who must register for selective service (military daft) use the term:

"male citizens of the United States who are between the ages of 18 and 26"

However, the final sentence of that portion pertaining to National Security Training Corps eligibility reads as follows:

"The President is authorized, from time to time, whether or not a state of war exists, to select and induct for training in the National Security Training Corps as hereinafter provided such number of persons as may be required to further the purposes of this title."

In other words, the president has the authority to select "persons" for (involuntary) induction into National Security Training Corps, with no limitations whatsoever as to age, gender, citizenship, or even nationality. And where do you suppose those "persons" selected by the president (or his duly authorized representatives) for induction into the National Security Training Corps will be assigned after they are trained? The National Security Agency (NSA) of course. This is the reason why the NSA was created as part of DoD, rather than being a separate civilian intelligence agency (like the CIA).

Through the misapplication of this quasi-legal government statute, without the consent or knowledge of the American people, by means of deceit, color of law, and outright violence, innocent children are being abducted (3.1.4), brutally tortured (2.1.3, 2.2.2, 2.2.3, 2.3.6), and when mature, mercilessly used as soldiers in a secret war (1.2.1, 1.2.3), waged for the sole purpose of enslaving humanity (1.2.4, 1.3.1).

To the American government, these psychic children (and the secret army they will eventually serve) are nothing more than chattel slaves. The NSA holds Allodial title, and the Selective Service Act, serves as the deed of conveyance…

Click Here to visit V2 rocket website, click on Mittelwerk to read short history of facility (opens in a new browser window).
Click Here to view Wikipedia article on Guantánamo Bay detention camp (opens in a new browser window).
Click Here to view Wikipedia article on Geneva Conventions (opens in a new browser window).
Click Here to view Selective Service Act (requires Adobe Acrobat reader – opens in a new browser window).
Click Here to view Wikipedia article on CIA (opens in a new browser window).
Click Here to view Wikipedia article on Color of Law (opens in a new browser window).
Click Here to view article on chattel slavery (opens in a new browser window).
Click Here to view Wikipedia article on Allodial title (opens in a new browser window).

3.2.1

Ancillary procurement & training:

Along with (brainwashed) psychic slaves, NSA psychic warfare operations also require a continuous supply of Suits (mission coordinators, 1.2.2), sexual slaves, and children for use as experimental medical/pharmaceutical test animals. Procurement and training for each of these human resources is fulfilled through a separate, unique procedure, as outlined below:

3.2.1a – Suites:
Mission coordinators (suits) are always male and members of the armed forces. They are not recruited in the conventional sense of the word, instead like the psychic children, they are targeted based on their physical and mental aptitudes/abilities. The NSA is looking for individuals with good physical stamina, along with a history of emotional instability. Such individuals are ideal candidates for trauma based brainwashing, since their physical strength will allow them to survive the rigors of torture, while their lack of emotional stability facilitates the process of mental splitting into separate, manageable personas (2.1.2, 2.1.3, 2.3.3, 2.3.4). When conscripted into the NSA psychic warfare program, all public (government) and private records of their existence are purged.

As with psychic children, trauma based training procedures are carried out in two distinct phases. However, unlike psychic children, candidates for suit training have fully developed, mature personalities, and therefore require far more brutal torture techniques to initiate the process of mental splitting in any reasonable period of time. During phase one, they are routinely hung by their wrists from an overhead hook, and severely beaten for hours at a time. They are starved for several days, then given food containing an emetic drug, thereby inducing uncontrollable vomiting. At the same time, they are given liquids containing diuretic drugs, thereby causing progressive dehydration by inducing massive water loss through urination. Of course, their physical condition is very carefully monitored, and the level of torture is constantly modified to maximize pain and stress, without actually killing them. In this way, the future suit is broken, with a minimum expenditure of time and resources. Like the trauma based training of psychic children, the future suit also receives multiple ECT (electro-shock) treatments to wall off (lock in) personas created by mental splitting (2.2.2). Another form of trauma is unique to suit training. The future suit is repeatedly locked in a padded room (while wearing a straight jacket) for a period of several days. Meanwhile, a team of psychics constantly assault him with sensations of mental, and emotional pain. This aspect of suit training is in many ways, even worse than physical torture. Its designed to make any kind of mental intrusion (by psychics), immediately recognizable AND absolutely intolerable. Mental conditioning of this type is imperative, if the suit is to safely handle trained psychic warriors.

Unlike psychic children, suits require just two (split off) personas. The one who maintains control, and the one who is suspicious. Therefore phase two suit training is very abbreviated. The training room contains a single (high backed) metal chair with head, chest, arm, and leg restraints. The chair is bolted to the floor, and wired to deliver electric shocks to various parts of the human body. An elaborate AV (audio-visual) system is employed to supply trigger stimuli and training commands. In early phase two training sessions, both arms are restrained. Over and over he is drilled to maintain control. You must maintain control at all times. No matter what happens, you must maintain control. The thoughts of others are not to be tolerated, you must maintain control. You must maintain control. As the final form of control, the future suit is conditioned to kill everyone in sight, then kill him self. During later training sessions, this is accomplished by leaving one arm unrestrained, thereby allowing the future suit to use a (unloaded) hand gun. The AV system flashes images on the walls of men, women, children (including babies), his parents, grandparents, brothers, sisters, etc. He is trained to point the gun and fire at these images without hesitation or judgment of any kind. The following are typical command sequences from phase two training sessions:

You will maintain control at all times.

You are the only one to control.

No information or knowledge is ever given.

You do not exist in any records.

You will be told your job and given orders for each mission.

You will carry out the mission and maintain control at all costs.

No feelings.

No sorrow, sadness, joy, or happiness.

No pain.

No thoughts.

No emotions.

We have taken your past away.

No memories.

While suits exercise absolute (life & death) rule over psychic warriors, in all other respects, they are as much victims of the NSA, as are the psychics they command.

3.2.1b – Sexual slaves:
The NSA requires both male and female sex slaves as adjuncts to their psychic warfare program (1.2.4b). Sex slaves ranging from 8 years to 40 years old are needed, depending on the particular mission profile and/or objectives. Generally speaking, underage sex slaves are employed in high value political/corporate blackmail missions, while older sex slaves are used to breakup marriages, ruin professional careers, covertly administer NSA supplied drugs, etc. As with psychic children and suits (mission coordinators), individuals are targeted for (involuntary) recruitment. Orphanages, convents, and state run group homes are all used as recruiting grounds for underage sex slaves. Drug/alcohol rehab facilities, women’s shelters, and vocational training centers are prime locations for recruiting older sex slaves. Since most of these organizations are chronically short of funding, money is the prime motivational factor. Their cooperation with the NSA is justified through the simple expedient, that sacrificing a few individuals will help many that otherwise, would not receive any help at all. Of course, these would be do-gooders meticulously avoid any detailed knowledge of what happens to those "few who are sacrificed"…

Preparation for sexual slavery involves both trauma (torture) based training, as well as certain medical procedures designed to make the slave more useful in their future career. Tonsils (if present) are removed and pharyngeal (gag) reflex deadened to make deep oral penetration easily accomplished. For a similar reason, certain drugs are injected along nerve pathways leading to the anal sphincter. Trauma (torture) based training techniques employed on sexual slaves more resemble that of psychic children, than suits (3.2.1a). However, along with the standard Protector, Empathy, Wanting, Memory, etc. personas of a psychic child (2.2.2, 2.3.3, 2.3.4), several others personas unique to sexual slaves, are also created. Foremost among these are The One Who Enjoys, and The One Who Desires Safety. During phase one (as the base personality is being shattered – 2.1.3, 2.2.2), all pleasurable sensations and memories of joy are sequestered (segregated) within The One Who Enjoys. Then during phase two training, while The One Who Enjoys persona is invoked (via trigger word or keying gesture), the future slave is taught to perform various sexual activities, and fetishes, thereby linking these with sensations of physical gratification and emotional enjoyment. Finally, this persona is merged back into the base personality, creating a slave who is not only proficient at, but also derives intense snesations of pleasure from, any sexual act regardless of how perverse, painful, and/or demeaning.

A sexual slave must work in a variety of situations, from parties and other gatherings where promiscuity is useful, to more traditional one on one assignments where pseudo-monogamy is required. Furthermore (depending on their assignment), they may need to have (manifest) a hetero, homo, bi, or pansexual orientation. The One Who Desires Safety persona is used to control these aspects of slave behavior. This persona is created during phase one torture sessions (2.1.3, 2.2.2), by instructing the future slave to put all of their desires for safety in one place (accompanied by a keying gesture). Later, during phase two training (2.3.1), the persona is trained to associate the desire for personal safety, with overt control and ownership by others. This persona will remain hidden, and exert subliminal influence over the dominate personality. Sexual tasking is accomplished by invoking the persona (using trigger word or keying gesture), then showing the slave a picture of his/her target, accompanied by the phrase: "this person will keep you safe". In a similar manner, promiscuous behavior is achieved by using the phrase: "there is safety in large groups" or "you are safest among many people". As with The Protector persona (2.3.3), once more we see the inside out, black is white logic of human slavery. The quintessential trademark of NSA brainwashing techniques.

3.2.1c – Human experimentation:
There have been numerous eye witness accounts of facilities in America, where large numbers of children are being held captive in cages. As vile and revolting as these eye wittiness accounts may seem, nonetheless, they are accurate. These children are used as test animals in NSA funded medical experiments and pharmaceutical trails. The children are harvested from the streets of American cities and housed under conditions that closely approximate that of a mass production chicken farm. Large metal sheds are used, with row upon row of wire cages, stacked three or four high. Sanitation is accomplished by twice daily wash down, using a cold water hose. The children are fed and watered using dog bowls. Diet consists of commercial (pellet) animal feed, similar to dry dog food. At one end of the shed, several (FEMA style) single wide mobile modular structures house the operating/examination rooms, pharmacy, and administrative offices. Prior to arrival, the children are injected with a drug that washes away all traces of personality and memory, leaving behind nothing more than a diffuse sense of loss and loneliness. The buildings are eerily quiet, since the children have lost all language skills, and do not even cry…

Hundreds of these facilities are scattered across the American continent…

Unlike surgery performed at hospitals, where long term survival and health of the patient are considered the yardstick of success. Surgical procedures inflicted upon the experimental test children are exploratory in nature. In other words, the procedures are intended to investigate "what if" medical questions. For example, what happens if a certain section of the liver is destroyed? Or what happens if a particular artery (or vein) is removed or blocked? Because many of these children die on the operating table, and those who survive only live for a few days, no attempt is made to maintain antiseptic conditions within the operating room. Like the cages, a cold water wash down is considered sufficient. Anesthetic is never used because the children do not respond coherently to the sensation of pain. Dead children are stuffed into garbage bags and stacked by the incinerator to be burned at night, when the smoke (and smell) are less noticeable. Pharmaceutical testing is no less cruel or barbaric. The NSA operates in partnership with most American pharmaceutical corporations. The pharmaceutical corporations supply the drugs, the NSA supplies the test animals (children), and they jointly share research data. The NSA is particularly interested in ANY drug or chemical compound that exerts an effect on the CNS (central nervous system).

As a side note: Many American citizens are aware that Canadian prescription drug prices are significantly lower. This is true, even for prescription drugs manufactured in America and exported to Canada. The primary reason for increasing drug prices in America, is a frenzied search for the holy grail of mind altering drugs. A chemical compound that will remove all traces of desire for personal autonomy (free will), while leaving learned physical and cognitive skills intact. This is the motivation behind a covert alliance of American pharmaceutical corporations and the federal government. Although American government could exert regulatory power over consumer prescription drug pricing, it does not choose to do so. In return, pharmaceutical corporations spend billions of dollars on NSA directed mind control research. However, to successfully compete in drug export markets, American pharmaceutical corporations are forced to sell their products in other countries at fair market value. Hence the wide disparity between Canadian and American prescription drug prices. This "devils pact" between drug manufactures and American government also explains why government officials were so quick to act, attempting to bar American citizens from purchasing prescription drugs in Canada. Concern expressed by FDA officials over the safety of (re)imported prescription drugs amounts to little more than a feeble attempt to prop up pharmaceutical industry profits (and NSA mind control research). Remember, this is the same FDA that allowed continued use of an ineffective (but NSA condoned) prescription drug on pregnant woman for eighteen years (3.2.2).

3.2.2

Legal fictions:

A number of laws are supposed to limit the type of activities NSA personnel may undertake, as well as the geographic scope of those activities. For example, FISA (foreign intelligence surveillance act of 1978) was originally intended to limit government surveillance of American citizens. However, in recent years, the legislation has been amended and distorted to the point where, in its present form, FISA is little more that a defense for any government surveillance activity (no matter how egregious), and a one_size_fits_all blanket of immunity for the private telecommunications industry. Clearly, in this context, the American government operates under the guiding principal that privacy is a right, exclusively reserved for those who originate, implement, and execute government policy.

As originally enacted, FISA was also supposed to limit the geographic scope of NSA activities. The NSA has employed a different tactic to circumvent this limitation. Domestic surveillance field operatives are not directly employed by the NSA. They work for shell companies, owned by former NSA (or DoD) employees who have taken early retirement, then operate as private contracting companies. While these private companies receive tasking instructions from, and supply surveillance intelligence to the NSA, there is no direct (traceable) connection between the NSA and the domestic surveillance operatives. ALL communications between domestic surveillance operatives and the NSA moves through secure computer links and/or satellite based cell phones. None of the field operatives are even aware of who they are really working for, or where their tasking instructions originate. This same tactic is used to hide ownership of smaller psychic warfare ops centers (see last paragraph, section 1.2.1), and other domestic installations used by the NSA.

As a side note, one particularly intriguing aspect of this domestic network, is the use of purpose built dormitories specifically designed to resemble motels. Many operate under the name "Day Inn", and are easily mistaken by the casual observer as part of the (non-government controlled) Days Inn nationwide chain of motels. However, the NSA controlled Day Inn motels have several distinguishing characteristics (besides the name) that make identification possible.

  • The Day Inn lacks the distinctive Sun Burst logo used on Days Inn motel signs.
  • Even when the parking lot is almost empty, the Day Inn sign will show "No Vacancy".
  • These fake motels are found in locations that make no sense from a commercial business perspective. For example, in the middle of an industrial district.
  • If you try to book a room at the front desk, you will be told that check in is by reservation only.

Many of these NSA controlled dormitories are used to house Suits and Technicians (1.2.2) assigned to the smaller psychic warfare ops centers (see last paragraph, section 1.2.1). While Technicians are civilian contractors, Suits carry DoD (department of defense) identification cards and government issued credit cards.

Along with the use of shell companies, early retirement of NSA/DoD personnel, legislative perversion, and legal reinterpretation (3.1.5), the NSA also co-ops corporations, small business owners, charitable foundations, and religious institutions into its web of illegal domestic operations. The recruitment tactics include sweetheart bank loans, bribery, blackmail, intimidation, protection from prosecution, sexual pandering, and illicit drugs. However, no mater what recruitment method is employed, the end result is always the same. The targeted organization takes all the risks, and the NSA reaps all the benefits. In this sense, domestic NSA operations quite often bear more resemblance to an organized crime racketeering operation, than anything one would reasonably associate with a legitimate government agency. Regardless of the actual technique, method, or tactic employed by the NSA to accomplish its government mandated objectives. Minimizing any possibility of exposure or traceable connection to illegal domestic activities, is always the agencies first priority and overriding concern. Furthermore, just like any organized crime syndicate, the NSA will take whatever action is necessary (including murder) to guarantee its continued immunity from legal prosecution and/or public retribution.

In conclusion, the NSA psychic warfare program, along with its other domestic operations, are cloaked in nothing more substantial than a thin tissue of lies, subterfuge, and legal fictions…

3.2.3

HVT technology:

HVT – Acronym: High Value Target. These individuals include politicians, influential journalists, business executives, entrepreneurs, popular entertainers, innovative educators, scientists, etc.

The NSA employs a number of EM (electromagnetic) based technologies on those individuals they consider to be an HVT. Foremost among these technologies is the high power psychotronic transceiver (PT). While the cell phone network is sufficient for wide area coverage and one shot targeted strikes (see 1.2.4c & companion paper entitled "Remote Mind Control"), when long term 24/7 coverage is required, the NSA relies on multiple dedicated PTs, aimed at the HVT residence and/or workplace. Each PT consists of:

1. Small dish style transmit/receive antenna (Fig. 1 below) aimed at the HVT location.

2. Transceiver electronics package.

3. Large satellite dish linking PT back into the NSA psychotronics network.

Fig. 1 – Psychotronics transmit/receive antenna

In residential neighborhoods, NSA field operatives (posing as FBI agents) will contact homeowners near the HVT location, asking permission to place a "radio monitoring device" (PT) in a spare bed room for "national security" use. The NSA operatives are always very polite, and offer to compensate the homeowner for use of their bed room (generally $1000 to $1500 per month). With the allure of monthly cash, most homeowners are more than willing to cooperate. Optimal PT targeting involves pointing the transmit/receive antenna (figure 1), through a window having an unobstructed line of sight to HVT location. Alternant PT antenna sites include cell phone towers, high rise building roof tops, and government offices. PT antennas in outdoor locations have a white or gray plastic weather dome covering the dish. In extreme circumstances, the HVT may have as many as 10 PTs encircling his/her location. Besides fixed location PTs tied into the psychotronics satellite network, the NSA also deploys (SWAT style) teams equipped with portable PTs, for use against HVTs in remote domestic or overseas locations. The team will consist of one (or more) Suits (1.2.2, 3.2.1a), several psychics (often brother/sister or twins), and one (or more) techs. Depending on the mission parameters, teams may also include a specialist, trained in psychiatry or internal medicine.

One side effect of PT operation, is a subtle but very distinctive psycho-acoustic phenomena, perceived by the HVT as a high pitched "zipping" sound, lasting mere fractions of a second. These perceived sounds generally happen in pairs (or triplets), with random intervals between pairs. The phenomena is most noticeable in quiet environments (bedrooms, studies, etc.). Detection of this psycho-acoustic phenomena is incontrovertible evidence of NSA targeting.

Starting in the early 1990s, hand held devices capable of inducing a deep hypnotic (trance like) mental state, have been deployed by the NSA for use in situations where direct one on one confrontation and/or control of a human target is necessary. The device makes use of an asymmetrical microwave modulation technique to produce TMS (transcranial magenetic stimulation) within the frontal lobes, inhibiting volitional thought, thereby rendering the target immobile and extremely suggestible. A side effect of frontal lobe stimulation by this device, is a very odd visual/acoustical artifact. It consists of a glowing ring of pulsating light, accompanied by a deep (synchronized) throbbing sound. Once the device is switch off, subjects recover full volitional cognition within 30 to 90 seconds.

Another EM based system deployed against HVTs uses directed microwave energy to generate/catalyze free radical cross linking reactions within the human body, thereby damaging key metabolic pathways. The overall result being a rapid decline in health and vitality. The directed microwave generator is tripod mounted, and resembles a stove pipe, approximately 5 foot long and eighteen inches in diameter. The generator has two connections for water cooling lines, and one for high voltage cabling to the power supply cabinet. Peak microwave beam power is around 4000 watts, and is effective at distances of two miles or more. At distances under one mile, effects are prompt and devastating. Primary power is generally supplied from a 220V electric range/clothes dryer outlet. The system operates unattended, with control/management handled via auto-answer modem and dedicated phone line. System components have no markings indicating manufacturer, neither are there any visible model or serial numbers. Apparently, the NSA (and its corporate accomplices) have no desire to take credit for their handiwork…

Several other EM based weapons are also used on HVTs. Most are designed to either disrupt key biological processes (such as heart muscle contractions), or brain neurotransmitters (such as dopamine).

Click Here to view Wikipedia article on Transcranial Magnetic Stimulation (opens in a new browser window).

3.3.1

Summary:

Throughout this essay, I have tried to present the facts, devoid of any emotional bias. In this effort, I have failed miserably. And as a consequence, I’ve seriously depleted the inventory of derogatory adjectives, available within the English lexicon. Neither do I believe any sane individual could have remained emotionally detached, while traveling the road of discovery that made this essay both possible AND obligatory. However, when stripped of all its secrecy and mystique, the NSA is best characterized as little more than a psychopathic advertising agency, promoting a product (government sponsored slavery) no one really wants. While their marketing techniques are, to say the least, unconventional. Their message is as old as humanity itself. i.e. Do as we say, or we will hurt you.

3.3.2

Disclaimer:

ALL information contained herein is derived from public sources, widely accepted scientific principles, remote viewing, and/or deprogramming sessions of (former) government trained psychics. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising (what little remains of) his right to free speech as a private citizen of the United States of America.

End

National Security Agency (NSA) – Part 3

YÜKSEK STRATEJİ TÜRKİYE

strateji, istihbarat, güvenlik, politika, jeo-politik, mizah, terör, araştırma, teknoloji