"Anyone who nonconsensually violates your brain/mind/mentation using Mengele-like methods is a Nazi pig. You do not care what a Nazi pig thinks. You do not care about a Nazi pig's opinions. You do not respond to a Nazi pig ridiculing you, threatening you, trying to distract you, or otherwise trying to manipulate you. You work to get a Nazi pig hanged." - Allen Barker, NPT Theorem

Saturday, April 30, 2011

Operation MHCHAOS

Experimentation: Agencies of our own government are on record as having employed precisely these same tactics on a recurrent basis. The Church and Rockefeller Committee Hearings in the mid-70’s purportedly put an end to these practices. Based on recent developments, it would appear that the CIA’s and FBI’s Operations MKULTRA, MHCHAOS and COINTELPRO (the focus of these Senate Committee and Vice-President-level Hearings) were instead merely driven underground. We are now in contact with a total of 25 individuals, scattered throughout the United states, who firmly believe they are being harassed by agencies of the U.S. Government. Others have been brought to our attention whom we will be contacting in the future. The majority of these individuals claim that their harassment and surveillance began in 1989. The methods reportedly employed in these harassment campaigns bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, MHCHAOS and COINTELPRO. The only difference now is that electronic harassment and experimentation also appear to be (more blatantly) involved (Microwave Harassment and Mind-Control Experimentation).

July 1968: Orders from FBI Headquarters: Instructions For Operations selected "enemy" were to be 1) exposed; 2) disrupted; 3) neutralized. Methods suggested by superiors for these operations, put into writings, as guidelines:
  • Gather information on their immorality.
  • Show them as scurrilous and depraved.
  • Call attention to their habits and living conditions.
  • Explore every possible embarrassment.
  • Investigate personal conflicts or animosities between them.
  • Send articles to newspapers showing their depravity.
  • Use narcotics and free sex for entrapment.
  • Have members arrested on marijuana charges.
  • Exploit the hostilities between various persons.
  • Use cartoons and photographs to ridicule them.
  • Use misinformation to confuse and disrupt.
  • Get records of their bank accounts.
  • Obtain specimens of handwriting.
  • Provoke target groups into rivalries that resulted in deaths (Operation CHAOS).

Mackenzie - The late Angus Mackenzie, a longtime affiliate of San Francisco's Center for Investigative Journalism (he died of brain cancer in 1994), spent more than 15 years researching "Secrets: The CIA's War at Home.'' It represents the best account yet of the CIA's continuing attempts to manipulate and suppress informatioïn on the basis of its own narrow definitions of national security. Forbidden by the National Security Act of 1947 from operating within the United States, the CIA nevertheless launched a domestic spying program dubbed MHCHAOS aimed at the U.S. anti- war underground press of the 1960s and 1970s. The operation was international in scope and supposedly focused on whether anti-war publications were financed by foreign, communist sources.

In fact, points out Mackenzie, MHCHAOS, like the FBI's COINTELPRO, was designed to gather information on American citizens deemed by these federal agencies to be potentially subversive. The chief remaining barrier to keeping details of CIA domestic espionage from the public was the Freedom of Information Act (FOIA). So, in 1982, the Agency moved to create an exemption from the FOIA for counter-intelligence files, such as the records of MHCHAOS. Mackenzie details how this was accomplished with the surprising cooperation of American Civil Liberties Union executives Mark Lynch and Morton Halperin. The new FOIA exemption coincided with the issuance by the Rion Directive (NSDD 84), which was designed to prohibit federal employees from leaking classified information to the press. Mackenzie maintains that the chief result of NSDD 84 has been to discourage potential government whistle blowers.

In the end, Mackenzie suggests, the pattern of censorship that began with the CIA frantically trying to keep secret its illegal domestic spying operations has spread to agencies of the federal government, creating a culture of bureaucratic secrecy that resembles the one generated by Great Britain's Official Secrets Act, but previously unknown in the United States, with its strong tradition of constitutionally protected free speech. In Mackenzie, the United States lost prematurely one of its fiercest First Amendment defenders: "Almost a decade after the end of the Cold War,'' he writes in his conclusion, "espionage is not the issue, if it ever really was. The issue is freedom .... The issue is principle .... Until the citizens of this land aggressively defend their First Amendment rights of free speech, there is little hope that the march to censorship will be reversed. The survival of that cornerstone of the Bill of Rights is at stake.'' (How the CIA Got Away With Domestic Spying).

Dr. Ewen Cameron:  Employed by McGill University’s Allan Memorial Institute in Montreal, Quebec, Canada, between 1943 and 1964, conducted brainwashing experiments upon select, non-volunteer psychiatric patients on behalf of the CIA. Dr. Weinstein’s father was one of Cameron’s victims. Sergeant’s theorems and Cameron’s associated experimental findings appear to be the driving force behind the harassment and experimentation now being reported to this Association. All of these individuals are being subjected to a series of overlapping circumstances which apparently are meant to induce and sustain long-term extremes of stress. All of these individuals have been effectively isolated. Unethical psychiatrists and physicians are involved in the majority of these cases. Mind-altering prescription drugs are being used for clearly non-therapeutic purposes.

Evidence of LSD use is also beginning to surface (one of Cameron’s favored mind-altering substances). And “psychic driving” techniques - Cameron’s pet brainwashing method - are involved in all these cases, to a much greater and more potentially effective degree where auditory input is involved. The long-term objectives of these harassment and experimentation campaigns appear to be quite fundamental: 1). Induce a sense of perverted “loyalty” toward the very agencies engaged in the individual’s harassment, to confuse his or her priorities where the possibility of obtaining legal redress might be concerned; 2). Redirect the targeted individual’s feelings of hopelessness, anger and frustration toward racial and ethnic groups, and toward select, prominent political figures, to include the President of the United States; 3). Force the individual to commit an act of violence, whether suicide or murder, under conditions which he can be plausibly denied by the government. An operation’s ultimate success apparently hangs on this latter objective. We have successfully obstructed this process in a number of cases now being investigated (Microwave Harassment and Mind-Control Experimentation).

MHCHAOS in Canada According to the files, MH Chaos was a parallel undertaking to the CIA's "Operation Chaos," a domestic program that kept tabs on left-wing activity on U.S. college campuses. The agency developed a network of informants on Canadian campuses in the late 1960s and had reports sent down from Ottawa to the CIA's headquarters at Langley, Va. Among the Canadians listed for monitoring in one of those reports was Mordecai Briemberg, a former political science professor at B.C.'s Simon Fraser University. Briemberg told the CBC he was not surprised to see his name surface on a CIA document three decades later, but blasted the monitoring operation as "utterly shameful." (CIA spied on left-wing Canadians in '60s, '70s: documents).

Operation CHAOS or Operation MHCHAOS was the code name for a domestic espionage project conducted by the Central Intelligence Agency. A department within the CIA was established in 1967 on orders from President of the United States Lyndon B. Johnson and later expanded under President Richard Nixon. The operation was launched under Director of Central Intelligence (DCI) Richard Helms, by chief of counter-intelligence, James Jesus Angleton, and headed by Richard Ober. The program's goal was to unmask possible foreign influences on the student antiwar movement. The "MH" designation is to signify the program had a worldwide area of operations (Wikipedia).


Thursday, April 28, 2011

Vietnam War Protestors

Ex-Green Beret Master Sgt. Donald Duncan - Who later sat on a War Crime Tribunal described many incidents when American lead patrols arrested people who may or may not have been VC sympathisers who were routinely handed over the South Vietnamese interrogators who used extreme and brutal methods of torture on them. Duncan who initially supported the war explains how this contravened everything he was brought up to believe in. In 1966 he quit the Green Berets to become one of the most outspoken opponent of the war (Forgotten Heroes of the Vietnam War).

Megan Cornish - At high school in the early 1960s, Megan (pronounced MEG-on) Cornish started to become aware of the civil rights and antiwar movements but it was later, at Cornell University in upstate New York, that she became committed herself to activism. After graduation in 1970, she moved with a radical collective to Seattle to aid “movement organizing” on the West Coast. Upon their arrival, the collective was recruited by the staff of the GI coffeehouse in Tacoma, the Shelter Half, to take over the coffeehouse’s staffing, and Cornish was introduced to the burgeoning GI antiwar movement (Oral Histories: Megan Cornish).

Pvt. Bruce MacLean - Seattle native Bruce MacLean was drafted to the army after graduating from the University of Washington. Opposed to the Vietnam War, if not all wars, MacLean applied for conscientious objector status after being ordered to Vietnam in 1969. While his application was pending, MacLean was stationed at Fort Lewis, near Tacoma, where he worked with an antiwar GI group, the American Servicemen’s Union (ASU), and helped publish Fed Up! underground newspaper (Oral Histories: Bruce MacLean).

Steve Ludwig - As a student activist, Ludwig took part in many of the mass demonstrations on campus during the late 1960s and early 1970s, including the Black Student Union strike and the May 1970 student strike against the war. After leaving the University in the early 1970s, Ludwig looked to other opportunities for social activism as the student and antiwar movements waned, and became involved in 1980s campaigns around nuclear weapons, targeting Bangor Naval Base on Hood Canal. As he says, “I’m just one of those people that like to be involved in whatever’s possible,” and is still active with Jobs With Justice and the antiwar group Sound Non-violent Opponents of War (Oral Histories: Steve Ludwig).

Lyle Quasim - After leaving the university, Quasim lost his student draft deferment and was drafted into the army. Ignoring his draft notice, he only realized he was AWOL from the army when two recruiters showed up at his house one evening. Within six days, he joined the Air Force and found himself sent to McChord Air Force Base, near Tacoma, WA. Always against the war, Quasim challenged his commanding officers for greater democracy in the service, who sent him on a long tour of Vietnam as a punishment. In Da Nang, Quasim served as an Air Force medic, where he worked with military nurses and doctors to set up a free medical clinic in downtown Da Nang—off-limits to American servicepeople—for Vietnamese civilians, Vietnamese soldiers, and Americans. His experiences as a medic in Vietnam solidified his commitment to ending the war, and upon his return to the States, Quasim began working at the GI coffeehouse in Tacoma, the Shelter Half, and with antiwar and progressive organizations across the Northwest (Oral Histories: Lyle Quasim).

Barbara Winslow - Feminism transformed Winslow’s academic, personal, and political life. She helped begin the women’s studies department at the University of Washington, and found intellectual and political inspiration while doing graduate work in 1969-1970 with legendary social historian E.P. Thompson in England, where she played a role in the early protests and conferences of the English women’s movement. As she says, the women’s movement was “inventing a whole new world”—an exhilarating, exhausting, and, as she put it, tremendously fun project. After leaving Seattle in 1973, Winslow continued teaching women’s, labor, and African American history at public colleges and universities from Cleveland to New York, and is still a committed socialist feminist and labor advocate. She is now an Associate Professor in the School of Education at Brooklyn College/CUNY, where she serves as the head of the women’s studies program and runs the Shirley Chisholm Project on grassroots women’s activism (Oral Histories: Barbara Winslow).

Randy Rowland - After deciding that the war was wrong, Rowland decided to file an application for conscientious objector status and was served, instead, with orders to ship to Vietnam. On leave in Berkeley in 1968 before being sent overseas, Rowland—inspired by the atmosphere of protest and antiwar politics in California—decided to go AWOL. Rowland’s decision was one of a number of individual acts by soldiers that were beginning to coalesce into a powerful GI antiwar movement (Oral Histories: Randy Rowland).

Captain Howard Levy - A Green Beret doctor also took a stand, refusing to train any more people because he considered what he was doing immoral. The Levy case demonstrated how widespread and early the revolt began in the professional army. In 1967 he was court marshalled and spent 3 years in prison. What was remarkable about his case was each day he attended the court marshal he was cheered by hundreds of GI’s on the base who regarded him a hero (Forgotten Heroes of the Vietnam War).

Lieutenant Susan Schnall - Since being a nurse who took care of wounded soldiers back from Vietnam battle, navy lieutenant Susan Schnall decided to do something by her own way to contribute to soon ending the American War in Vietnam. on October 12th, 1968, Mrs. Susan Schnall spread leaflets from her friend's aircraft in San Francisco Gulf informing a demonstration for peace by American veterans and soldiers in the Gulf's army camps, at an aircraft carrier and at Oak Knoll navy hospital where she worked. In the army uniform, she used to speak loudly "Bring our American sons back alive" and actively participated in anti - war demonstrations. For these actions, in February 1969, she was sentenced by the army court for a 6-month imprisonment and dismissed from the army forces. After the dismission, she continued to support Vietnam through propagandas against war at the army camps and raised funds for several hospitals in Vietnam (Mrs. Susan Schnall - who disseminated leaflets against American war in Vietnam – was conferred the medal "For Peace and Friendship among Peoples").

Jeff Sharlet (1942–1969), a Vietnam veteran, was a leader of the GI resistance movement during the Vietnam War and the founding editor of Vietnam GI. David Cortright, a major chronicler of the Vietnam GI protest movement wrote, “Vietnam GI, the most influential early paper, surfaced at the end of 1967, distributed to tens of thousands of GIs, many in Vietnam, closed down after the death of founder Jeff Sharlet in June, 1969.” Sharlet was born and raised in Glens Falls, New York, a small town in the foothills of the Adirondacks, and later in the state capital of Albany. In 1960 he graduated from The Albany Academy, a private military academy. Restless during his first year of college, Sharlet withdrew and decided to fulfill his military obligation. In return for a three-year enlistment in the United States Army Security Agency (ASA), a communications intelligence outfit, he was promised a year’s training in a Slavic language followed by a European posting. But at the Army Language School he was bumped into the Vietnamese language course. He and fellow students spent six hours a day in class over 11½ months. In early 1963 Sharlet was sent to Clark Air Base in the Philippines where he was assigned to the 9th ASA2 at Stotsenberg Field Station as a Vietnamese translator/interpreter. With a Top Secret/Cryptographic security clearance he and fellow linguists monitored Vietnam People's Army radio communications (Wikipedia).

John Kniffin (1940-2002), Mr. Kniffin was among the first Marines sent to Vietnam in 1965. While serving with Bravo Company, 3rd Tank Battalion of the 3rd Marine Division near Hue City during the Tet Offensive in 1968, Life magazine published a photograph of his tank covered with wounded U.S. servicemen with the caption, "Tank turned ambulance." During his 32 months in Vietnam Mr. Kniffin received, among other decorations, the Bronze Star with the Vietnamese Cross of Gallantry and two Purple Hearts. He was honorably discharged in 1968 and returned to his native Texas where he devoted the rest of his life to improving conditions for all Americans (Vietnam Veterans Against The War).

Jerry Lembcke is a professor of sociology at the College of the Holy Cross. His 2010 book about actress Jane Fonda is titled, Hanoi Jane, War, Sex, and Fantasies of Betrayal. His previous book was, The Spitting Image: Myth, Memory, and the Legacy of Vietnam. Jerry Lembcke has been trying to set the record straight about war in general, this era, and he is exposing a tactic of scapegoating peace activists like famed actress Jane Fonda. Just as with lies that were told about US soldiers being spat upon as they returned home, Fonda is blamed, peace activists are blamed, rather than the architects of the war itself. It is a rewriting of history to adjust our attention away from these grotesque U.S. policy blunders and atrocities (Dori SmithJerry Lembcke on his book, Hanoi Jane, War, Sex and Fantasies of Betrayal).

Tom Bernard - Tom went to Catholic schools, was an altar boy, took 12 years of Latin and attended Cornell University. It was the late 1960s, war was raging in Vietnam and the specter of the draft stalked him. After a little more than a year at Cornell, he decided to enlist in the Air Force before he was drafted into the Army. His father had served in World War II, and his grandfather had earned his citizenship by serving in World War I. Tom scored so well on the language tests that he was sent to El Paso, Texas, to learn Vietnamese. For two years, he flew over Vietnam, encapsulated in a C-131, listening in on and translating Viet Cong broadcast conversations. When their planes were detected, the pilots went into an immediate, terrifying nose dive to escape under the radar. Later, he sometimes jokingly summarized the years as, “There was always plenty of cigarettes and plenty of marijuana.” But the truth was uglier. He saw and heard things that changed him. He said the translators got to recognize the voices they were listening to. Knowing firsthand how civilian centers were targeted and hospitals were being bombed, he said, he and others decided to dedicate themselves to ending what they viewed was a criminal war. He helped create WORMS (We Openly Resist Military Stupidity) (Tom Bernard: Another Friend Dies).

Billy Dean Smith was born tenth in a family of twelve children in Bakersfield, California, in 1948. The family lived in Texas for ten years, moving to Watts in 1957. Billy was drafted into the Army in 1969. He was opposed to the war and the Army even then and wanted to resist induction, but respected his family's desire that he not go to jail. He was sent to Vietnam in October 1970, where he was assigned to the command of Captain Rigby. On March 15, 1971, at 0045 hours, a fragmentation grenade exploded in an officers barracks in Bien Hoa -- killing two young lieutenants and wounding a third. Captain Rigby and First Sgt. Willis, who were to have slept in these barracks, arrived on the scene, decided they were the real intended victims -- and that the logical guilty party could only be one Pvt. Billy Smith. Without hesitation, they informed the Criminal Investigation Division (CID) officer of their conclusion (verdict) and together they called a battalion formation. In spite of the absence of several individuals, without questioning Captain Rigby's "theory", and without a single scrap of evidence, Billy Dean Smith was called forward to the front of the formation, a heavy CID hand slapped on his shoulder, and was told that he was under apprehension for murder -- the equivalent to a declaration of guilt before all the potential witnesses. He was also charged with resisting arrest and two charges of attempted murder. The Army is asking the death penalty (Seize the Time: Black Disciple Party, 1971).

Mike Wong was born and raised in San Francisco, and became a soldier during the Vietnam War. He was very influenced by the anti-war movement. So when he received Viet Nam orders, he went AWOL, then turned himself in to the Presidio stockade with his lawyer, pleaded guilty to AWOL, and attempted to press a limited conscientious objector case. The Army turned him down, and put him back on Viet Nam orders. Mike escaped to Canada and lived in exile for five years. He returned after the war, pleaded guilty to Long Term AWOL, and received an Undesirable Discharge (Mike Wong: Resistance to U.S. Wars).

Sen. John Kerry, the Democratic candidate for President of the United States in 2004, first came to national prominence through his spokesman role for Vietnam Veterans Against the War (VVAW) before the US Congress. In 1971, when Kerry was 27 years old, he represented VVAW when he testified before the Senate Foreign Relations Committee. The next day, H. R. Haldeman, chief of staff to President Richard Nixon, told Nixon that Kerry had done "a superb job" in denouncing the Nixon administration's policy. Nixon, agreeing that Kerry had been "extremely effective", resolved to discredit him. VVAW consisted of veterans whom, like Kerry, had served in Vietnam, and opposed American involvement in the Vietnam War. During the course of his Presidential campaign, as well as his previous campaigns for senatorial seats, his work with VVAW was raised as a subject of controversy. During his campaigns for political office, he was charged with making inconsistent statements about two events in 1971: an antiwar demonstration at the United States Capitol in April, and a series of VVAW meetings in Missouri in 1971 (Wikipedia).

Dave Blalock volunteered for the US Army and served from 1968 to 1971. After being AWOL for nine days in basic training he was court-martialed and spent one month out of a possible six-month prison term doing “Hard Labor” time in the Fort Jackson stockade. He then spent one year in Vietnam (1969-1970) where he became politicized by his experiences there. After returning, he spent his last 15 months in the army by joining the large anti war movement that had existed within the US military and actively worked inside one of the many underground GI organizations. In 1989 Blalock, along with three other people burned American flags on the steps of the US Capital building in protest against the new Flag Protection Act of 1989. They were arrested for this and their case ended up in the Supreme Court, which ruled the law un-constitutional. From Vietnam, to the 1980’s counter-insurgency wars in Central America, to the ‘91 Gulf War, to the ’99 Kosovar war, to 2001 bombing of Afghanistan, to the present war on Iraq he has been active in the fight to expose and oppose all US war moves around the world. He puts special emphasis on building support for the GI anti war resisters inside the armed forces. At present, Blalock is also writing a book that tells his life story through the Vietnam War (2 Viet Nam Veterans to hold Press Conference in Heidelberg Germany 15.07.04).

Darnell Summers volunteered for the US Army and served from 1966 to 1970. While home on leave before going to Vietnam in 1968 he became involved in the struggle to found the "Malcolm X Cultural Center (MXCC) in Inkster Michigan, a suburb of Detroit and was one of the spokespersons for the "MXCC". Because of his political activities he was later targeted by COINTELPRO and arrested in Viet Nam. He was then brought back to the United States and ultimately charged with the murder of a Michigan State Police "Red Squad" Detective Sergeant, Robert Gonser, who was allegedly shot by Summers while he was home on leave. The charges were dropped in 1969 due to the statement of the Prosecutors "State" witness, Milford Scott, who wrote a letter to the presiding Judge stating that the police had scripted his testimony and that he knew nothing about the events in question. This was one year after the Detroit Rebellion, which saw 43 people killed, and thousands arrested. Then again in February 1982 Summers was arrested here in Germany and charged again with the Gonser murder based on the same evidence and illegally extradited to the US. Then in 1984 after the State refused to release sensitive surveillance documents (From the FBI, CIA, NSA, ASA, DOD, etc.) the charges were suddenly dropped with the stipulation that given new evidence the charges would be re-instated. Darnell S. Summers remains the only suspect and under U.S. statutes he can be arrested at any time. As a Black man inside the Army he was confronted by not only by racism but also the fact that he was in a military organization that was murdering people across the globe. Since then Summers has been active in the struggles against racism and U.S. instigated aggression. He was instrumental in organizing the "STOP THE WAR BRIGADE" in Germany during the Gulf war to build support for anti-war GIs (2 Viet Nam Veterans to hold Press Conference in Heidelberg Germany 15.07.04).

David Cline (January 8, 1947 – September 14, 2007) was an American anti-war and veterans rights activist. He was best known as National President of Veterans For Peace (VFP) from 2000 to 2006, Chapter Vice President of Alan Reilly - Gene Glazer VFP Chapter 21, and co-founder of the Vietnam Agent Orange Relief and Responsibility Campaign. Cline was featured in the 2006 film Sir! No Sir!, which documented the GI antiwar movement during the Vietnam war as well as in the book "Winter Soldiers: An Oral History of Vietnam Veterans Against the War" by Richard Stacewicz. Returning to Fort Hood, Texas, Cline became an anti-war activist, serving as a civilian organizer of active duty servicemen at one of the first GI coffeehouses, the Oleo Strut, in Killeen, Texas and producing a one-sheet underground newspaper on politics and veterans issues called Fatigue Press, which was distributed clandestinely on the military base. He joined Vietnam Veterans Against the War in 1970, where he served as a coordinator and national director, and remained a member until his death. While working for the U.S. Postal Service in Jersey City, Cline was a post office union representative and served as vice president of Transportation Workers Union Local 600 (Wikipedia).

Keith Mather, works for the San Francisco Department of Building Inspection and remains involved in antiwar work. THEN: The Vietnam War's last prisoner of conscience was living at home in San Bruno and going to shows at the Fillmore when he received his draft notice during the Summer of Love. And then the whole military thing began. Went to Oakland and was inducted. Went to Fort Lewis and went through basic training there at North Fort and was given the end of basic training, was given the military occupational skill of infantryman. I took my advanced infantry training at Fort Lewis and I started that. Went home during AIT on leave for Christmas and went back late. Went back three days late and with an earring, knitted tie, red socks with a little crest at the heel, totally out of uniform and I'd given away my brass at a party. I was unconscious when I arrived at the airport. I was taken off the plane by the MPs and taken to the stockade and given an Article 15 for being late, possession of marijuana and put back to duty. Hurry up and get back in training. I only lasted about four or five days and went AWOL again and went back home. Did the classic put your civilian clothes on underneath your uniform and drop them in a phone booth while you're waiting for a cab. Went to Seattle and flew home. And then I got involved in the anti-war movement after I was AWOL for quite a few months, met a bunch of other people had a similar experience. Initially you felt alone, paranoid and worried, depending on others and didn't have a lot of power. Then when you start organizing and getting together with people of similar experiences and similar interests, things started getting a little more enjoyable. It seemed like we were doing something positive. We were going to jail anyway -- we figured what do we really have to lose? We can be silent or we can go down swinging. I got involved with the Nine For Peace and that was a big time experience for me. The bio on it is that we represented all four branches of the military -- Army, Navy, Marine Corps and Air Force - and we had all resigned and opposed the war and we all made different statements and we were chained to ministers of different denominations and different faiths and we were held in sanctuary in San Francisco, until we got a bomb threat and moved it to Marin City. We were arrested in Marin City in July '68, the following summer (Summer of Love: 40 Years Later / Keith Mather).

Protests against the Vietnam War took place in the 1960s and 1970s. The protests were part of a movement in opposition to the Vietnam War and took place mainly in the United States. The very first protests against U.S. involvement in Vietnam were in 1945, when United States Merchant Marine sailors condemned the U.S. government for the use of U.S. merchant ships to transport French troops to "subjugate the native population" of Vietnam; these protesters opposed the "recolonization" of Vietnam (Wikipedia).


Tuesday, April 26, 2011

Covert operations under COINTELPRO

The Era That Never Really Ended - The FBI has admitted that during the COINTELLPRO era it ran some 295 distinct COINTELPRO operations against individuals and organizations which were broadly or narrowly considered parts of the black liberation movement. It is important to understand that during the so-called COINTELPRO era--and as we shall learn in subsequent segments of this series, that era never really ended, one strategy used then and now is that of plausible deniability. That is, in case assassinations or other illegal or disrespectable and unpopular activities committed by high-ranking officials become public, those officials may deny connection to or awareness of those acts or the agents used to carry out such acts. As noted by Mike Ruppert in “By The Light Of A Burning Bridge” FTW over the years has frequently been victimized by attacks that appeared to have the fingerprints of COINTELPRO all over them, down to the use of convicted felons to commit those acts, in which case, the FBI or whatever agency(ies) are involved can plausibly deny connection with such individuals. Although we hear virtually nothing about COINTELPRO in mainstream media these days, Congresswoman Cynthia McKinney has introduced legislation to re-open the investigations of the Church Committee into COINTELPRO. As Congresswoman McKinney states: “We still to this day do not know the full scope of the abusive surveillance, targeting, discrediting and disruptive tactics and plans of the past.” (The War On You: U.S. Government Targeting of American Dissidents - Part I).

Neutralizing Potential Activist - One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why? 1) The message doesn’t get out; 2) A lot of time is wasted; 3) The activist is frustrated and discouraged; 4) Nothing good is accomplished. FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established. Their purpose is to prevent any real movement for justice or eco-peace from developing in this country. Agents come in small, medium or large. They can be of any ethnic background. They can be male or female. The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs. This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists. It is the agent’s job to keep the activist from quitting such a group, thus keeping him/her under control (How To Spot a Cointelpro Agent).

COINTELPRO (an acronym for Counter Intelligence Program) was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting domestic political organizations. COINTELPRO tactics included discrediting targets through psychological warfare, planting false reports in the media, smearing through forged letters, harassment, wrongful imprisonment, extralegal violence and assassination. Covert operations under COINTELPRO took place between 1956 and 1971, however the FBI has used covert operations against domestic political groups since its inception. The FBI's stated motivation at the time was "protecting national security, preventing violence, and maintaining the existing social and political order."

FBI records show that 85% of COINTELPRO resources targeted groups and individuals that the FBI deemed "subversive," including communist and socialist organizations; organizations and individuals associated with the civil rights movement, including Dr. Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People, and the Congress of Racial Equality and other civil rights organizations; black nationalist groups; the American Indian Movement; a broad range of organizations labeled "New Left", including Students for a Democratic Society and the Weathermen; almost all groups protesting the Vietnam War, as well as individual student demonstrators with no group affiliation; the National Lawyers Guild; organizations and individuals associated with the women's rights movement; nationalist groups such as those seeking independence for Puerto Rico and a United Ireland; and additional notable Americans, such as Albert Einstein. The remaining 15% of COINTELPRO resources were expended to marginalize and subvert "white hate groups," including the Ku Klux Klan and the National States' Rights Party. FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to "expose, disrupt, misdirect, discredit, or otherwise neutralize" the activities of these movements and their leaders (Wikipedia).


Sunday, April 24, 2011

Jane Fonda

On Feminism: I am going to do something very different, probably, than other people who have been asked the question. I am going to answer it as a Christian. I believe as a Christian that Jesus’ teachings were teachings of feminism. If you read the Gospel of Thomas, which of course is not included in the Bible, which is understandable given the group of men who decided what was going to be included and what wasn’t. It’s a series of, I think, 21 riddles that Christ said, or was supposed to have said, and if you can figure them out, then you enter the Kingdom of Heaven, which I believe means you become whole. And one of them says: when man becomes woman and woman becomes man, and outer becomes inner, and inner becomes outer, you enter the Kingdom of Heaven. And I think that what he said right there, and in many of his other preachings, was that humankind reaches its maximum development and most contains God when the two genders merge. And that means when women own their strengths, and men own their hearts. That to me is what feminism is - is when our full humanity is claimed. You can talk about equal rights, and you can talk about – but essentially feminism will come into wholeness when we achieve a social paradigm that allows men and women to become full human beings. Rather than women muting themselves and men hardening themselves, which I think it the root of all the problems – including war.

You know, having become an activist during the Vietnam War and wanting to really understand it, I read the Pentagon papers. And it was an amazing document because what it showed is that five administrations knew they couldn’t win in Vietnam, and yet they kept sending men there to die. And the big question for me over the years was why? And as I was writing my book and trying to figure this out, I read a book, “The Secret Papers” by Dan Ellsberg, and then I read Doris Kearns’ biography of Lyndon Johnson, and Lyndon Johnson put his finger on it. He said, ‘If I withdraw, they’ll call me an un-manly man.’ Think about how many Americans have died so our leaders could prove their manhood! This is so deep. And I don’t need to say that this culture of toxic masculinity is alive and well right now in this country and it’s tragic (Conversation with Jane Fonda).

On Vietnam War: Jane Fonda - actress, political activist and partner of anti-war protester Tom Hayden - entered enemy territory for two weeks in November and emerged, in the eyes of many, as a traitor after posing for photographs at the seat of an anti-aircraft cannon and making radio broadcasts urging U.S. airmen to stop bombing North Vietnam. Fonda told servicemen stationed on aircraft carriers in the Gulf of Tonkin that the bombs they were loading into planeswere illegal and that using the bombs "makes one a war criminal." In 1988, Fonda went on ABC's "20-20" news program and apologized to Vietnam veterans and their families for her actions. "I was trying tohelp end the killing," Fonda said in an interview with Barbara Walters. "Butthere were times I was thoughtless and careless about it and I'm...very sorry that I hurt them." Asked about the continued bitterness over something that happened years ago - critics still refer to her as "Hanoi" Jane -- Fonda said, "Thereare still festering wounds and a lot of pain, and for some I've become a lightningrod." Fonda said she didn't realize at the time the effect posing with the anti-aircraft gun would have. "I know the power of images," she said inthe 1988 interview. "To have put myself in a situation like that was a thoughtlessand cruel thing to have done...I take fullresponsibility for it (Jane Fonda & TheVietnam War).

Jane Fonda (born Lady Jayne Seymour Fonda; December 21, 1937) is an American actress, writer, political activist, former fashion model, and fitness guru. She rose to fame in the 1960s with films such as Barbarella and Cat Ballou. She has won two Academy Awards and received several other movie awards and nominations during her 50+ years as an actress. After 15 years of retirement she returned to film in 2005 with Monster in Law, followed by Georgia Rule two years later. She also produced and starred in over 20 exercise videos released between 1982 and 1995, and once again in 2010. Fonda has been an activist for many political causes, one of the most notable and controversial of which was her opposition to the Vietnam War. She has also protested the Iraq War and violence against women. She describes herself as a liberal and a feminist. In 2005 Fonda worked alongside Robin Morgan and Gloria Steinem to co-found the Women's Media Center, an organization that works to amplify the voices of women in the media through advocacy, media and leadership training, and the creation of original content. Fonda currently serves on the board of the organization. Since 2001 Fonda has been a Christian. She published an autobiography in 2005 (Wikipedia).

Hanoi Jane - This cultural emphasis is what distinguishes Hanoi Jane as a truly unique book with a large vision. However, the reader may find that Lembcke's meditations on his subject walk a thin line between the insightful, the convoluted – and at least for this reviewer – at times the conspiratorial. He occasionally insinuates the experience of one POW as symbolic of all. Lembcke appears to suggest that front line female NVA/VC were imagined or exaggerated by combat GIs. Lembcke notes the collaboration of Vietnam war POWs with the enemy to gain favored treatment. This phenomenon is well know in Holocaust literature as identification with the aggressor and it is to Lembcke's credit that he acknowledges these aspects of the POW experience are contrary to popular belief (War, Sex and Fantasies of Betrayal).

Sir! No Sir! - This is the story of one of the most vibrant and widespread upheavals of the 1960's–one that had profound impact on American society, yet has been virtually obliterated from the collective memory of that time.


Friday, April 22, 2011

Will Filer's NSA mind control and psyops

Introduction: The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA’s Behavioral Modification Procedure Outline documented for the non-technical person.

Technology Devices: Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. “Computer Simulated Subconscious Speech Language”.

Applications: 1. Intelligence:  Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen’s opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.

Applications: 2. Counterintelligence: Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).

Applications: 3. Behavior Modification and Accelerated Resocialization: This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.

The NSA uses this technology to resocialize (brainwash) the US civilian voting population into “Giving their lives to Christ” (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a “Personal Relationship with Jesus Christ” (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.

Definitions and Acronyms

Age Regression – The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.

Hypnoamnesia – Temporary loss of memory due to a posthypnotic suggestion.

NSA – United States National Security Agency, Fort Mead, Maryland.

ODO – On-Duty Officer, or officer-on-duty.

Posthypnotic Command – Same as Posthypnotic Suggestion. This term “Command” is more commonly used when the hypnosis is forcibly given to the subject and when the subject’s will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the “Suggestion” any longer thereby making it a “Command”.

Posthypnotic Suggestion – A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.

Posthypnotic Suggestibility Index – An index or rating of a subject’s susceptibility and sensitivity to hypnosis.

REM DEP – Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.

Script – A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts; (1) an identifier (subject’s name, description, or other identifying factor), (2) trigger activation condition or conditions (when, what or how the suggestion will trigger), (3) the content (what the trigger will precipitate in the perception of the subject), (4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to “strengthen” or reinforce the central posthypnotic command.

Somnambulatory State – An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.

Subliminal Implant – A posthypnotic suggestion successfully delivered to the subject’s subconscious mind.

Transceivers (NSA) – Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject’s site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.

Technology Overview: In addition to the ability to see and hear what is going on inside people’s homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.

Thought Labels (Response Labels):  Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or “read minds” so to speak. 2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation “thought labels”.

Post-Hypnotic Delivery Method: The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. “How can hypnosis be used?” you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine.

Remember when the words “Drink Coca Cola” were written on one frame of a movie in a theatre back in the 1960s?  The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.

In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting “sped-up” script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.  Where dialects are present, a different set of base phonemes is used.

Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions. The empty space between words is minimized and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element’s acoustic wave train thus reducing the actual number of sine waves making up a word by 50% or more. This reduces the actual length of the time it takes the phoneme to be delivered prior to accelerating (speeding-up) the delivery (like fast forward). This helps the message to be played at higher speeds and reduces the subject’s ability to recognize it as accelerated speech. The technique of using optimized digitally sampled and edited phonemes appended together to for words and then sentences structured as hypnotic suggestions can be termed “computer simulated subconscious speech language”.

The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many “subliminal tapes” on the market to program your subconscious mind. These tapes have their “messages” recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won’t hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA’s high-speed audio subliminal message.

This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA’s message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the “posthypnotic” script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items: 1. Professional state-of-the-art technology recording equipment. 2. Digital acoustic wave editing equipment. 3. Advanced engineering knowledge of acoustic wave science. 4. Phonetics and linguistics expertise. 5. Hypnosis theory and scripting. 6. Ideal environmental conditions for recording. 7. NSA ignorance of the subject’s intent and ability to capture a message.

This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can “program” or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.

Using the Post-Hypnotic Delivery Method with Thought Labels:  The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be “Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice.” From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever: a) cheated on your taxes, and: b) If the IRS could catch you in anaudit.

This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book “1984″. As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.

The NSA’s goal is to have the whole world under its electronic eye by the year 2000.   They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a “voice print” from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver. If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person’s location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.

This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950′s and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.

Originally, after noting the behavioral effects in visual subliminal effects like the highly publicized event where stating “Drink Coca Cola” on a single movie frame “delivered a higher rates of speed than normal movie viewing raised the obvious question, “Does the human hearing work as good as eyesight accepting subliminal messages?” Preliminary theory work was transferred to Fort Mead NSA who had expertise in characterizing language in analog domains where a sampled phoneme could be edited (shortened by removing excess sine waveforms from the “acoustic wavetrain”) and electronically reconstructed back into shortened words of language. Some of the early experiments included “Remote Viewing at NSA where the Viewer would relax, open their mind and explain the clarity of images that were described by the NSA using this technology. These early experiments allowed the NSA to refine the specifications of the “Computer Simulated Subconscious Speech Language” and the scripting formats to maximize the ability to deliver an accurate “vision or picture” into the subject. Pictures already seen by the subject could simply be recalled using “Age regression” script variations.

Other Reference Material: Please refer to the book “Inside America’s Most Secret Agency, The Puzzle Palace” by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA’s history and the NSA’s first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.

NSA Case

NSA Self-Initiated Execution (Suicide): Bamford’s “The Puzzle Palace” references one of the NSA’s first self-initiated execution (suicide) with this “Thought Control” technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.

NSA Initiated Execution to Cover-up in the News: A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could “read minds” and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news “The gunman was demanding to talk with the Director of the CIA” etc. disappeared quickly (suppressed?) from later news accounts.

NSA Initiated Execution to Cover-up in Music: Curt Cobain of the musical group “Nirvana” was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the “Friends inside his head”. Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.

NSA Initiated Executions in Overseas Defense Project: Some years back several employees of the United Kingdom’s Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not “Staged” suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.

Musical references of NSA Technology: Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA’s brainwashing technology in a song called “Wild Wild Life”. The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that “They (NSA) talk so fast├á” and that the musical group had spent “All their time and money” unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.

NSA Counterintelligence Experiments: Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.

History Example Summaries:  One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA’s behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn’t figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.

Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject’s health degraded.

David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for “God” to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, “God spoke to them and said to commit suicide” and they did securing another one of the NSA’s great experiments in mind control and social pathology.

A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA’s technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.

The cases of NSA activities go on and on. With access to the FBI’s Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their “Thought Control” technology.

Currently, the NSA has many subjects in the field (our society) that need only a series of “triggers” (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them “Shooters on a Shelf”. A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that “someone” (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.

Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have “Friends inside their heads” also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.

NSA Behavioral Modification Procedure: The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency’s Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called “reborn” by the church, with the subject’s life-long goal of “a personal relationship with Jesus Christ”.

Abstract:  The NSA’s behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject’s net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject’s posthypnotic suggestibility index, the subject’s intelligence and reasoning ability, moral and superstitious beliefs, and the subject’s social status and the weakness of the subject’s primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.

After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject’s will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.

Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject’s neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of “Implants” in their body. It is important for the subjects to understand that the NSA controls this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject’s experiences. Nobody has the time or inclination to follow a subject around with a microwave gun to tickle various parts of the body. We are saturated with microwaves all the time from television stations, communication satellites, etc and yet we do not have any symptoms because microwaves do not have the ability to trigger localized synaptic responses in our brains. Furthermore, when the subject is in a room surrounded by several people, and the subject is the only one experiencing the “thoughts”, tingling feelings, etc., then obviously a delivery method is being employed that affects only the subject; high-speed acoustic delivered hypnosis.

After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow “God or Jesus to speak directly to the subject” and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA’s technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and “Gives their Life to Christ” and the NSA achieves total control of the subject.

The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as “God and Jesus works in their life”. Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).

The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA’s electronic surveillance system captures and sorts the prayers by “Keywords”. The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to “God’s will”. If the subject resist’s the NSA’s instructions, additional punishments are inflicted on the subject.

The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other “Christians” to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject’s problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).

A subject that has successfully completed the NSA’s behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject’s lives are relatively unproductive because their focus is on their “Life after death” and not what they accomplish while they are alive. They avoid “worldly activities”, and usually are confused and disjointed in rational thoughts and concepts. For instance, they don’t believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.

The Process: Triggering Techniques:  The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.

Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.

The Process: Real-Time Subconscious Implant Delivery:  Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject’s response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a “voice” heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA’s activities.

The Process: Prescheduled Subconscious Implant Delivery: The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script’s transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can’t be associated with a commonly recurring situation like event-triggered scripts precipitate.

The Process: Event-Triggered (conditional) Implant Delivery: Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.

This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to “script” and use them.

The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want’s to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject’s behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject’s mind. Example: This script will always cause a girl or boy not to sleep with the opposite sex: “You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy or girl) friend’s house and you will feel a deep peace when you leave their house to go back home”. These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time.

It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject’s decision uninfluenced by anyone else that the subject should avoid the person, place or thing.

This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject’s decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.

Stage 1 (Prescreen Evaluation): The subject’s Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject’s speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion “You will not be able to remember the name of “____” no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject’s ability to overcome it is evaluated.

A full study of the subject’s religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.

Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are “Open-ended Questions” (similar to multiple choice with response labels pre-assigned to each choice) or “Reject if Disagreeable” (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.

Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject’s overall social status, abilities, attitudes, and communication skills with primary support groups and friends.

Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.

The NSA technology affords powerful control over the subject, the subject’s environment, and the subject’s ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject’s physical and mental condition is depleted. The subject’s ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject’s testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.

Stage 2 (Standard Process):  This stage is where most subjects are behaviorally modified to serve and follow “God” (AKA NSA management of the subject’s civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject’s relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.

Coincidence:  Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject’s life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that “God” or some other supernatural being is taken interest in their life.

The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject’s church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject’s mind into concern and contemplation about the sermon’s topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God’s mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.

Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject’s relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.

REM Sleep Deprivation:  The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject’s ability to heal after physical damage or after periods of extensive exercise. The result is that the subject’s general health degrades as does social bonds and work/school performance.

The NSA performs control of REM Sleep through various methods. Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be discussed later).

Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.

Dark rings’ surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem. When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject “will feel energetic and rested”, the subject will not recognize the REM Deprivation. Additional posthypnotic commands can be implanted that will make it difficult for the subject to “see or perceive” the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.

Shame Factor Enhancement:  Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.

The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject’s life.

Religious Relevance and Convictions: The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the “Word of God”. When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God’s presence and force. “Thou shall not disobey God”.

Paranoia:  Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject’s distrust of other people including the subject’s primary group that could provide positive support during this time of distress in the subject’s life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject’s testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.

When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a “schizophrenia” label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.

The subject is led to believe that the subject’s neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement personnel.

Stage 3 (Extreme Process): This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.

Increasing Dependence on Drugs and Alcohol:  As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject’s index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.

Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject. 

In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from “God”. It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.

Poor Nutrition:  The poor nutrition reduces the energy the subject has and serves later as another justification of God’s punishment. The subject will be taught later that “the body is the temple” and that to abuse it is to violate God’s will.

Apathy: After the subject’s self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of “not persevering through faith” which is later used on the subject later to increase a feeling of guilt.

Depression: Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.

Insecurity:  The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can’t be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject’s life.

Journals and Diaries: Most of the subjects are directed to keep a “Journal” or diary by the NSA so that the subject can record and review feelings, events, observations, and “God’s directions” that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation.  The NSA uses the Subject’s Journals in a variety of ways.

Degrading Spelling and Grammatical Performance:  Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress, have very poor grammar, spelling, and short attention spans.

Slowed Speech: Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.

Confusion: Confusion results from three primary sources; REM Deprivation, specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject’s life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA’s objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA’s security risk.

Poor Concentration: Difficulty concentrating impairs the subject’s productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without “God”, thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.

Loose Association and Personality Disorders: The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.

Anger: The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial “communication intercept” channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.

Delusions: Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.

Audio Hallucinations: Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.

Voices in the Subject’s Mind: The voices in the subject’s mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.

Noun Substitution Posthypnotic Implant: The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject’s internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, “I should go to church today”. With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, “You should go to church today!” Notice that by implanting the posthypnotic command into the subject’s subconscious mind to think the pronoun “You” instead of “I” the subject will perceive that they are being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject’s perception of threat, fear, and therefore paranoia. It can be used with other posthypnotic suggestion implants that will give the subject the perception of either a “good” or “evil” voice or spirit is directing him/her. This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject’s every thought. It provides a convincing proof that “God knows every thought of his children”. Subjects that don’t have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic.

Tinnitus (Ear Ringing): Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.

Complete Quiet Silence: Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has “The Lord’s Peace Restored”, and secondly, the subject has achieved a milestone toward being released by God (the NSA).

Quiet Wind: The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin’s lyrics of a song that has the chorus “I can get so scared, Listen to the wind”.

Visual Hallucinations: Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc. The television show “Sightings” has had numerous reports of people seeing “Aliens” at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA’s technology secure (disinformation).

Tactile, Olfactory hallucinations and Muscle Spasms: Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:
  • Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).
  • Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or “deception of Satan”).
  • Temporary sensation of pressure to the center of the right palm (symbolizing Jesus “Sitting at the right-hand of God”).
  • Temporary sensation of pressure to the ball of the right foot (symbolizing “Get on the Ball” or “hurry-up”).
  • Temporary sensation of pressure to the tip of the right foot big toe (symbolizing “Right Direction”).
  • Temporary sensation of pressure to the tip of the right foot center toe (symbolizing “Fucking-up Direction”).
  • Temporary sensation of pressure to the tip of the left foot big toe (symbolizing “Wrong Direction”).
  • Temporary sensation of pressure to the buttocks (symbolizing “Bad Attitude” or “subject is acting like an ass”).
  • Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).
  • Temporary sensation of pressure to the left ear drum (symbolizing “do not listen”).
  • Temporary sensation of pressure to the right ear drum (symbolizing “listen”).
  • An involuntary blink of the right or left eye (symbolizing: right eye = God’s agreement or left eye = Satan’s agreement).
  • Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or “Having no balls or strength”).
  • Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like “being attacked with microwaves” or being caressed by Angels.
  • Muscular spasm or perceived pressures near the jugular vein on right side of neck (symbolizing Satan having subject by Jugular or throat). This is used to inflict fear and doubt.
  • Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.
  • Perceived odor sensation of a thick, sweet smell (symbolizing Satan’s sweet victory over the subject’s soul).

This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA’s civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.
  • Reverse engineering of the NSA’s technology to prove it’s abuses against the American people is quite difficult. Consider the following.
  • If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers. These perceptual effects can be confusion, lack of attention to important details, oversights, bad assumptions, incorrect interpretation of the test data. These same misperceptions will also be incorporated into the research test subjects. The technology cannot be developed and optimized if the NSA has any access to the test subjects. The test scripts given to the test subject delivered from the researcher can be neutralized by the NSA delivering a canceling script immediately after the researcher’s script. The NSA’s test script can also include a hypnoamnesia script at the end to cancel any residual perception in the subject so that the test subject would report no effects and the researcher would conclude the test script had no effect.
  • The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world. The research personnel and their subjects must never leave the secured area of the facility so that they cannot be subliminally interrogated by the NSA. The NSA would take this opportunity to deliver disinformation scripts to the subject or researcher. Foodstuffs and supplies would be the logical choice of NSA intrusion if all other security measures were effective against the NSA.

The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it’s surrounding grounds. The minimal requirements for the NSA to take control of the research are:
  • NSA audio delivery (a micro receiver with a micro speaker)
  • Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.
  • Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.

The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.
Any facilities existing will have to be debugged before habitation and research begins.

Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.

This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA’s intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.

Conclusion: America’s greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population? May God help us all in protecting the American public and preserving and managing this vital technology’s vital potential to serve America’s National Security.

Related Posts Plugin for WordPress, Blogger...
Watch live streaming video from targetedindividualscanada at livestream.com