NSA Mind Control and Psyops The following was sent to me by Will Filer Esur4@aol.com
on July 27, 1999. It offers a new explanation for government mind
control. Will has stated to me that he is a former consultant to the
U.S. National Security Agency and asked me to post this information
immediately. He also believes he is in immediate danger because of
this information.
If you have comments on this document, feel free to post
them to the MINDCONTROL-L list. Subliminal Implanted Posthypnotic Suggestions and
Scripts Using Acoustically Delivered and Phonetically Accelerated
Posthypnotic Commands without Somnambulistic Preparation in the
Subject for Intelligence and Counterintelligence Applications by the
United States National Security Agency.
1. INTRODUCTION:
1. The following information is an overview of one area
of NSA Intelligence Technology and Applications. A Technology Title,
Applications, Technology Description, case history summaries and the
NSA's Behavioral Modification Procedure Outline documented for the
non-technical person.
2. TECHNOLOGY TITLE:
1. Subliminal Implanted Posthypnotic Suggestions and
Scripts Using Acoustically Delivered and Phonetically
Accelerated Posthypnotic Commands without Somnambulistic Preparation
in the Subject for Intelligence and Counterintelligence Applications
by the United States National Security Agency. "Computer Simulated
Subconscious Speech Language".
3. APPLICATIONS:
1. Intelligence:
1. Used on foreign and domestic diplomats, spies, and
citizens to gather intelligence, steal advanced technology for US
Defense applications. Surveys of citizen's opinions to government
events and propaganda. Heavy survey use during times of war, economic
strife and political elections. War against drugs. Used to identify
investments that have high yield to support clandestine operations.
Used to direct field agents without the agents having to carry
communications hardware and encryption devices.
2. Counterintelligence:
1. Used on foreign and domestic diplomats, spies, and
citizens to identify intelligence operations; scope, participants,
communication methods, and weaknesses in individuals, systems,
equipment, or signals that can be exploited. Additional applications
include misinformation
dissemination, confusing and confounding leaders during critical
decision moments, distorting significance of various facts to sway
decisions and actions in US favor, behavioral modification of foreign
spies to betray their loyalties, self initiated executions (suicides).
3. Behavior Modification and Accelerated
Resocialization:
1. This technology is used to develop and control spies,
political candidates, and other public figures through psychological
intimidation, fear and extortion.
2. The NSA uses this technology to resocialize
(brainwash) the US civilian voting population into "Giving their lives
to Christ" (giving up their personal will and civil rights to the
NSA). Each subject is required to maintain a "Personal Relationship
with Jesus Christ" (following the precepts of the Bible and doing
what is ordered by the NSA). The technology is also used to monitor
and optimize NSA employee performance and loyalty.
4. DEFINITIONS AND ACRONYMS:
1. Age Regression: The act of bringing back past
memories in a subject though the use of hypnosis. The memories can be
very vivid and real in the mind of the subject.
2. Hypnoamnesia: Temporary loss of memory due to a
posthypnotic suggestion.
3. NSA: United States National Security Agency, Fort
Mead, Maryland.
4. ODO: On-Duty Officer, or officer-on-duty.
5. Posthypnotic Command: Same as Posthypnotic
Suggestion. This term "Command" is more commonly used when the
hypnosis is forcibly given to the subject and when the subject's will
has been broken down though the use of REM Sleep Deprivation and
Suggestibility Index increasing drugs like CNS and Cardiovascular
Stimulants. The exposure to extreme REM deprivation and select
chemical stimulants cause the subject to
have no ability to resist the "Suggestion" any longer thereby making
it a "Command".
6. Posthypnotic Suggestion: A subconscious suggestion or
command resident and potentially active in the subject following a
hypnotic trance or period of direct access to the subconscious mind.
7. Posthypnotic Suggestibility Index: An index or rating
of a subject's susceptibility and sensitivity to hypnosis.
8. REM DEP: Abbreviation for REM Sleep Deprivation or
REM Deprivation. A subject deprived from REM Sleep has multiple
symptoms i.e. reduced protein synthesis, black circles around eyes,
loss of short term memory, confusion, impulsiveness, anger,
frustration, diminished self-esteem, increased suggestibility, reduced
productivity, apathy, and depression. Long term REM Deprivation
results in death.
9. Script: A carefully constructed series of words
arranged in the form of a posthypnotic suggestion. The script will
generally consist of four separate parts;
(1) an identifier (subject's name, description, or other
identifying factor), 10. Somnambulatory State: An abnormal condition of sleep
in which motor acts (like walking, running) are performed. This state
is typically achieved and a prerequisite to traditional hypnosis.
11. Subliminal Implant: A posthypnotic suggestion
successfully delivered to the subject's subconscious mind.
12. Transceivers (NSA): Nearly microscopic electronic
surveillance devices that collect and transmit encrypted audio, color
video, and location coordinates collected at the subject site to NSA
Satellites that in turn forward it to NSA central intelligence
operations. The devices also receive encrypted audio scripts from NSA
central intelligence operations through the satellites and deliver it
to the subjectĘs site in the form of a subliminal posthypnotic
suggestion. These devices are approximately the size of the head of a
straight pin and can be concealed in houses, offices, automobiles,
planes, and
street corners.
5. TECHNOLOGY OVERVIEW:
1. In addition to the ability to see and hear what is
going on inside people's homes, vehicles, and businesses through the
use of nearly microscopic digital surveillance technology, the NSA is
able to interrogate and influence a person subconsciously without the
knowledge or consent of the subject.
2. Thought Labels (Response Labels):
1. Have you ever watched a baseball game? Did you see
the catcher and pitcher communicate using a series of itches, baseball
cap rearrangement, and clothing tugs? An elaboration of this
communication technique is used by the NSA to detect a fleeting
thought in a subject or "read minds" so to speak.
2. Lets discuss how an itch, clothing tug or even an
innocent sneeze can be used to label a thought. For simplicity, we
will call itches, clothing tugs, sneezes, coughs, or involuntary
muscle spasms that are performed during subconscious interrogation
"thought labels".
3. Post-Hypnotic Delivery Method:
1. The NSA combines hypnosis and thought labels to
interrogate people without the subject being aware of it. "How can
hypnosis be used?" you might ask. The subconscious mind operates at a
speed of about 1200 to 1400 words per minute. This is many times
faster than the conscious mind that operates at 250 to 450 WPM (words
per minute). The posthypnotic script can be spoken at fast
conversational speed approximately 250 WPM and a recorder or a
computer speeds up the message up to approximately 1200 to 1400 WPM.
Remember what happens when you play a 33 rpm record at 78 rpm? The
resulting voice sound
like the old American cartoon characters the Chipmunks. This is only
slightly past doubling (2X) the delivery speed. At speeds as high as
1400 WPM, the voices would sound like a high pitched chattering whine.
Remember when the words "Drink Coca Cola" were written on one frame of
a movie in a theatre back in the 1960s? The frame rate in movies is
played at 30 frames/second. At 1/30th of a second the conscious mind
could not recognize the message but the subconscious mind could read
it clearly. The audience increased their Coca-Cola consumption by 65%
that night resulting in the Federal Government prohibiting subliminal
advertising. The following probable reasons for not achieving a higher
percentage of subliminal delivery effectiveness (> 65%) are described
as follows. In that 1/30th of a second some people were blinking, some
people were looking around the theatre, looking at spouses, children,
candy, popcorn, etc. or they had sufficiently poor eyesight that they
could watch the movie but could not distinguish the small writing
clearly.
2. In the early years of this technology, the NSA
originally recorded a spoken posthypnotic suggestion message into a
tape deck and sped it up by speeding up the tape. This process was
labor intensive, required each officer to have excellent diction and
mastery of the language and dialect required, and was of poor quality
due to background noise and
the delay in timing during recording and processing. It also required
extensive training to assure that each officer spoke at the same rate
of speed so that the resulting "sped-up" script was delivered at the
correct speed. Now computers are used to append digitized samples of
optimized, ideal phonemes together to form words and the words are
sped-up to the correct delivery speed. Where dialects are present, a
different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the
variety of languages on the planet, phonetic elements from each
language and distinct dialect are sampled, digitally edited to
optimize them, and appended during delivery to form words and words
arranged to make sentences in the from of scripts that resemble
hypnotic suggestions. The empty space between words is minimized and
pitch rise is compressed and filtered. Repetitive sine waves are also
removed from the phonetic element's acoustic wave train thus reducing
the actual
number of sine waves making up a word by 50% or more. This reduces the
actual length of the time it takes the phoneme to be delivered prior
to accelerating (speeding-up) the delivery (like fast forward). This
helps the message to be played at higher speeds and reduces the
subject's ability to recognize it as accelerated speech. The technique
of using optimized digitally sampled and edited phonemes appended
together to for words and then sentences structured as hypnotic
suggestions can be termed "computer simulated subconscious speech
language".
4. The subconscious mind is also very sensitive. It can
hear things that the conscious mind ignores. If you have watched
television, you have probably noticed that there are many "subliminal
tapes" on the market to program your subconscious mind. These tapes
have their "messages" recorded/hidden in the sounds of ocean waves,
music, or
other sounds but they are not sped-up to subconscious delivery speeds
and are therefore not very effective. The subconscious mind can hear
and discern the message even when there is background noise like
waves, cars, planes, or even when someone else is speaking to you in
normal conversation. Your conscious mind won't hear anything unless
it is very quite in the house. If you are very attentive you may hear
what sounds like a low-pitched tape on fast forward, and played at low
volume. This is the sound of the NSA's high-speed audio subliminal
message.
5. This modification of the phonetic elements, played at
low volume, combined with the environmental background noise makes it
very difficult for a subject to record the NSA message. Even if the
subject were to effectively record the message, it is very difficult
to filter (separate) the NSA's message from background noise. Then,
reconstructing the missing sine waves from the acoustic wave train and
slowing the message down to discern the actual content of the
"posthypnotic" script with the conscious mind would be nearly
impossible for the average citizen. To briefly summarize, the subject
would have no chance in analyzing a NSA message without the following
items:
1. Professional state-of-the-art technology recording
equipment. 6. This technology is the perfect intelligence tool. It
is nearly impossible to detect or measure, difficult to trace back to
the NSA. The symptoms that the NSA can "program" or inflict into the
subject can cause fear that they might be thought to be insane if
they were to report the NSA activities. The subject does not know
the source of the technology or the technology itself, the subject has
no proof
or evidence, only their perception, suffering, and isolation.
Additionally, potential recourses that are available to the subject
can be interrogated out and preventative actions taken by the NSA to
further isolate or disable the subject.
4. Using the Post-Hypnotic Delivery Method with Thought
Labels:
1. The NSA technique is simple; they transmit their
human programming message through the audio-visual electronic
surveillance equipment installed in your home, car, or office to you.
The subliminal message delivered to you could be "Mr. Jones, imagine
that the IRS were auditing your taxes. Think back to a time you have
cheated on your taxes and that you are worried that the IRS might find
out in an audit. If you have never cheated on your taxes and have
nothing to fear you will feel an itch on your right-hand ear lobe that
will go away when you scratch it. If you can be caught by an IRS
audit, you
will feel an itch in the left nostril of your nose that will disappear
after you itch it twice." From your perspective, you have just had a
fleeting thought about your past tax returns and had an innocent itch
(thought label). To the NSA Officer On Duty (ODO), you have just
communicated to him whether you have ever:
1) cheated on your taxes, and: 2. This is a very oversimplified example of a typical
NSA interrogation. Actual interrogation messages may consist of
several hundred words and be very complex and sophisticated. Most
messages consist of several dozen words. Yes indeed, the NSA has
exceeded the wildest expectations of the book "1984". As you can
imagine, the spy world has reached a new plateau that directly affects
every person in the USA and abroad. This electronic surveillance
system extends down through Mexico, Central America, and deep into
populated regions of
South America. It also has been installed in Australia, Africa, and
the free-world countries in Europe.
3. The NSA's goal is to have the whole world under its
electronic eye by the year 2000. They are almost there now, but are
having difficulties with high-tech countries that have the
counterintelligence resources to identify the high frequency bursts of
microwave transmission from the transceivers. The system also has the
ability to take a "voice print" from any person and place it on file.
This file can be used to locate the subject later by comparing it to
real-time surveillance audio samples received from the field as long
as the subject is speaking in close proximity to a transceiver. If the
person is aware that the NSA has this capability and remains silent,
the NSA can transmit a periodic worldwide subliminal message that
addresses the person by name and causes them to dream and talk in
their sleep. After the person talks, the voiceprint would be
eventually identified and the person's location can be identified
nearly anywhere in the world. Yes, it is a small world, and getting
smaller all the time.
4. This technology was originally conceived under CIA
studies and fascination with the power of hypnosis in the late 1950's
and perfected by very early 1960s and implemented with unlimited
resources to all areas of vital national security interest first.
Originally, after noting the behavioral effects in visual subliminal
effects like the highly publicized event where stating "Drink Coca
Cola" on a single movie frame "delivered a higher rates of speed than
normal movie viewing raised the obvious question, "Does the human
hearing
work as good as eyesight accepting subliminal messages?" Preliminary
theory work was transferred to Fort Mead NSA who had expertise in
characterizing language in analog domains where a sampled phoneme
could be edited (shortened by removing excess sine waveforms from the
"acoustic wavetrain") and electronically reconstructed back into
shortened words of language. Some of the early experiments included
"Remote Viewing at NSA where the Viewer would relax, open their mind
and explain the clarity of images that were described by the NSA using
this technology. These early experiments allowed the NSA to refine the
specifications of the "Computer Simulated Subconscious Speech
Language" and the scripting formats to maximize the ability to deliver
an accurate "vision or picture" into the subject. Pictures already
seen by the subject could simply be recalled using "Age regression"
script variations.
6. OTHER REFERENCE MATERIAL:
1. Please refer to the book "Inside America's Most
Secret Agency, The Puzzle Palace" by James Bamford, Published by
Houghton Mifflin Company, 1982. This book contains extensive
information and references on the NSA's history and the NSA's first
surveillance system that originally only eavesdropped on telephones
and is now expanded to audio-visual.
7. NSA CASE HISTORY EXAMPLE SUMMARIES:
NSA Self-Initiated Execution (Suicide):
1. Bamford's "The Puzzle Palace" references one of the
NSA's first self-initiated execution (suicide) with this "Thought
Control" technol ogy they developed. The NSA employee reportedly ran
off NSA property saying demons were in his mind and he killed
himself. 1. A University of California at Berkley student that
went into a bar on or around November 27, 1990 took hostages and
insisted to the police that the CIA Director talk with him so that he
could get relief from the suffering. The young man had sent letters to
the president and the CIA but the requests had fallen on deaf ears.
After the young man panicked and shot a customer in the bar, a SWAT
team fatally shot
him, the San Jose police found copies of the letters written to the
President referring to people that could "read minds" and that he had
learned how they do it. The NSA had been unsuccessfully brainwashing
him and had no alternative but to terminate him to assure their
security. It is interesting that what was originally broadcast on the
news "The gunman was demanding to talk with the Director of the CIA"
etc. disappeared quickly (suppressed?) from later news accounts.
3. NSA Initiated Execution to Cover-up in Music:
1. Curt Cobain of the musical group "Nirvana" was
another victim of NSA brainwashing and was terminated by NSA. Cobain
had started writing clues to the NSA activities into his music to
communicate it to his music followers. He referred in music to the NSA
as the "Friends inside his head". Once the NSA puts on the highest
level of brainwashing pain, the subject expires quickly. Cobain used
heroin to numb and otherwise slow the effect of the brainwashing.
4. NSA Initiated Executions in Overseas Defense Project:
1. Some years back several employees of the United
Kingdom's Government working on a top secret Radar Project committed
suicide with no apparent penetration by a hostile government, drug
abuse or any other commonality other than working in a secured
government project. They were not "Staged" suicides (murders) because
some of them happened behind doors that could not be opened from the
outside. These men were subjected to the same technology and processes
that the U.C. Berkley student, the NSA officer, Curt Cobain, and
thousands of
others have experienced.
5. Musical references of NSA Technology:
1. Talking Heads; a music group popular in the eighties,
wrote a song explaining the scientific process of the NSA's
brainwashing technology in a song called "Wild Wild Life". The song
gave an example of what the audible transmission sounded like at the
end of the song (like a tape on fast forward). They mentioned in the
song that "They (NSA) talk so fastą" and that the musical group had
spent "All their time
and money" unsuccessfully trying to find a place that the NSA would
not be able to harass them. The Talking Heads exposed the technology,
gave an example of what it sounds like, scenarios of how the NSA might
select you or the brainwashing, and the scope of the electronic
surveillance system.
6. NSA Counterintelligence Experiments:
1. Many experiments were performed by the NSA to
determine the conditions and procedures that would be required to turn
spies that were trusted by US enemies into assassins that we could
invisibly manage. In early experiments, the resulting NSA experimental
subjects would get extensive attention in the news because of the
horror and unusual nature of the atrocity.
2. One example that comes to mind happened several years
ago and created much news. A man became obsessed with his son, poured
gasoline on him and ignited it. He had planned to do the same to
himself but his desire for survival overpowered the NSA's behavioral
conditioning. After he was imprisoned, he spoke about how all of a
sudden his mind became clear and he couldn't figure out how he could
do this crime. The hypnosis was simply removed and the subject was
allowed to sleep so that experts studying the file would not find out
anything if the subject would have been subjected to traditional
hypnotherapy or other
psychoanalytical techniques. Another successful counterintelligence
experiment completed with no liability or traceability to the NSA.
3. Perhaps ten years ago I read of several elderly
people died of sleep deprivation in Florida. The doctors tried
everything they could do but could not stop the sleep deprivation that
resulted in a 100% effective termination yield. The NSA had developed
the right combination of delivered anxiety scripts combined with
muscular tension and delivery schedules optimized according to
decreasing post hypnotic durability over time as the subject's health
degraded.
4. David Koresh of the Branch Davidians spent many hours
talking with FBI negotiators about God and the Bible and finally
waited for "God" to tell him what to do in the final hours of the
siege. The compound probably had numbers of Personal Journals
(required for subjects by the NSA during brainwashing) that could lead
to questions about how this cult came to this level. Additionally,
just like other loose ends
the NSA had to secure, "God spoke to them and said to commit suicide"
and they did securing another one of the NSA's great experiments in
mind control and social pathology.
5. A friend of mine, David Sautter and I worked at
Singer, Kearfott Division, producing government weapons where we
worked under a multi-tier security system; Company Security, FBI, DIA,
and at the top of the ladder watching the watchers; the NSA. I
discussed the NSA's technology with Dave and a few months later, I
heard he had committed suicide inside of a locked room. This theme
should familiar by now and the details of the case will be destroyed
or rewritten by NSA influences to preserve national security.
7. The cases of NSA activities go on and on. With access
to the FBI's Crime Information Center (CIC), we could find several
thousand files having the characteristic patterns where the NSA had
experimented on the individuals with their "Thought Control"
technology.
8. Currently, the NSA has many subjects in the field
(our society) that need only a series of "triggers" (carefully
constructed posthypnotic scripts) to send them over the edge and on a
mission to kill. The NSA calls them "Shooters on a Shelf". A recent
example was Russell Eugene Weston, Jr. that went on a shooting spree
at the Capitol around July 26, 1998. He was diagnosed with
schizophrenia, had delusions that he had an affiliation with the CIA
or FBI and thought a radio-tracking device was planted in his tooth.
He was a product of
NSA brainwashing. He did not have the ability to recognize the
advanced technology even though he knew that "someone" (CIA, FBI,
etc.) was communicating with him and that this communication ability
spanned across the USA leading him to believe that he had a tracking
device planted on him. Because of the real effects of the NSA hypnosis
treatments, he therefore reasoned that the schizophrenia medication
would not help and so he quit taking it. This was a man desperately
trying to alleviate the suffering the NSA inflicted on him.
9. Through the years, I have met thousands of people
that have been brainwashed into Christianity to a level where God
tells them what to do in their minds (described as a gentle voice by
victims) and they mindlessly obey. Yes, they have "Friends inside
their heads" also. It appears the Biblical Anti-Christ in the Book of
Revelations has arrived and is convincing many subjects that Jesus is
back on earth and directing them.
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
1. The following procedural outline documents typical
techniques, processes, explanations, and definitions of the National
Security Agency's Behavioral Modification Procedure using Subliminal
Implanted Posthypnotic Suggestions through acoustically delivered
phonetically edited language elements combined into scripts without
somnambulistic preparation in the subject.
2. In simpler terms, the subject is unknowingly given
hypnosis while the subject is completely awake and is tortured and
punished with this hypnosis into a predetermined behavior by the
National Security Agency. The behavior is usually extremely religious,
is called "reborn" by the church, with the subject's life-long goal of
"a personal relationship with Jesus Christ".
1. ABSTRACT, Behavioral Modification:
1. The NSA's behavioral modification process starts with
identification and qualification of the subject. The NSA used to
choose subjects based on the subject's net present value to the agency
in public visibility, financial resources, political clout, or other
intelligence and counter-intelligence reasons. Additional
considerations are given to minimizing security risks of exposure, the
subject's posthypnotic suggestibility index, the subject's
intelligence and reasoning ability, moral and superstitious beliefs,
and the subject's social status and the weakness of the subject's
primary support groups (family). Now a recent report referenced in the
March 26th Business section of the Orange County Register from the
National Sleep Foundation reports that 40% of Americans are
experiencing sleeping problems. This news could indicate that the NSA
is broadening its influence to the greater public. As explained below
in this document, the NSA always starts its behavioral modification
process with REM Deprivation.
2. After selection, the subject is subjected to long
periods of REM Sleep Deprivation and reinforced torturing posthypnotic
suggestions that will breakdown the subject's will, confidence,
self-reliance, and moral values. Meanwhile, the subject is
increasingly isolated from their familiar and trusted peer groups
causing the subject to experience depression, apathy, and ultimately
social and financial failure.
3. Typical post-hypnotic induced delusions reported by
subjects are tingling in various areas of the body, which are thought
to be resulting from microwave beams. Hearing ticks thumps or cracks
from walls, ceilings, clocks, lights, etc. Beliefs that the subject's
neighbors are conspiring against them, or that the subject is being
followed. Sometimes subjects believe that the various perceptions,
feelings and experiences are the result of "Implants" in their body.
It is important for the subjects to understand that the NSA controls
this technology from nuclear hardened underground shelters and the
neighbors next door have nothing to do with the subject's experiences.
Nobody has the time or inclination to follow a subject around with a
microwave gun to tickle various parts of the body. We are saturated
with microwaves all the time from television stations, communication
satellites, etc and yet we do not have any symptoms because microwaves
do not have the ability to trigger localized synaptic responses in our
brains. Furthermore, when the subject is in a room surrounded by
several people, and the subject is the only one experiencing the
"thoughts", tingling feelings, etc., then obviously a delivery method
is being employed that affects only the subject; high-speed acoustic
delivered hypnosis.
4. After a while, the subject has an emotional breakdown
and a new support group is built around the subject. The new support
group is typically a church with doctrines centered in the Bible but
the NSA also uses cults and other social groups. The NSA prefers
Christian churches because the doctrines allow "God or Jesus to speak
directly to the subject" and the negative reinforcement can be
attributed with Satan and the positive rewards can be considered to be
blessings from
God thereby masking the NSA's technology and processes. When the NSA
uses other relationships without in which the subject experiences a
religious awakening and "Gives their Life to Christ" and the NSA
achieves total control of the subject.
5. The subject is slowly released from the damaging
uncomfortable hypnosis and it is replaced with positive
rewarding hypnosis as "God and Jesus works in their life". Soon, the
subject has complete loyalty to Jesus (AKA: NSA) and will do anything
on command from Jesus (NSA).
6. The subject is required to give daily status reports
in the form of prayers in the privacy of their home, office, or car
where the NSA's electronic surveillance system captures and sorts the
prayers by "Keywords". The NSA then delivers additional hypnosis in
the form of punishments or rewards or directs the subject accordingly
to "God's
will". If the subject resist's the NSA's instructions, additional
punishments are inflicted on the subject.
7. The subject is institutionalized in this system where
any nonconformances committed by the subject are watched, critiqued,
and reported on through prayer by other "Christians" to the NSA. Thus,
the new church peer group acts as a behavioral reinforcing mechanism
that will bring any of the subject's problems to the NSA as they have
been trained themselves (this is similar to the Nazi Gestapo of World
War 2 and other communist approaches).
8. A subject that has successfully completed the NSA's
behavioral modification program lives out the rest of their mediocre
life in service to Jesus (NSA) and never causes any waves in the
church or news media for fear of reprisal from the NSA. The subject's
lives are relatively unproductive because their focus is on their
"Life after death" and not what they accomplish while they are alive.
They avoid "worldly activities", and usually are confused and
disjointed in rational thoughts and concepts. For instance, they don't
believe in
anything that is not in the Bible, i.e. dinosaurs, evolution, space
travel, even though they ride on airplanes and watch television both
of which are not referenced in the Bible.
3. BEHAVIORAL MODIFICATION PROCESS:
1. Triggering Techniques:
1. The NSA minimizes security subject might recognize
when the NSA was not actively watching causing a security concern and
it would be cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when
using negative reinforcement continuously. It is not practical or
economical to watch a subject continuously to apply real time
deliveries. Additionally, using all three script delivery patterns
confuses the subject, causes the subject to believe they are always
being watched, and maximizes behavioral change over time though
continuous pressure.
2. Real-Time Subconscious Implant Delivery:
1. Real-time means that the NSA ODO is transmitting the
posthypnotic command script to the subject and observing the subject's
response. This technique is required for subliminal interrogations.
All NSA standard posthypnotic command scripts can be delivered
real-time. This form of delivery can precipitate the perception of a
"voice" heard in the mind of a subject to give them information (true
or false) or orders depending on the purpose of the NSA's activities.
3. Prescheduled Subconscious Implant Delivery:
The NSA central switching computer can transmit a script
to a specified subject at a pre-specified time. The transmitted
script's transmission range can be limited to a single building, a
city, or a large geographical area (i.e. North America or Europe). By
having prescheduled scripts, the subject has seemingly randomly
occurring thoughts and feelings that can't be associated with a
commonly recurring situation like event-triggered scripts precipitate.
4. Event-Triggered (conditional) Implant Delivery:
1. Posthypnotic subconscious implants that are triggered
(activated) with an event, thought, or code word (event-triggered or
conditional) are strongly experienced by the subject and are powerful
tools for reinforcing a predetermined desired behavior and inflicting
delusions.
2. This type of posthypnotic commands are the ones most
commonly used by hypnotherapists to help people quit smoking, study
better, or in general, change behavior (behavioral modification).
There is extensive information on the Internet and college libraries
about this form of posthypnotic command delivery and how to "script"
and use them.
3. The NSA can reinforce a predetermined desired
behavior by associating a subconscious implant (negative or positive
reinforcement) with an event. An example is that when the NSA want's
to isolate the subject from the company of a specific person place or
thing, the subject will be implanted with a feeling of increased
anxiety, hostility, tension, simple discomfort, or a feeling of a lack
of peace. When the subject leaves the person, place, or thing, another
posthypnotic implant is triggered that rewards the subject's behavior
with a feeling of relief from the anxiety, hostility, tension,
discomfort, and peace is restored in the subject's mind. Example: This
script will always cause a girl or boy not to sleep with the opposite
sex: "You will feel very tense and not be able to relax if you kiss,
sleep with, or stay long at your (boy or girl) friend's house and you
will feel a deep peace when you leave their house to go back home".
These types of scripts left unmanaged and not removed can cause great
harm as the subject develops and social conditions and behaviors
change over time.
4. It should be noted that the NSA precisely tailors the
type of negative and/or positive reinforcement, the degree of the
reinforcement, the duration of the reinforcing effect and the
conditions of the trigger. This posthypnotic event-triggered
reinforcement can be initiated gradually and can remain so subtle that
the subject believes that the discomfort is naturally occurring and
that it is the subject's decision uninfluenced by anyone else that the
subject should avoid the person, place or thing.
5. This subconscious implant can be combined with other
implants like a posthypnotic-triggered thought to enhance the
subject's decision toward the situation. For example the subject can
be subconsciously implanted with a command to be very sensitive to the
changes in their feelings and to feel great about making strong
decisions to take charge of their lives. This can be reinforced with
another posthypnotic suggestion to avoid all the situations that cause
the subject discomfort and that each time the subject commits
himself/herself to removing a situation of this kind in their lives,
they will feel an increasing control over their lives. Note that as
the subject perceives an increasing control over their lives they are
actually losing control to the NSA proportionately. Numerous other
examples exist and it is beyond the scope of this document to document
every possibility.
5. Stage 1 (Prescreen Evaluation):
1. The subject's Posthypnotic Suggestibility Index is
determined by a series of simple tests. Hypnoamnesia is applied to the
subject for the name of an object or individual and the subject's
speed is timed to determine how quickly they can overcome or not
overcome the posthypnotic suggestion "You will not be able to remember
the name of "____" no matter how hard you try. Other posthypnotic
suggestions can be used to create fear or discomfort in the subject
that can be remedied by flight or movement. The subject must overcome
a posthypnotic suggestion that they cannot move no matter how hard
they try. In summary, a posthypnotic suggestion is given to the
subject and
the subject's ability to overcome it is evaluated.
2. A full study of the subject's religious,
superstitions, fears, and insecurities is made through standard
subliminal interrogation techniques and behavioral observation.
3. Interrogation scenarios are presented to the subject
using standard subliminal interrogation techniques and somnambulistic
interrogation techniques. The standard two types of scenarios are
"Open-ended Questions" (similar to multiple choice with response
labels pre-assigned to each choice) or "Reject if Disagreeable"
(negative response label if the subject disagrees). More advanced
techniques of interrogation scenarios are used as required or as
determined by the
experience of the ODO.
4. Real-time observation, standard subliminal
interrogation techniques and somnambulistic interrogation techniques
are used to determine the subject's overall social status, abilities,
attitudes, and communication skills with primary support groups and
friends.
5. Scientific understanding and practical applications
experience in the fields of psychology, hypnosis, and problem analysis
are considered risks in the subject that may complicate or inhibit
subsequent behavioral modification processes. Once the subject
identifies the technology used it is nearly impossible to contain the
potential security breach without terminating the subject. Most NSA
initiated executions (suicides) are the result of the subject
identifying the technology used or carelessness on the part of the ODO
managing the file.
6. The NSA technology affords powerful control over the
subject, the subject's environment, and the subject's ability to plan
and implement a disclosure to appropriate Government Agencies. When
the subject finally does achieve a disclosure, the subject's physical
and mental condition is depleted. The subject's ability to communicate
concisely has been arrested, and the subject has already been set up
and
dishonored in the sight of local and federal law enforcement agencies
to assure the subject's testimony is questionable and unsubstantiated.
Where the NSA feels that these steps cannot be achieved in medium risk
subjects, the NSA will not recruit the subject into the behavioral
modification process.
6. Stage 2 (Standard Process):
1. This stage is where most subjects are behaviorally
modified to serve and follow "God" (AKA NSA management of the
subject's civil rights). If the subject accepts religion and direction
at this stage the NSA reinforces the subject's relationship with Jesus
and closes the file. This shortened program receives the maximum
return for the NSA for the least investment and minimizes the
security risk. It also
causes the least amount of damage and institutionalization in the
subject.
2. Coincidence:
1. Coincidence is used to create the perception in the
subject that supernatural events are beginning in the subject's life.
A combination of posthypnotic commands and pre-information awarded to
the subject prior to an upcoming experience that the NSA intelligence
system has discovered gives the subject a feeling that "God" or some
other supernatural being is taken interest in their life.
2. The following is one typical technique used by the
NSA. NSA Intelligence gathers information regarding the topic of the
sermon in the subject's church. This information is gathered through
electronic surveillance equipment installed in the church. The NSA
then implants a posthypnotic command that triggers the subject's mind
into concern and contemplation about the sermon's topic prior to going
to church. When the subject hears the sermon, the sermon seems to be
speaking directly to the subject that adds to God's mysterious and
unexplainable ability to address the innermost concerns of the
subject, especially when the subject has not shared those concerns
with any other human being.
3. Another typical method used by NSA concerns tragic
events occurring to loved ones. NSA Intelligence receives a local
broadcast or preliminary information through electronic surveillance
that a subject's relative has been injured or killed. The subject is
given a posthypnotic suggestion that a feeling of dread or loss is
welling up inside them and they are directed to think of that
particular loved one. When they are finally notified through official
channels, the subject believes that they have special powers,
insights, or communications from God, aliens, or other entities.
3. REM Sleep Deprivation:
1. The Rapid Eye Movement (REM) stage of sleep is
controlled and usually limited to one to two cycles per night
resulting in micro-sleeps during the day. REM deprivation inhibits
short-term memory, concentration, tactile abilities, verbal
articulation, reasoning, and self will. Protein synthesis is inhibited
and thereby reduces the subject's ability to heal after physical
damage or after periods of extensive exercise. The result is that the
subject's general health degrades as does social bonds and work/school
performance.
2. The NSA performs control of REM Sleep through various
methods. Posthypnotic implants can be implanted that place a subject
in a light sleep (posthypnotic trance) with various combinations of
muscular tension and computer cycling implant deliveries (to be
discussed later).
3. Subjects typically complain of no sleep, restless
sleep, waking up every hour on the hour, staying awake until the hour
they have to get up, waking up an hour after they retire and not
returning to sleep, and typically cannot recall any dreams.
Additionally, they will complain of repeating torturing thoughts,
racing thoughts, and facial itching and numbness. Daily fatigue, poor
recall of names, and caffeine consumption is typical.
4. Dark rings' surrounding the eyes is evident and the
darkened area around the eyes can be reported as sore or tender by the
subject. The subtle perceptual impairing effects of REM deprivation
make it more difficult for the subject to identify the REM Deprivation
problem. When the REM depravation onslaught is gradual and accompanied
by a posthypnotic command that the subject "will feel energetic and
rested", the subject will not recognize the REM Deprivation.
Additional posthypnotic commands can be implanted that will make it
difficult for the subject to "see or perceive" the rings surrounding
their eyes. I have seen many subjects with very dark eye rings and the
subjects could not recognize them at all.
4. Shame Factor Enhancement:
1. Various posthypnotic suggestions are implanted in the
subject after a week or so long period of REM deprivation. The content
of the posthypnotic scripts is constructed to cause the subject to
perform embarrassing and otherwise shameful acts (usually sexual but
always anti-social). These shameful behaviors are used by the NSA
later to shame the person into a lower self esteem, reduced confidence
in their
own self discipline, a need for forgiveness from God. These
embarrassments provide a means to Blackmail or discredit the subject
if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement
agency to document the behavioral discrepancy to retain anonymity. The
NSA has been known to help subjects avoid prosecution to gain loyalty
or create an adversarial relationship between the acting agency and
the subject
(another intimidation factor) even though the NSA was responsible for
creating the behavioral problem in the subject's life.
5. Religious Relevance and Convictions:
1. The NSA typically implants posthypnotic suggestions
that are clearly referenced in the Bible. The subject may be punished
(through negative reinforcement) by anything that is referenced in the
Bible to substantiate the validity of the "Word of God". When the NSA
does not
follow the standard Biblical references, most subjects fail to
recognize the contradictions out of ignorance or an inability to
rationalize, or, they find other ways to justify the events to receive
peace from God (NSA). This component of the NSA process is to provide
the subject with an increased sense of fear and intimidation resulting
from God's presence and force. "Thou shall not disobey God".
6. Paranoia:
1. Paranoia is a powerful tool used by the NSA. It
provides a means to develop the subject's distrust of other people
including the subject's primary group that could provide positive
support during this time of distress in the subject's life. Paranoia
is often recognized and discounted as a character fault by most
peoples in American society and therefore discredits the subject's
testimony even further. Uninformed, but well wishing people including
friends, may recommend to the subject to pursue counseling. This
negative feedback can make
the subject fear that people will believe the subject is crazy.
2. When the subject seeks professional counseling, the
result will be a misdiagnosis with an expensive, inappropriate and
ineffective treatment. The observed symptoms result from simply
hypnosis, not biological, chemical, or environmental stresses. A
misdiagnosis strongly motivates the subject not to communicate their
experiences to others to avoid social disgrace of a "schizophrenia"
label and additional financial burden. This isolation of the subject
and their
reluctance to communicate their experience to others reduces NSA
security risk. The NSA cannot allow the subject to share information
with other subjects that have already experienced the program and
thereby starting a pool of information that could be compiled and used
to expose the NSA system.
3. The subject is led to believe that the subject's
neighbors, work associates and/or family are conspiring against the
subject through a number of scripts delivered to the subject by the
NSA. The NSA can further complicate the conspiracy delusion by using
the same technology to have a work associate ask the subject a
question or to
make a comment that can be used by the NSA to confirm the subjects
fears. This technique further isolates the subject from trusting their
peer groups, causes additional emotional distress and hostility toward
these people. The subject sometimes resorts to violent behavior, which
is viewed by observers as irrational, unprovoked behavior that may be
treated as criminal behavior by law enforcement personnel.
7. Stage 3 (Extreme Process):
1. This method is very severe and usually results in a
two to five year program. Because of the severity of the suffering,
the subject is usually permanently impaired for integration into
normal mainstream life and is essentially institutionalized. The
result is that the subject must reside in a less competitive
environment like a church group. Subjects that receive this program
tend to be highly superstitious, are agitated easily when objective
evidence that contradicts their belief system is presented. They tend
to believe in the spiritual world (demons, ghosts, god, spiritual
entities, etc) and consider the spiritual world to be more powerful
and important than the material or real world. This program basically
follows the following steps; REM deprivation, breakdown of self esteem
and confidence, intense suffering, exaggerated conscience, spiritual
contact, reborn in Jesus Christ, Spiritual battle, release (saved by
the Savior), and recovering (blessed by Jesus Christ). Whenever
possible the NSA will skip or reduce these steps to minimize security
risk and financial cost.
2. Increasing Dependence on Drugs and Alcohol:
1. As the REM Deprivation increases the subject must
depend on Central Nervous System (CNS) Stimulants to compensate for
degradation of productivity at work, school, and in interpersonal
relationships. This serves the NSA in several ways. Use of drugs
(especially CNS stimulants) increases the subject's index of
suggestibility. Or in other words, the post hypnotic commands are more
effective and the subject has greater difficulty resisting the
impulses generated by the commands. In addition, the increased stress
of coping with the drugs in conjunction with the resisting the newly
introduced posthypnotic
commands serves to push the subject closer to an emotional breakdown.
If the subject uses illegal drugs, the NSA tries to set the subject up
for a conviction to get assure that the subject looses credibility.
Who would believe a drug user that claimed that he/she was being
harassed by a government agency that was tormenting them with
hypnosis? It also serves the NSA in the program by documenting
something that the subject will be ashamed of when the program reaches
the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also
inhibit REM Stage sleep and increase irritability over time thereby
further degrading and isolating the subject.
3. In summary, the NSA benefits from the subject
responding to the REM Deprivation assault with self-medication. This
response discredits the subject by labeling them in society as a drug
user, it enhances the effect of the implanted posthypnotic commands
and it gives the subject a reason for shame that will be used against
the subject later to justify the punishment from "God". It should be
noted that the subject
is not really guilty of anything, except being a victim that was
manipulated in a carefully controlled scientific behavior modification
process.
3. Poor Nutrition:
1. The poor nutrition reduces the energy the subject has
and serves later as another justification of God's punishment. The
subject will be taught later that "the body is the temple" and that to
abuse it is to violate God's will.
4. Apathy:
1. After the subject's self-esteem is broken down and
continuing failure and persistent suffering start to dominate every
day, the individual becomes apathetic as a defense mechanism. At this
stage the subject has committed another sin of "not persevering
through faith" which is later used on the subject later to increase a
feeling of guilt.
5. Depression:
1. Depression precipitates as a result of chronic REM
Sleep Deprivation, social isolation and a feeling of helplessness in
the subject. Commonly, when the subject seeks professional counseling,
they are misdiagnosed and treated for depression with medications but
the root cause of the problem (negative reinforcing posthypnotic
suggestions inflicted over long periods of time) is not treated or
corrected.
6. Insecurity:
1. The subject starts to experience severe insecurity in
this stage. The NSA uses this insecurity against the subject in
several ways. Because of the impaired reasoning ability and emotional
isolation, the subject is susceptible to the approaches of insincere
people, which are used by the NSA to emotionally hurt the subject
more. This allows the NSA to convince the subject that people can't be
trusted and that only the NSA (Jesus) can be trusted. This serves to
isolate the
subject from supportive peer groups and makes the subject emotionally
dependent on the NSA resulting in the NSA gaining more power in the
subject's life.
7. Journals and Diaries:
1. Most of the subjects are directed to keep a "Journal"
or diary by the NSA so that the subject can record and review
feelings, events, observations, and "God's directions" that normally
would be unavailable due to short term memory loss during extended
periods of REM Deprivation. The NSA uses the Subject's Journals in a
variety of ways.
8. Degrading Spelling and Grammatical Performance:
1. Subjects in these prolonged stages of REM deprivation, confusion,
and emotional distress, have very poor grammar, spelling, and short
attention spans.
9. Slowed Speech:
1. Subjects experience slower speech and have a greater
time articulating concise points as a result of the REM Deprivation
and other performance degrading posthypnotic commands. Very slight
alcohol consumption can exasperate the damage of REM Deprivation and
precipitate slurred speech.
10. Confusion:
1. Confusion results from three primary sources; REM
Deprivation, specific posthypnotic commands to reinforce the
confusion, and the emotional damage and stress that is being
inflicted. The confusion allows the NSA to continuously inflict damage
to the subject's life without real-time observation. A confused person
generally is not as productive as an organized clear thinker is and
has a greater potential to offend people by what they say or do and is
less likely to recognize when they have made mistakes. All of these
symptoms assist the NSA's objectives in this stage and subsequent
stages. In addition, the confusion restricts the individual from
analyzing the source of their suffering and taking corrective actions,
and therefore
reduces the NSA's security risk.
11. Poor Concentration:
1. Difficulty concentrating impairs the subject's
productivity and restrains the subject from making self-improvements
and corrections in behavior. It makes it very difficult for the
subject to do any research or reading to evaluate his/her condition.
This paves the way for the NSA to demonstrate that the subject cannot
do anything on their own without "God", thereby increasing the
frustration and anxiety of the subject (inducing emotional breakdown)
and ultimately
making the subject totally dependant on the will of God.
12. Loose Association and Personality Disorders:
1. The subject experiences disjointed thought at this
stage (Loose Association) that appears to observers as a strange sense
of humor or inappropriate responses when engaging in conversations.
Ongoing sarcasm and other negative attitudes and undesirable
personality traits can be present.
13. Anger:
1. The way that the subject experiences anger is of
profound importance. If the subject allows the NSA to redirect the
increasing anger and hostilities toward the NSA to another person in
the form of violence (misplaced aggression), the NSA will reinforce
the violent behavior with posthypnotic commands. The result is a
person that can achieve national acclaim as a murderer that heard
voices of Satan directing him/her. Typically, the Subject is
encouraged to commit acts
of violence with spouses, friends, or employers resulting in further
social isolation and increased shame. Some examples of NSA directed
victims of misplaced aggression include recent US Postal Workers whom
work within the Postal Service. This is one of the vial "communication
intercept" channels the NSA is directed to monitor. The routes of
suspect mail and the postal worker processing it are continuously
monitored by NSA. Sometimes the NSA ODO takes issue with a Postal
Worker and harasses them or subjects the postal worker to behavioral
modification.
14. Delusions:
1. Delusions are used to discredit the witness and also
provide an additional source for fear, intimidation and confusion.
Delusions can be but are not limited to the Subject developing
conspiracy theories of fellow employees and friends, beliefs that
Angels or Demons are communicating or visiting them, tingling
sensations from microwave guns or implants, beliefs in supernatural
events, etc.
15. Audio Hallucinations:
1. Subjects often report hearing walls clicking,
footsteps in the house, the sound of someone trying to open the door,
drilling at the door, etc.
2. These audio hallucinations are also used to discredit
the witness and also provide an additional source for paranoia, fear,
and negative reinforcement.
16. Voices in the Subject's Mind:
1. The voices in the subject's mind are achieved in a
variety of ways using real-time and prescheduled posthypnotic
suggestion deliveries, and Noun Substitution implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion
implanted that changes the form of pronouns in the subject's internal
thinking. The result is the subject perceives that someone is telling
him/her to do something with nearly every thought. An example is; the
subject thinks, "I should go to church today". With the noun
substitution posthypnotic suggestion the subject experiences the
following internal thought, "You should go to church today!" Notice
that by implanting the posthypnotic command into the subject's
subconscious mind to think the pronoun "You" instead of "I" the
subject will perceive that they are being directed by a voice even
though the majority of the internal thought content is their own
naturally occurring thought. This subconscious implant can be used in
combination with other implants to increase the subject's perception
of threat, fear, and therefore paranoia. It can be used with other
posthypnotic suggestion implants that will give the subject the
perception of either a "good" or "evil" voice or spirit is directing
him/her. This implant is powerful because it gives the subject the
perception that the spirit, angel, God or Holy Spirit knows and
directs the subject's every thought. It provides a convincing proof
that "God knows every thought of his children". Subjects that don't
have a superstitious frame of reference and seek professional help are
usually misdiagnosed as schizophrenic.
17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed by
the NSA and typically has no pharmacological or biochemical basis and
is produced by a posthypnotic suggestion. It is often misdiagnosed as
ringing caused by excessive aspirin use and is actually an audio
hallucination triggered by hypnosis.
18. Complete Quiet Silence:
1. Used by the NSA as a positive reinforcement for two
general reasons; the subject has the tinnitus removed to indicate that
the subject has "The Lord's Peace Restored", and secondly, the subject
has achieved a milestone toward being released by God (the NSA).
19. Quiet Wind:
1. The audio hallucination of a quiet wind is used to
convince the subject that the Holy Spirit is visiting him/her. An
excellent example of this hallucination combined with the fear that
accompanies it is contained in Phil Collin's lyrics of a song that has
the chorus "I can get so scared, Listen to the wind".
20. Visual Hallucinations:
1. Visual hallucinations are usually implanted in the
waking moments when a subject is coming out of or is in a
somnambulatory state (light sleep) preferably in a darkened room. The
hallucinations are fleeting, usually lasting less than one minute and
are not durable. Typical hallucinations reported by subjects are
Angels, large spiders, and movement of various shadowy objects across
the ceiling, bright spot of light ahead of the subject, etc.
2. The television show "Sightings" has had numerous
reports of people seeing "Aliens" at waking moments. These types of
news accounts create confusion in US society and serve to keep people
searching for the wrong phenomenon thus keeping the NSA's technology
secure (disinformation).
21. Tactile, Olfactory hallucinations and Muscle Spasms:
1. Tactile hallucinations can be more durable and are
used to communicate a desired direction to the subject typically after
a real-time interrogation. Typical behavioral cues issued by the NSA
are manifested in the form of:
1. Temporary sensation of pressure to the tip of the
right index finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the
left index finger (symbolizing no Faith or "deception of Satan").
3. Temporary sensation of pressure to the center of the
right palm (symbolizing Jesus "Sitting at the right-hand of God").
4. Temporary sensation of pressure to the ball of the
right foot (symbolizing "Get on the Ball" or "hurry-up").
5. Temporary sensation of pressure to the tip of the
right foot big toe (symbolizing "Right Direction").
6. Temporary sensation of pressure to the tip of the
right foot center toe (symbolizing "Fucking-up Direction").
7. Temporary sensation of pressure to the tip of the
left foot big toe (symbolizing "Wrong Direction").
8. Temporary sensation of pressure to the buttocks
(symbolizing "Bad Attitude" or "subject is acting like an ass").
9. Temporary sensation of pressure on tip of penis or
clitoris (symbolizes immoral thoughts like subject is thinking/acting
with his penis or her clitoris).
10. Temporary sensation of pressure to the left ear drum
(symbolizing "do not listen").
11. Temporary sensation of pressure to the right ear
drum (symbolizing "listen").
12. An involuntary blink of the right or left eye
(symbolizing: right eye = God's agreement or left eye = Satan's
agreement).
13. Temporary tingling sensation on the Testicles
(symbolizing insufficient male confidence or "Having no balls or
strength").
14. Temporary tingling on other areas of the body to
imply that something invisible and/or supernatural is touching the
subject. May be perceived as threatening or reassuring to the subject.
Can be used to intimidate and confuse the subject often times combined
with additional posthypnotic implants to inflict delusions like "being
attacked with microwaves" or being caressed by Angels.
15. Muscular spasm or perceived pressures near the
jugular vein on right side of neck (symbolizing Satan having subject
by Jugular or throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe
pain on the subject by causing extreme involuntary contraction of the
sphincter in the anal region or other lower back or leg muscles.
17. Perceived odor sensation of a thick, sweet smell
(symbolizing Satan's sweet victory over the subject's soul).
9. This section is written in an attempt to provide
interested individuals with some of the considerations and precautions
when seeking to demonstrate the NSA's civil rights abuses by
demonstrating the effectiveness and concepts of subliminal access
using Subliminal Implanted Posthypnotic Suggestions and Scripts Using
Acoustically Delivered and Phonetically Accelerated Posthypnotic
Commands without
Somnambulistic Preparation in the Subject.
1. Reverse engineering of the NSA's technology to prove
it's abuses against the American people is quite difficult. Conside
the following.
2. If the scientists and technicians perform their
research in a facility that the NSA has the standard transceivers
installed, and therefore the NSA can influence the direction of
research or the data by effecting perceptual effects in the
researchers. These perceptual effects can be confusion, lack of
attention to important details, oversights, bad assumptions, incorrect
interpretation of the test data. These same misperceptions will also
be incorporated into the
research test subjects. The technology cannot be developed and
optimized if the NSA has any access to the test subjects. The test
scripts given to the test subject delivered from the researcher can be
neutralized by the NSA delivering a canceling script immediately after
the researcher's script. The NSA's test script can also include a
hypnoamnesia script at the end to cancel any residual perception in
the subject so that the test subject would report no effects and the
researcher would conclude the test script had no effect.
3. The research must be carried out in a facility
secured from all NSA electronic intrusion. All equipment in the
facility must be TEMPEST protected and electrically isolated from the
outside world. The research personnel and their subjects must never
leave the secured area of the facility so that they cannot be
subliminally interrogated by the NSA. The NSA would take this
opportunity to deliver disinformation scripts to the subject or
researcher. Foodstuffs and supplies would be the logical choice of NSA
intrusion if all other security measures were effective against the
NSA.
4. The NSA will exploit all opportunities to introduce
microscopic transceivers into the facility of it's surrounding
grounds. The minimal requirements for the NSA to take control of the
research are:
1. NSA audio delivery (a micro receiver with a micro
speaker)
2. Visibility of the targets (researcher or test
subject) to capture response labels during subliminal interrogations.
This can be through normal illumination or infrared to see through
window, or millimeter wave or other technologies that can see through
barriers like walls and ceilings.
3. Audible response labels can be used if the NSA has a
micro receiver with a micro speaker inside but cannot get a
transmitter in and operating without detection. Sneezes, coughs,
clearing of throat that can be picked up by laser microphones, audible
amplification microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave
technology that will allow visible intrusion into most facilities. The
test facilities should be deep underground, AKA 1000 feet with no
adjacent access from other facilities, sewer lines, water lines or
power conduits etc.
6. Any facilities existing will have to be debugged
before habitation and research begins.
7. Subjects must be able to be subjected to traditional
hypnosis after facility habitation as a test prior to research to
assure that the NSA has minimal scripts already implanted.
8. This technology is the highest level of intelligence
gathering for the USA. The abuses resulting from mismanagement of this
area of the NSA's intelligence system must force Congress to legislate
additional laws to protect the citizens. The NSA must regulate this
system better. The NSA will take all necessary steps without limit to
assure that this technology is preserved and autonomously under their
control.
10. Conclusion: America's greatest and highest level
intelligence asset is being mismanaged and the mismanagement must be
corrected before all the Enemies of our great country acquire it.
Imagine if China had this technology to use on their defenseless
population?
11. May God help us all in protecting the American
public and preserving and managing this vital technology's vital
potential to serve America's National Security.
by Will Filer
Esur4@aol.com
- Wes Thomas, moderator,
(2) trigger activation condition or conditions (when, what or how the
suggestion will trigger),
(3) the content (what the trigger will precipitate in the perception
of the subject),
(4) and a duration (when or under what conditions will it stop or
finish). Additional reinforcing scripts are usually added to
"strengthen" or reinforce the central posthypnotic command.
2. Digital acoustic wave editing equipment.
3. Advanced engineering knowledge of acoustic wave science.
4. Phonetics and linguistics expertise.
5. Hypnosis theory and scripting.
6. Ideal environmental conditions for recording.
7. NSA ignorance of the subject's intent and ability to capture a
message.
2) If the IRS could catch you in an audit.
2. NSA Initiated Execution to Cover-up in the News: