Texts For 42 Informational – Musical Narrations That Explain The Global Gangstalking – Electronic Torture – Nonconsensual Human Mind-Behavior Experimentation Program (By Dr. Eric T. Karlstrom)
I. Introduction
a. Introductory Statement to TIs (8:36)
b. Dr. Rauni Kilde’s Warning to Humanity (5:59)
c. Soldiers Lament (6:36)
II. The Global Government Gangstalking-Genocide GESTAPO (G5) Program
a. G5: Global Government Gangstalking-Genocide Gestapo (5:29)
b. Structure and Goals of “The Hidden Evil” (10:24)
c. MONARCH IS The New Phoenix Program
d. The Global Phoenix Program (3:22)
e. The National Security Racketeering Network (3:42)
f. Mind Control Symptoms (7:32)
g. Laws of God and Man Violated By Global Stalking-Mind Control Operations (4:37)
h. Gangstalking and Government Jobs (5:26)
III. The New World Order and Mind and Behavioral Control
a. Fourth World Wilderness of the Mind (6:01)
b. Behind the Lies That Blind and Bind (5:44)
c. Geospatial Intelligence and the Automated Battlefield (7:25)
d. YOU Are THE ENEMY (6:00)
e. A Race of Cybernetic Slaves? (1:39)
f. The Brotherhood (10:16)
g. Ruby Ridge and the Military Police State (5:36)
h. Ruby Ridge and Military Mind Control (7:22)
IV. The Science and Technology
a. Electromagneticneurotelecommunication and Cybernetics (10:49)
b. Neuroelectromagnetictelecommunication (3:29)
c. Bio-Electromagnetic Weapons (6:51)
d. The Human Brain Project (5:34)
V. CIA Mind Control, No-Touch Torture and Criminality
a. The Secret Team and the High Cabal (4:40)
b. Quotes on CIA Mind Control Operations (5:27)
c. More On CIA No-Touch Torture (6:31)
d. Confessions of CIA Operatives (4:05)
e. CIA As Organized Crime (4:07)
f. Ode to Jimmy- The Backstory (3:16)
VI. Testimony of Whistleblower
a. William Binney, Ex-NSA on Operation Stellar Wind (3:22)
VII. Testimony of a Perpetrator
a. Dr. James Giordano, Neuroscientist
VIII. Testimonies of Targeted Individuals
a. Kay Grigg’s Testimony (5:20)
b. Dr. Rauni Kilde’s Testimony Part 1 (7:43)
c. Dr. Rauni Kilde’s Testimony Part 2 (7:43)
d. Stephen O’Keefe’s Testimony Part 1 (6:12)
e. Stephen O’Keefe’s Testimony Part 2 (5:58)
f. Stephen O’Keefe’s Testimony Part 3 (8:07)
g. Stephen O’Keefe’s Testimony Part 4 (7:49)
h. Stephen O’Keefe’s Testimony Part 5 (8:14)
i. Stephen O’Keefe’s Testimony Part 6 (5:34)
IX. Testimony TI’s Family Members
a. Letter From Andrew’s Father (5:40)
X. Voices of Hope and Inspiration
a. Voices of Hope and Inspiration (3:43)
All narrations are based on posts included on this website.
TEXT Musical Narrations:
I.a. Introductory Statement to “TIs” by Dr. Eric T. Karlstrom (8:36)
Music: Tears from the Land of the Snows from The River
If you are a “Targeted Individual” (TI) (or as I prefer to call it targeted citizen), you have been secretly and extra-legally designated by unknown and unaccountable persons as an “enemy of the state.” The full resources of the State, including the civilian sector, are coordinated by the Department of Homeland Security (DHS) and the FBI to slowly, silently, and secretly torture, terrorize, and kill you. In other words, the Federal-State bureaucracy collectively termed the “Interagency,” which includes the military, intelligence, paramilitary (police, private security and intelligence firms), academic, legal, and civilian sectors, is waging psychological, chemical, and electronic warfare against you. (See: “New World War; Revolutionary Methods for Political Control” by Mark M. Rich, 2011).
As “enemy of the state,” you are a non-person, very much like the “detainees” at Guantanamo Bay and the Palestinians. Your constitutionally-guaranteed civil liberties and due process of law have been (illegally) stripped. You have been secretly enrolled in a highly covert program that intelligence services have developed over the past century to terrorize and eliminate political enemies, foreign spies, heads of state, journalists, “dissidents,” critics of government, activists, etc. Unbeknownst to you, your name probably appeared on a classified, secret blacklist, such as the “Terrorism Watch List,” before your targeting/torture began. Bottom line: Officially, you are now an “it,” a “target,” and no longer a legal person.
Rather, you are an (illegal) “covert operation” to be executed by military, intelligence, civilian, and any number of non-governmental agencies on behalf of the State. You are a potential “contract” for thousands of private security firms such as the FBI-spinoff, InfraGard, and the Israeli Mossad-spinoff, Black Cube. These and other mercenary and organized crime groups partner with the U.S. government, FBI, DHS, CIA, police agencies and others to wage the phony “war on terrorism” against you and millions of other innocent civilians worldwide. You may also be a non-consensual human guinea pig in one or several of the innumerable CIA-DARPA-Pentagon-funded weapons-testing and mind control programs and experiments now being carried out secretly and globally which involve hundreds to thousands of neuroscience-psychology-biology-computer science departments at universities and medical facilities.
“Counter-terrorism” is an integral part of the “National Security Enterprise,” the “Global War on Terrorism,” and the Pentagon’s “Fourth Generation Warfare”/”Revolution In Military Affairs” (RMA). Most “targets” are innocent civilians who have been designated as “enemies” to help justify the multi-trillion dollar “National Security”-“Counter-Terrorism” corporate-military-intelligence-police complex which drives the American economy as well as the global “terrorism” economy (which also profits from arms and drugs sales, human trafficking, sex trafficking, child trafficking, etc.). Since 9/11, some $9 trillion in federal funds has been transferred from social programs to the National Security Establishment and over $6 trillion in federal funds have been squandered to prosecute foreign wars of aggression under the pretext of “The War on Terrorism.” These wars primarily benefit (greater) Israel and the corporate-military complex.
Many Targeted Citizens are unaware they are being targeted, tracked, and monitored via satellite and supercomputer and on-the-ground government and private security spies and community-based agents (CBA), informants, etc. They are unaware that their day-to-day activities are surveilled, manipulated, disrupted, and controlled by shadowy military special forces operatives and other government and private security agents, vigilantes, paid street thugs, and other “useful idiots” and “useful idiot groups.” They are unaware that hordes of mind and behavioral scientists at hundreds to thousands of universities and medical facilities are essential participants in these operations.
Regardless of his/her level of awareness, the “TC’s” life, freedom, and sovereignty are disrupted, controlled, and effectively, stolen through these operations. TCs now effectively inhabit an unreal, unsafe and false world, a virtual “electronic concentration camp.” The invisible fence of this cage is comprised of lies, spies, “surveillance role players,” “spotters,” setups, covert ops, psyops, defamation campaigns, betrayal by friends and family, electronic assaults and manipulations, and scripted sabotage and street theater by strangers- all designed to psychologically break down the TC. As noted, many TCs are also “disposable subjects” in (CIA) MKULTRA-style “terminal experiments” that involve torture and/or mind mapping/mind cloning from electromagnetic and neuro-weapons. Similar techniques were deployed against civilian populations by the Soviet Cheka and KGB, Russian FSB, East German Stasi, CIA-MI6-NATO’s Operation Gladio in Western Europe, FBI’s COINTELPRO, CIA’s MHCHAOS and Phoenix Program, etc. Similar technologies were recently deployed against American and Canadian diplomats in Cuba. Luke Harding, journalist with The Guardian, describes his own targeting by the Russian FSB (Federal Security Service) in his book, “Mafia State” (2011).
A 2003 Boston Globe article states that the Department of Homeland Security (DHS) plan is to recruit 100 million citizen-spies to fight the “War on Terrorism.” Is it any wonder that unemployment in America today is at its lowest (3.9%) since 1969, when the FBI’s secret COINTELPRO, the CIA’s top-secret MHCHAOS and Phoenix political spying/sabotage/murder programs and the CIA’s MKULTRA mind control programs were in full swing? Is it any wonder that America is falling apart? Effectively, CIA-DOD-NSA-FBI-DHS, etc. are staging a covert civil war here.
I.b. Dr. Rauni Kilde’s Warning to Humanity (5:59)
Music: The Ancient Forest- The Refuge
The late Dr. Rauni Kilde was former Chief Medical Officer of Northern Finland, author, activist, and political insider. Her no-touch torture- targeting began in 1985 and culminated in her murder, probably by induced heart attack, in 2015. The following insights come from her book, “Bright Light on Black Shadows” published posthumously in 2015.
“The elite have plans to get rid of 2/3 of the world’s population with electromagnetic warfare, chemical warfare, and psychological warfare…. Mind control, MK, is listed as a “non-lethal weapon” by the military… (In 2002), the United Nations Institute for Disarmament Research (UNIDIR) in Geneva, Switzerland, designated mind control as a weapon of mass destruction along with nuclear bombs… This technology links the brains of people via implanted microchips to satellites controlled by ground-based super-computers….
…All the US military branches are involved in the development of the technology, in cooperation with civil institutions like the Department of Health, in what is known as the NEURAL NETWORK ASSOCIATION. At their 1991 conference, it was revealed that they submitted and endorsed over 1000 projects in brain-computer technology at 350 medical centers, universities, etc.
…The best way to control people without their knowledge is through mind control. According to the CIA Director in 1972, mind control means a world where every thought, emotion, observation, and need is controlled….. Cybernetics, full neurological control and communication, has been in use since the 1940s without the knowledge of the public… The objectives are behavior modification and influencing mental and bodily functions, processes, and emotions remotely through computer-satellite links….
…Directed Energy (DE) weapons, mostly EMF (electromagentic frequency) and acoustic weapons, act on the psyche and the body of human beings and all living creatures. They have been called by many names: Psycho-physical weapons, weapons of information warfare, psychotronic weapons, cognitive weapons, neurological weapons, mind-invasive weapons, mind control and electronic harassment weapons, remote neural monitoring, active denial systems, weapons of electronic warfare, means of neuro-linguistic programming, means for behavior modification, means of influence technology, computerized brainwashing machines, devices to zombify people, means to induce mental and physical illness, means for hostile surveillance, people zappers, and weapons of mass destruction.
…(And) the Swedish military research (FOI) declares in their report of activities that their goal is to direct the cognitive functions of people for a lifetime.
… On July 21, 1994, the U.S. Department of Defense (DOD) proposed that “non-lethal” weapons be used against anyone engaged in activities that DOD opposed. That could include almost anyone. DOD’s potential enemies may be counter-cultural individuals, those with opposing political viewpoints, economic competitors, biological undesirables, etc. From my point of view, the uses of this new technology philosophically are comparable to and amount to the Biblical Fall of man, the eviction from paradise. The all-encompassing thought-reading and mind-influencing capacity (of this technology) divides man into two encampments: Those few “God-like” people, who are allowed to use these means, and all others, whose freedom and free will is being taken away.
We have been very surprised to hear about school and shopping center shootings. How many realize that these are tests where mind control programming is used to create a human robot. The serial killer is a victim himself, being programmed to be an emotionless robot and following orders to kill. The real killers sit behind computers and send him electromagnetic beams to the brain.
…. the secret services and their sabotage and terror “departments” are the biggest “terrorists” in the world and work together with the mafia. That was the case even in World War II, as has been published decades ago…. More crimes against humanity have been committed under the shield of “national security” than the people can ever know…. possibly even more than the mafia.
…To label the (non-consensual) human experimentees, the victims of mind control, as paranoid-schizophrenic is a crime against humanity…”
I.c. Soldiers’ Lament (6:36)
Music: Angel’s Lament from The River (6:26)
Marine Corps Col. Peter Martino At Concord, NH, Town Council Meeting (8/20/2013):
“What’s happening here is that we’re building a domestic military because it’s unlawful or unconstitutional to use American troops on American soil.
My best friend, who’s a SWAT officer in Nashua, who came to Iraq with me to train the Iraqi police, sent me an email with a picture of him in the media on the streets of Watertown, MA wearing the exact same combat gear that we had in Iraq, only it was a different color. And the way we do things in the military, it’s called task organization: You take a command, and then you attach units to it in order to accomplish the mission. What’s happening is that Homeland Security is pre-staging gear, equipment. They’re trying to use standardized vehicles, standardized equipment.
I saw a picture in the Boston Globe during the Marathon Bombing where there was a state police officer– Actually, there were two officers. They both had identical helmets, flak jackets, weapons, everything I wore in Iraq, only it was all blue. The officer on one side had a big patch on his back that said “MASSACHUSETTS STATE POLICE.” Another officer next to him, his patch said “BOSTON POLICE.”
So what we’re doing here, and let’s not kid about it, we’re building a domestic army and we’re shrinking the military because the government is afraid of its own citizens. We’re building an Army over here and I can’t believe that people aren’t seeing it. Is everybody blind?”
II. From President Dwight D. Eisenhower’s Farewell Speech (January 17, 1961):
In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-Congressional-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.
We have been compelled to create a permanent armaments industry of vast proportions. Added to this, three and a half million men and women are directly engaged in the defense establishment. We annually spend on military security more than the net income of all United States corporations.
This conjunction of an immense military establishment and a large arms industry is new in the American experience. The total influence – economic, political, even spiritual – is felt in every city, every Statehouse, every office of the Federal government. We recognize the imperative need for this development. Yet we must not fail to comprehend its grave implications. Our toil, resources and livelihood are all involved; so is the very structure of our society.
Every gun that is made, every warship launched, every rocket fired, signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. The world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children.
We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.
Akin to, and largely responsible for the sweeping changes in our industrial-military posture, has been the technological revolution during recent decades. In this revolution, research has become central, it also becomes more formalized, complex, and costly. A steadily increasing share is conducted for, by, or at the direction of, the Federal government.
…The prospect of domination of the nation’s scholars by Federal employment, project allocations, and the power of money is ever present – and is gravely to be regarded…. we must be alert to the danger that public policy could itself become the captive of a scientific-technological elite.”
III. In his 1933 book, “War is a Racket” and a related speech, retired Brigidier General Smedley D. Butler, US Marine Corps (America’s most decorated soldier), stated:
“I spent 33 years in the Marines, most of my time being a high-class muscleman for big business, for Wall Street and the bankers. In short, I was a racketeer for capitalism.
Every war which Americans have fought or may fight in the future outside their own continental boundaries has been or will be a racket- a mean, cruel, yes, filthy racket. During our participation in the World War (I), our soldiers thought they were fighting to defend their homes, to make the world safe for democracy, we’re fighting a war to end wars. Rot. Pure, unadulterated sickening rot!
War is largely a matter of money. Bankers lend the money to foreign countries and when they cannot pay, the President sends Marines to get it.
Why don’t those damned oil companies fly their own flags on their personal property- maybe a flag with a gas pump on it.
I believe in adequate defense at the coastline and nothing else.
II.a. Global Government Gangstalking Genocide GESTAPO (G5): 2019 Synopsis
Music: Hobo’s Daydream from Guitar Reflections Vol. 1 (5:29)
From the Home Page of www.gangstalkingmindcontrolcults.com website, webmaster, Dr. Eric Karlstrom, Emeritus Professor of Geography
“Organized gang stalking” (aka “counter-intelligence stalking”) comprises psychological-psychotronic operations, torture, terrorism, war crimes, and “crimes against humanity” committed by governments and their private subcontractors against millions of innocent civilians worldwide. Victims (aka “Targeted Individuals” or “TIs”) are secretly and extra-judicially “blacklisted,” tracked, and targeted with no-touch torture, “nonlethal” (directed energy) weapons, and mind/behavioral control (neuro) weapons which have been developed since the 1940s under such top-secret mind control programs as the CIA’s Project MKULTRA and MONARCH. This DOD-CIA-NSA-NASA-NATO-DHS-FBI-DNI program is the modern extension of numerous previous programs, most of which have been outlawed. These include the East German Stasi’s “Zersetzung,” the FBI’s COINTELPRO, and the CIA’s MKULTRA, MONARCH, MHCHAOS, and Phoenix Programs.
“The Program,” apparently the short version of “Monarch: The New Phoenix Program” (Thomas, 2007), constitutes “unconventional”-“information”-“cyber”-“psychological” and “psychotronic warfare,” “low-intensity conflict,” and so-called “peacekeeping operations” justified under the guise of fighting the phony “War on Terrorism” and “National Security.”
The program is entirely unconstitutional and illegal, consumes trillions of taxpayer dollars, and conscripts a large percentage of Americans as “citizen-spies” who are paid, enticed, bribed, and/or coerced to participate in the harassment, torture, terrorization, and destruction of fellow citizens whom government has secretly designated as “political enemies” and/or guinea pigs for DOD weapons testing and brain mapping. Millions of “whistleblowers,” “dissidents,” veterans, Christians, Constitutionalists, and other good people fill the ranks of the classified, top-secret “Terrorism Watch List” generated at DHS/FBI Fusion Centers. These citizens are labeled “potential terrorist threats” and “non-investigative subjects”/”Code 4: silent hits.”
Apparently, the Deep State/intelligence/military complex will pay virtually any amount to keep “the program” going in order to test, develop, and deploy their military weapons on non-consensual experimentees even as they simultaneously eliminate potential opponents of the New World Order. Many of the “perpetrators” drive brand new vehicles! The government’s “missing” $43 trillion in “unaccountable adjustments,” recently “classified” as a State secret under cloak of “National Security,” may be one source of funding for this mammoth “black” operation.
Although the existence of “the program” is officially denied and its victims are routinely labeled and institutionalized as paranoid/schizophrenic/delusional, innumerable books, articles, official military documents, patents, and the testimonies of thousands of credible individuals prove it has existed in various forms for well over half a century. Currently, government and media are engaged in covering up “the program” by deploying many of the same psyop-organized stalking-information-cyber warfare protocols as used in previous coverups, for instance, of Operation 9/11.
This website is dedicated to educating the public to the dangers of this evil, totalitarian system. I especially hope it will help save the lives and livelihoods of many “targeted citizens” (aka TIs) and will contribute to the exposure and total dismantling of this diabolical program.
The U.S. Constitution is still the law of the land in America as per Madison V. Marbury (1803) which states: “All laws repugnant to the Constitution are null and void.” “Perpetraitors” must be exposed and held accountable; there is no statute of limitations for these crimes.
II.b. Structure and Goals of “The Hidden Evil” (10:24)
Music: Opus 1 From The Refuge:
(From: “The Hidden Evil; The Financial Elite’s Covert War Against the Civilian Population,” by Mark M. Rich, 2008)
“The New American reported in October of 2002 that there was an attempt to create a colossal civilian security force, which was used in Communist Russia and all totalitarian regimes. “Realizing that a cowed and brainwashed populace can carry out surveillance better than a million trained agents, communist tyrants from East Germany to Cuba created revolutionary circles, youth groups, and other organizations specifically to enable the Party faithful in every walk of life to police everybody else.”
In May 2003, The Boston Globe described how a national informant program was poised to recruit 100 million citizens! That would be about 1/3 of the population, which means it surpassed the percentage of the population used by the East German government. The program will “dwarf the citizen informer programs of the most repressive totalitarian states, making them appear amateurish by comparison,” they wrote.
Most of the citizen informant programs previously mentioned are now organized under a National Neighborhood Watch program, known as USAonWatch. “USAonWatch is the face of the National Neighborhood Watch Program,” declared the Citizen Corps website. It is managed by the National Sheriff’s Association (NSA) and Department of Justice (DOJ).
The National Neighborhood Watch Program has existed since the late 1960’s. This helps to explain reports of people being gang stalked by citizens since the early 1980s.
Neighborhood Watch is now part of Citizen Corps, which is run by the Federal Emergency Management Agency (FEMA) under the Department of Homeland Security (DHS). So in essence, USAonWatch is a DHS program. This means FEMA, DHS, and FBI, and local police are working directly with the state and local governments to coordinate these operations.
Again, we find another parallel with the Russian and East German dictatorships. The NSA exclaimed: “The Neighborhood Watch is homeland security at the most local level!” It was created to “empower citizens to become directly involved with Neighborhood Watch for the purpose of homeland security.” Its targets, according to the NSA, are criminals and domestic terrorists.
…. Markus Wolf, (Jewish) former East German executive Stasi officer (and later, co-architect of DHS) says that targeted people were surrounded by large numbers of citizens who “literally encircled their everyday movements.”
According to Wolf, the residences of these people were “put under siege,” and every family member and visitor was kept under close observation. Even some East German politicians were “surrounded by unofficial informers for the Stasi,” proclaimed Mary Fulbrook in her book, “The People’s State.”
According to (Leuren) Moret and (former intelligence officer, Julianne) McKinney, this program includes the military and federal agencies, such as the CIA, DOD, DOE, and FBI. These global operations are run by the various intelligence agencies, agrees Dr. Rauni Kilde (author of “Bright Light on Black Shadows,” 2015).
…. The surveillance is apparently justified by a bogus investigation that never ends.
According to the Citizen Corps Guide for Local Officials, each community has a Citizen Corps Council composed of representatives from law enforcement, fire and EMT services, faith-based groups, community-based groups, elderly and minority populations, transportation systems, utility companies, businesses, educational institutions, and the media.
Basically they recruit people from all pillars of the community. It is run by the Department of Homeland Security (DHS) which works with state and local governments. This means that high ranking elected officials, as well as federal and local law enforcement, are fully aware of this program and are donating significant resources to it.
… To recruit regular citizens to perform nefarious acts such as staged accidents and framings, these agents can scan for certain qualities in an informant data base consisting of literally millions of people, in order to select certain individuals or groups. Then, these informants who have no official ties to the government, can be co-opted into a staged event for reasons of national security.
These factions represent the true underlying psychopathic nature of the program. Based on my research, the public front is simply a façade used to recruit the public into a very cleverly disguised program of torture and murder.
In a January 2007 issue of The Washington Post, Dr. (Col.) John Alexander stated that (directed energy or “nonlethal”) weapons should be used to “electronically neuter” people. In his article, “New Weapons for a New World Order” he wrote: (The) United States must be able to protect national interests and values, even in ambiguous circumstances.”
… the Hidden Evil is being used by the financial elite to covertly destroy their existing and potential enemies while they install a worldwide tyrannical dictatorship.
According to former intelligence officer, Julianne McKinney’s, 1992 report, the pattern of directed-energy attacks and gang stalking is the same all over the world.
I’m certain that his program is being used to silently neutralize all people that the New World Order believes will be troublesome to their rule. In particular, this includes intelligent, independent, freethinking, incorruptible, nonconformists.
…. The US and other NATO countries are covert socialist states with a democratic/republic frontage. Although we’ve been led to believe that communism and fascism are opposites, both are on the same end of the spectrum, which is a socialist totalitarian rule. (In practice), socialism consists of a military/police state, heavy surveillance, persecution, and concentration camps. Germany and Russia are prime historical examples.
…. The control mechanisms in Russia, which included the targeting of the civilian population, was only made possible by the citizens who stalked and harassed people in public. The KGB’s success, added McKinney, “depended on the extensive use of informant networks and agents provocateurs….”
In June of 2003, The New American reported: “Every unfortunate society saddled with a police state has (used) citizen informants who play the most important role in enforcing conformity to the ruling elite’s will.”
The primary purpose for this network of citizens and the accompanying DEW (directed energy weapon) attacks is to terrorize any opposition to the financial elite’s rule.
Based on her research and observations (as a “targeted individual” or TI), former intelligence officer Julianne McKinney stated: “I think that once full control is established over a major percentage of the population, and enough of the population is silent and unwilling to stick their necks out, that we inevitably would be heading toward a holocaust.”
There has been a tremendous increase in these activities worldwide in recent years. The same patterns of attacks are found all over the world. Most people, however, are unaware that they are being swarmed by citizens and attacked with directed energy weapons. Dr. Kilde reported: “They are already in every apartment block!”
These citizen informant networks are a portion of the population that the financial elite needed to recruit in order to install a global dictatorship. These people are literally the instruments of their own enslavement.
Final Quotes:
1) “Whoever can conquer the street will one day conquer the state, for every form of power politics and any dictator-run state has its roots in the street.”
Dr. Joseph Goebbels, Nazi Propaganda Minister
2) Protocol No. 17 (Protocols of the Learned Elders of Zion, ca. 1905):
“In our program, one third of our subjects will keep the rest under observation from a sense of duty, on the principle of volunteer service to the State. It will then be no disgrace to be a spy and informer….”
II.c. MONARCH Is The New Phoenix Program (4:58)
The The Storm from The Refuge
The MONARCH program is the military’s weaponization of the CIA’s top-secret MKULTRA (and) other mind control experiments and programs.
Excerpt from: Marshall Thomas, “MONARCH: The New Phoenix Program” (2007)
“The Vietnam war was the formative experience for a generation of CIA and military intelligence personnel involved in the Phoenix program. They viewed the military defeat in Vietnam as a betrayal on the home front, a loss of will by domestic political enemies, not a military failure against a nationalistic revolution fought as a guerilla war.
The Phoenix program, assassinating suspected VC (Viet Cong) sympathizers in a systematic manner, worked well and is the blueprint for the current black operation (aka gang stalking) targeting thousands of loyal Americans using state of the art microwave and radio frequency radiation weapons. The motivation to suppress domestic dissidents and to assassinate loyal American opposition stems from the perception of dissent against the war as treason. This philosophy is stated very clearly in the “Mind War” (1980) paper written by Michael Aquino.
The Department of Defense has a huge stake in futuristic technology that kills by ionizing and non-ionizing radiation, leaving little or no trace. The indiscriminate killing of the Phoenix program continues on American soil. The terms “soft kill,” “slow kill,” and “silent kill” refer to the new way of killing the enemy in conflicts short of war and in small wars of the future. The counterinsurgency doctrine has now been applied to the home front so that the perceived betrayal of the military in Vietnam will not be repeated.
The generation of CIA and military intelligence led by Ted Shackley, Richard Helms, (CIA Director) William Casey, Maj. John Singlaub, Richard Secord, Maj. John B. Alexander, Col. Michael Aquino, Paul Vallilee and others have built the perfect beast, using selective assassination that leaves no trace. The ability to cull the human herd with “silent kill” technology allows a few personalities to remake the entire society in their own image.
Extremely low frequency (ELF) technology slowly drives the target crazy with silent sound, similar to the CIA MKULTRA psychiatrist, Dr. Ewen Cameron’s, “psychic driving” technique, used to break down the target’s personality. The new buzzwords at the Pentagon are “synthetic telepathy” and “psychotronics.” Another means of attack on targets is the Smirnoff patent, that uses subliminal suggestion to manipulate human behavior. This patent was purchased by the remote viewing company, Psi Tech Corporation.
Military intelligence officers involved in developing these “non-lethal weapons” also control Psi Tech. Emotional manipulation is accomplished using Dr. Michael Persinger’s work to remotely project emotional states that the brain entrains or locks onto and emulates. One can broadcast rage or fear at an individual target to manipulate and control them. As if these methods were not enough to torture and murder people, add to this nightmarish toolbox, active gang stalking. CIA-created cults and other cause-oriented groups are used by actively harassing them in public in neutralization techniques described in counterintelligence operations manuals that are aimed at enemy agents.
In the race to develop a new weapon it has always been necessary to test it on human beings. Perfecting the latest weapons designed to kill slowly and silently as well as perfecting the process of controlling the human mind are no different. Once the weaponry has been perfected on these few thousand people, the same techniques will be applied en mass to the general population and then to humanity as a whole.”
II.d. The Global Phoenix Program (3:22)
Music: Return to Dixie from Stone River Banjo Anthology
From Douglas Valentine, “The CIA As Organized Crime: How Illegal Operations Corrupt America and the World” (2017) and “The Phoenix Program” (1990)
“The (CIA’s) Phoenix program, created in 1967, brought together 25 agencies and aimed them at (Vietnamese) civilians in the “insurgency….” They are teachers, laborers, mailmen, farmers; but they’re not soldiers… It’s political warfare. It’s secret. It’s against the rules of war. It violated the Geneva Conventions…. It pulls together people from the army, navy, air force, and Special Forces. It includes the Vietnamese secret services. It coordinates everybody that’s involved in the war and brings every resource to bear on the political people in the villages, in an effort to wipe them off the face of the earth.… The total number of (civilian) people killed was between 25,000 and 40,000 (Other estimates reach nearly 90,000). They relied on sanitized military jargon to obscure the inhuman brutality that pervaded “death squad” operations like the Phoenix program.
(This) is what Homeland Security does in the US (today); bringing agencies together and focusing them on civilians who look like “terrorists”…. (Now, as then, murdering civilians is unstated policy.
“Where can the Phoenix Program be found today? Wherever:
1) Governments of the left or right use military and security forces to enforce their ideologies under the aegis of anti-terrorism,
2) Police check points ring major cities,
3) Paramilitary police units patrol in armored cars,
4) Military forces are conducting counterinsurgency operations,
5) Emergency decrees are used to suspend due process,
6) Dissidents are interned indefinitely,
7) Dissidents are rounded up and deported,
8) Security forces use informants to identify dissidents,
9) Security forces keep files and computerized black lists on dissidents,
10) Security forces conduct secret investigations and surveillance on dissidents,
11) Security forces (or thugs in their hire) harass and murder dissidents,
12) Such activities go unreported in the press.”
II.e. The National Security Racketeering Network (3:47)
Music: Waltz of the Road from The Mountain
From Dr. XKeyscore:
…. regarding “The National Security Racketeering Network”… “the program” at its core is an extra-judicial, political targeting and elimination program. This is a soft-kill operation. The expected outcome is self-harm, financial disruption, social disruption (of “Targeted Individuals”). They want to get rid of you (the TI) via any means possible in a clandestine fashion and also have fun and generate revenue while doing it. This is a style of “parasitic crony capitalism” because Department of Justice, Department of Homeland Security, and possibly DOD, are farming out contracts on innocent Americans….. So it is both a political targeting operation as well as a revenue generation scheme that starts off within the deep state shadow government.
I’ve read that DOJ/DHS have contracts with corporate private prisons in which DOJ helps these prisons maintain a certain quota of prisoners. They’ve done the same thing with the private intelligence agencies which run the extra-judicial militias, or targeting crews, which DOJ refers to as “surveillance role players” or” live action role players.” (I.e., they guarantee delivery of “quotas” of “targeted individuals.”)
Who owns these private intelligence agencies? Retired federal law enforcement and intelligence personnel; FBI, NSA, DEA, JTTF, Homeland Security, ex-military officers…. there are over 1800 private intelligence agencies in the US that operate with zero oversight. This is a giant racketeering network…. probably the biggest, underground, black-market illegal business in the United States today.
Dr. X Keyscore
“The goal is to create a nationwide system of “vigilantes” who do not think for themselves but follow orders — the Evildoing, US-Gov-paid “defense” contractors’ private army of “shooters” (not thinkers). The network is run by contractors and by DHS’s (Department of Homeland Security’s) 78 fusion centers. The propaganda is that they are fighting terrorists (and that is what they tell these vigilante suckers). The truth is that they are constructing a nationwide GPS/cellphone-directed prison system that now contains ALL Americans.”
-Targeted Individual (TI)
II.f. Mind Control Symptoms (7:32)
Music: The Old House from Guitar Reflections Vol. 2
1) The addendum of Gloria Naylor’s novel, 1996, includes this description of some of the most commonly reported mind control symptoms:
“Victims are subjected to various kinds of harassment and torture, twenty-four hours a day, seven days a week, for years on end. Most believe that some type of technology can remotely track, target, and control every nerve in their bodies. Heart and respiration rate can speed up and slow down, and stomach and bowel functions are regulated. Illnesses and all types of pain can turn on and off in an instant. Microwave burns are reported.
“Sleep deprivation is common and dreams are manipulated. Victims say, “They [whoever is targeting them] can see through my eyes, what I see.” Sometimes victims describe seeing the images of projected holograms. Thoughts can be read. Most victims describe a phenomenon they call “street theater.” For example, people around the victim have repeated verbatim, the victim’s immediate thoughts, or harassive and personalized statements are repeated by strangers wherever the victim may go.
“Emotions can be manipulated. Microwave hearing, known to be an unclassified military capability of creating voices in the head, is regularly reported. Implanted thoughts and visions are common, with repetitive themes that can include pedophilia, homophobia and degradation. Victims say it is like having a radio or TV in your head. Less frequently, remote and abusive sexual manipulation is reported. Almost all victims say repetitive behavior control techniques are used and include negative, stimulus-response or feedback loops.”
II. From Cheryl Welsh: List of Mind Control Symptoms (2003) From Mindjustice Homepage…
Microwave hearing
Transmission of specific commands into the subconscious
Visual disturbances, visual hallucinations
Inject words, numbers into brain via electromagnetic radiation waves
Manipulation of emotions
Reading thoughts remotely
Causing pain to any nerve of the body.
Remote manipulation of human behavior from space
Harassment, stress symptoms such as helicopters flying overhead
Seeing, as in a camera, through your eyes, i.e. to see what you see exactly
Control of sleep patterns.
Computer-brain interface, control and communication
Complex control of the brain such as retrieving memories, implanting personalities
In this article, Welsh documents that each of these symptoms coincide with proven scientific capabilities
III. From Mind Control with Electromagnetic Frequency (January, 2015 article by Ms. Soleilmavis)
According to an anonymous survey (result on December 19, 2009) for 296 mind control victims all over the world, including 130 females and 166 males, 71% of all victims had completed a college degree, with 14% of all victims attaining a Master or a Doctor degree. [15]
The symptoms victims experienced as a possible result of this technology include:
(1) Hot and Cold Flashes – 50%
(2) Nausea – 51%
(3) Severe sweating – 40%
(4) Induced Sleep – 65%
(5) Sleep deprivation – 79%
(6) Extreme Fatigue – 69%
(7) Blurred Vision – 57%
(8) Sensations of pain in internal organs – 62%
(9) Sensations of pain in backbone, arms, legs, and muscles – 59%
(10) Numbness and tingling, Paresthesias, Loss of sensation – 49%
(11) Muscle Cramps /Spasms/tension – 56%
(12) Sudden Headaches – 64%
(13) Irregular Heartbeat – 61%
(14) False Heart Attacks – 39%
(15) Tooth Pain – 50%
(16) Diarrhea. – 44%
(17) Acute inflammation/autoimmunity reactions – 25%
(18) Autoimmune disorders like Fibromyalgia – 17%
(19) Urinary tract infections – 18%
(20) Skin problems and skin irritations – 50%
(21) Change in growing of hair and nails – 32%
(22) Female problems which eventually lead to hysterectomy – 8%
(23) Cancer – 4%
(24) Fevers – 23%
(25) Flulike Symptoms/Sneezing – 43%
(26) Dizziness or Loss of Balance – 55.41%
(27) Sudden loss of consciousness – 31%
(28) Benign or Malignant Tumors – 8%
(29) Sensation of Electric Current Running through the Body – 54%
(30) Induced Thoughts/telepathic communication, messages – 65%
(31) Hearing “voices” (reception of auditory acoustic weapon transmissions or similar) – 68%
(32) Seeing “Holograms” – 42%
(33) Dream Manipulation – 71%
(34) Artificial Emotions (induced fear, anger, shame, joy, hate, sadness) – 68%
(35) Sudden “unexpected” Sexual Arousal – 54%
(36) Genital manipulation – 55%
(37) Induced Smells – 52%
(38) Sudden extreme moodswings (depression – euphoria) – 48%
(39) Induced pleasure-aversion reactions towards people or objects – 45%
(40) Making you say things (forced speech) – 46%
(41) General behaviour control in some situations – 50%
(42) Manipulation of Memory (forgetting/remembering/screen memories) – 67%
(43) Remote steering of eye movements – 39%
(44) Remote steering of body movements/motor control – 43%
(45) Virtual reality experiences while awake – 35%
50% of all victims have been forced to accept psychiatric treatment, the length of being forced to accept psychiatric treatment were:
II.g. Laws Of God and Man Violated by Global Stalking Operations: (4:37)
Music: El Toreador from Guitar Reflections Vol. 1
Cursed is the one who attacks his neighbor secretly.’ “And all the people shall say, ‘Amen!’
Global Organized Gang Stalking Operations violate the following laws of God and man:
1) Four of the Ten Commandments (thou shalt not kill, steal, bear false witness, covet)
2) Eight of the ten Bill of Rights Amendments guaranteed in the US Constitution (articles 1, 4, 5, 6, 7, 8, 9 10- as well as Amendments 13 and 14. As per Amendment 14, depriving fellow citizens of their civil liberties is TREASON.
3) AT LEAST 35 US federal laws (for example, US Code Section 18 2261A and 2381, which specifically prohibit gang stalking and US Code Section 18 241, the US Racketeer Influenced and Corrupt Organizations (RICO) Act) the “common rule” concerning human experimentation (Federal Policy For the Protection of Human Subjects), the ‘open government’ law, FACA, and other laws.
4) All State Laws Prohibiting Stalking, Chipping, etc. (Colorado House Bill 071082, etc.). Gang stalking is a criminal felony in all states.
5) The entire 2nd paragraph of the Declaration of Independence
6) At least two laws set forth in the Magna Carta (1215)
7) All 10 requirements of the 1948 Nuremberg Code (International Treaty to which the U.S. is signatory)
8) The 1949 Geneva Convention on the Prevention and Punishment of Torture and Genocide (International Treaty to Which the US is signatory)
9) Twelve of Nineteen Rights Guaranteed in the UN Declaration of Human Rights (Articles 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 18, 19, and 26 are violated; another international treaty to which the US is signatory)
10) UN Conventions Against Torture (UNCAT) (which US signed onto in 1982)
11) The United Nations’ International Covenant on Civil and Political Rights
12) In addition to violating the above laws, all Medical, Mental Health and Neuroscience Doctor’s Violate Their Hypocratic Oath When They Participate in Mind Control and Organized Stalking Program
13) In addition to violating the above laws, all government workers, military, police officers, and politicians violate their oaths of office when they participate in these programs.
Numerous lawsuits have been filed by individuals and groups against government agencies regarding these crimes against humanity, Up until now, these have been thrown out or settled out of court . A few of these lawsuits include:
1) International Committee on Offensive Microwave Weapons Vs. The United States of America (filed 1998)
2) Lawsuit Against Pres. Obama, DOD, CIA, SPAWAR, and Others For Violating Rights of Electromagneticially-Controlled, Non-Consensual Experimentees by R.L. Cain and E. D. Taylor (2014 and 2010),
3) 1992 Lawsuit of Akwei V. National Security Agency (NSA)
II.h. Gangstalking and Government Jobs (5:25)
Music: Meadows of Dan from The Refuge
The following is from an internet article entitled: Gang Stalking is Torture Funded Through Entitlements and Government Jobs (time: 5:18)
Gang Stalking is Torture Funded Through Entitlements and Government Jobs
“Many innocent people are targeted for these harassment programs. Their friends, family, and the community at large, through massive prescription drugging, brainwashing and media control, are used to monitor, prosecute, and harass them. In the former Jewish-controlled USSR these programs accused innocent people of being an “enemy of the state,” or “mentally unfit,” and many were institutionalized or murdered using this form of governmental systematic control.
In Bill Clinton’s COPS Gang-Stalking Program, civilian spies are recruited from every segment of society, and everyone in the “target’s” life is made a part of this ongoing, continuous, and systematic form of control and harassment, with such actions that are specifically designed to control the target and to “keep them in line,” like a Pavlovian Dog.
Despite the fact that these actions are designed to mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroy the target over years, to make them appear to be crazy, and leave them with no form of support, whatsoever, in actual practice something very different happens.
I’ve observed that these malicious operatives end up becoming mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroyed themselves over the years, while their targets, such as myself, manage to adapt their lives in very creative ways. Those who end up appearing to be crazy, and with no form of support, whatsoever, are the ones doing the torturing.
For the state, this appears to be a way to keep their targets in line, control them, or ultimately destroy them. Instead, we’ll be seeing the state itself destroyed along with every pirate and Jew who depends on it for cash and status even while they work to destroy the very source of that cash and status, the productive taxpayers whose dependence on their pirate system diminishes as a result of the harassment.
This systematic form of control is funded at every level of government, every agency is involved in it. All of them.
Targets can be chosen for many reasons, but mainly they are targeted for their legitimate, historically Catholic bloodline that has shunned inbreeding. This bloodline makes for an intelligent and capable individual who will tend to differ with the Masonic Mob in terms of political views and ideas of right and wrong. People who don’t cooperate with the rape and pillage of our nation will find themselves labeled as:
(1) whistle-blowers;
(2) political dissident;
(3) one who asserts rights at work;
(4) one who has personally displeased a member of the DeMolay Society;
(5) one who is too outspoken;
(6) one who is an investigator ;
(7) a signer of a petition;
(8) a writer of letters;
(9) one who is reported as “suspicious” by a civilian spy/snitch; or
(10) one who is a religious/ethnic/racial minority, which means being Catholic, which to the Pirate State makes us an enemy.
The goal of the COPS state-sanctioned organized gang-stalking and domestic torture program is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalization, or forced suicide. Other goals of this harassment are to destroy the targets reputation and credibility, and to make the target look “crazy” or unstable.
People from all segments of society can be recruited to be the “eyes and ears” of the state, such as laborers, drug dealers, drug users, street people, prostitutes, punks, church groups, youth groups, your best friend, your lawyer, local policeman, doctor, emergency services, a neighbor, family, social workers, politicians, judges, dentists, vet, supermarket cashier, postman, religious leader, care worker, landlord, anyone.
Most of these recruited civilian spies/snitches do not understand or even care that the end consequence of this harassment protocol is to eventually destroy the targeted person, and they function as “useful idiots” of the state sanctioned COPS gang-stalking program.”
12. Laws Of God and Man Violated by Global Stalking Operations (4:37)
Music: El Toreador from Guitar Reflections Vol. 1
Cursed is the one who attacks his neighbor secretly.’ “And all the people shall say, ‘Amen!’
Deuteronomy: 27:24/em>
Global Organized Gang Stalking Operations violate the following laws of God and man:
1) Four of the Ten Commandments (thou shalt not kill, steal, bear false witness, covet)
2) Eight of the ten Bill of Rights Amendments guaranteed in the US Constitution (articles 1, 4, 5, 6, 7, 8, 9 10- as well as Amendments 13 and 14. As per Amendment 14, depriving fellow citizens of their civil liberties is TREASON.
3) AT LEAST 35 US federal laws (for example, US Code Section 18 2261A and 2381, which specifically prohibit gang stalking and US Code Section 18 241, the US Racketeer Influenced and Corrupt Organizations (RICO) Act) the “common rule” concerning human experimentation (Federal Policy For the Protection of Human Subjects), the ‘open government’ law, FACA, and other laws.
4) All State Laws Prohibiting Stalking, Chipping, etc. (Colorado House Bill 071082, etc.). Gang stalking is a criminal felony in all states.
5) The entire 2nd paragraph of the Declaration of Independence
6) At least two laws set forth in the Magna Carta (1215)
7) All 10 requirements of the 1948 Nuremberg Code (International Treaty to which the U.S. is signatory)
8) The 1949 Geneva Convention on the Prevention and Punishment of Torture and Genocide (International Treaty to Which the US is signatory)
9) Twelve of Nineteen Rights Guaranteed in the UN Declaration of Human Rights (Articles 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 18, 19, and 26 are violated; another international treaty to which the US is signatory)
10) UN Conventions Against Torture (UNCAT) (which US signed onto in 1982)
11) The United Nations’ International Covenant on Civil and Political Rights
12) In addition to violating the above laws, all Medical, Mental Health and Neuroscience Doctor’s Violate Their Hypocratic Oath When They Participate in Mind Control and Organized Stalking Program
13) In addition to violating the above laws, all government workers, military, police officers, and politicians violate their oaths of office when they participate in these programs.
Numerous lawsuits have been filed by individuals and groups against government agencies regarding these crimes against humanity, Up until now, these have been thrown out or settled out of court . A few of these lawsuits include:
1) International Committee on Offensive Microwave Weapons Vs. The United States of America (filed 1998)
2) Lawsuit Against Pres. Obama, DOD, CIA, SPAWAR, and Others For Violating Rights of Electromagneticially-Controlled, Non-Consensual Experimentees by R.L. Cain and E. D. Taylor (2014 and 2010),
3) 1992 Lawsuit of Akwei V. National Security Agency (NSA)
III.a. Fourth World Wilderness of the Mind (6:01)
Music: Cheyenne Bottoms; Wyoming Waltz
Christian businessman George Hunt attended a number of semi-secret United Nations planning sessions in Colorado in the late 1980’s. These meetings were preparatory for the United Nations Rio Earth Summit of 1992. Hunt states:
“(In 1987) I attended The Fourth World Wilderness Congress. Maurice Strong, the convener, said it was called the Fourth World because it was the fourth one of these environment congresses that Edmund de Rothschild had created. I learned later that the World Order refers to the coming One World Government as the Fourth World, or world control by the World Order where there is no more First, Second, or Third Worlds, just a boundary-less planet which is called the “fourth world wilderness.” Yogis and shamans refer to it as the “fourth world wilderness,” the “lostness of the mind.” The” lostness of the mind” refers to the collective consciousness. Persons will be coerced through lies, drugs, fear, and pain to surrender themselves, their egos, to the collective consciousness. (Hive Mind or Cloud?)
The Fourth World will be a return to a society much like the Caesar’s or Babylon or the Fourth Reich, within the fictionalized societies described in Huxley’s Brave New World and Brave New World Revisited and Orwell’s classic, 1984. We will flourish with only a whimper. The World Order wants to create a new society out of the ashes of chaos; a collectivist Fourth World complete with a collectivist religion, collectivist finance and unchecked world national socialism (fascism). The World Order will offer Gaia, mother earth, to the masses as the big brother image to worship in the Fourth World.
Maurice Strong has already has set up a 140,000-acre project in Crestone, Colorado to develop this earth religion system. Projects are funded by the Rockefeller Fund among other foundations. The (1992 Rio) Earth Summit will link environment with industry. The Lords of the UNCED Conference will be the masters of who gets what and when if we don’t do something about it quickly.
Who leads the environmental movement? The Convener of the (Rio Earth) Summit, Maurice Strong, identifies Baron Edmond de Rothschild as the creator of the environment movement. Strong states that Rothschild is the positive synthesis of environment on the one hand (that’s the thesis) and growth and development on the other (that’s the antithesis). Strong very clearly admits that the Rothschild combination, including the Rockefellers and most world capitalists, aim to control the environment and development movement as the synthesis (of the thesis and anti-thesis in the Hegelian dialectic). Power will converge into their hands through the (1992) Rio Conference. The synthesis, the head of the power, merges into the hands of the House of Rothschild.
Another speaker at the Fourth World Conference was David Rockefeller, world energy capitalist and banker. He was named “Mr. Growth and Development” at the meeting. His counterpart, William Ruckelshaus, organizer of the EPA and creator of its laws under Presidents Ford and Reagan, was dubbed “Mr. Environment.”
“Mr. Environment,” Ruckelshaus, is the CEO and Chairman of the Board for BFI, Browning-Ferris Industries, one of the largest private environment companies in the world. The hypocrisy is that Ruckelshaus as EPA chief, made the very laws by which his waste company, BFI, is becoming rich. Hypocrisy number two is that Ruckelshaus and Maurice Strong were key investors in American Water Development, a company which tried to circumvent Colorado water laws and gain control of one of the largest underground reservoirs of water in the world…..
I did a survey of the people down in the San Luis Valley. And I asked what will happen when Maurice Strong and William Ruckelshaus and others will pull 200,000 acre feet of water/year out of the San Luis Valley? It was unanimous that their land will turn into a wasteland, will turn into a desert. So here we have people at an environment congress that are waltzing 200 miles south that want to suck the aquifers dry and turn it into a desert. The hypocrisy is so deep.
What kind of madness are these World Order Caesars afflicted with? They hope to run the lives of people for generations to come. They are the same crowd who created a Hitler, arranged the assassination of Lincoln and Kennedy, and have indicated elsewhere that they want to drastically reduce the population of the world to make environment and development more “sustainable.”
III.b. Behind Lies That Blind and Bind (5:44)
Music: Fall To Earth From Guitar Reflections Vol. 3
Statement by Dr. Eric Karlstrom on gangstalkingmindcontrolcults.com website:
The “big lies” of: 1) 9/11, 2) the “Global War on Terrorism” and “National Security Enterprise,” and 3) and catastrophic man-caused global warming/climate change are several among many propaganda and coercive PSYOP deceptions designed by government intelligence services and psychologists. They also function as “cover stories” to conceal what is really happening. The global warming cover story conceals multi-decadal geoengineering/weather warfare operations and technologies, some of which are also capable of mind-controlling and influencing entire populations, for example, through the use of phased-array antenna/ionospheric heaters, such as the HAARP facility in Alaska. Ultimately, these big lies are tailored to justify subjugation of domestic populations by global military-police and totalitarian, fascist, world government (UN Agenda 2030).
The German term for these kinds of psychological operations is “Weltanshaungskrieg” or “worldview warfare.” This is the science of the coercion of civilian populations into submission to totalitarian governments. 2 + 2 now equals what the authorities say it does, or else.
To achieve their long-sought Luciferic empire, Judeo-Masonic-Illuminati-satanist elites controlling the major nations are waging unconventional-electronic-cyber-netcentric-civil-military, information, and brain (psychotronic) warfare against civilian populations. This “Fourth Generation” warfare deploys special operations forces (SOFs) and psychological operations groups (POGs) of all military branches, government intelligence agencies, FBI, police, private security contractors, first responders, and civilian (“Neighborhood Watch”/”Citizens On Patrol”) and cult-religious groups in conjunction with staged, state-sponsored, false-flag terror events and weather warfare (geoengineering), “total surveillance/big data,” the Global Information Grid (GIG), A.I. (Artificial Intelligence) supercomputers, PSYOPS, satellite GPS systems, directed energy/”nonlethal” and neuro-weapons, the Global Neural Network (hive mind), no-touch torture, “man-machine integrations,” and “brain-to-computer” interface supercomputers for mind and behavioral control of individuals and populations. These technologies identify, track, target, and eliminate innocent civilians, whistle-blowers, and critics of government policy, etc. who are secretly and extra-judicially classified as “threats”/”adversaries”/”enemies”/”terrorists,” etc. through the DHS-FBI FUSION Center system and stripped of their constitutionally-guaranteed civil rights.
Elite planners expect that by 2030, A.I. warfare and brain subjugation systems associated with what I’m calling Global Governments’ Gangstalking-Genocide GESTAPO, or G5, will be fully automated and will automatically coordinate the above elements with 5G communications, the Internet of Things (IoT), SmartCities, Smart devices, and the “one-world brain;” the internet, to create an automated bio-robotized, slave society.
Two additional, related quotes:
Dr. Joseph Goebbels, Reich Minister of Propaganda of Nazi Germany, explained the importance of the “big lie” at the Nuremburg Trials following World War II:
“If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.”
Michael Crichton, 2003, “Environmentalism as Religion,” speech at Commonwealth Club
“The greatest challenge facing mankind is the challenge of distinguishing reality from fantasy, truth from propaganda. We must daily decide whether the threats we face are real, whether the solutions we are offered will do any good, whether the problems we’re told exist are, in fact, real problems or non-problems.”
III.c. GEOINT And The Automated Battlefield (7:25)
Music: Winds of Fire from The Refuge)
From 2 D.J. Welsh youtube interviews (2016) on GEOINT and the Purpose and Scope Jade Helm 15
DJ Welsh: The Final Report of the 2014 GEOINT symposium, written by intelligence professionals… regarding multi-INTElligence persistent surveillance….. This is network centric warfare where each person is a human network node on the Global Information Grid (GIG).
Global data collection is being accelerated on every level. As far as this network centric-Artificial Intelligence system is concerned, you will be reduced to the sum total of the data collected on you. And that is the end game in the quest to control more than 7 billion people on the planet…… “Mastering the Human Domain.”
They’re collecting everything. Their customers are the proponents of global government. Their adversaries appear to be the unbridled masses of humanity.
This could also be considered gang stalking. From the perspective of intelligence and law enforcement agencies and corporations which use organized gang stalking as a secret and illegal weapon for subversion… the perfect operation in this context is one in which the target becomes progressively isolated, impoverished, emotionally degraded and eventually seeks what appears to be the only available outlet, suicide.”
The Force Management Model (developed by MITRE Corps.): Government now perceives the American people as its greatest threat. Patriots will be classified as terrorists, and the terrorist government will be deemed patriots. PARKA- can handle complex queiries against large data dumps.
Jade Helm II computer software is part of much a larger command and control system that goes beyond military applications. It’s called GEOINT; It’s global in scope- and everything regarding the internet, social platforms. ….. If something has the word smart in front of it, for example, smart grid, smart cities, smartphone, smartTV, smartappliances- all of these are plugged into the GIG (Geographic Information Grid).
GEOINT is a tool for the proponents of global government in order for them to cast a neural net over humanity. How do you control 7 billion people? If you control the environment they live in, you can control them. GEOINT is a complete, all-encompassing Command and Control system. When people are used as physical geo-located nodes on a network on a human terrain system. How do you remove that? Individuals can be removed as nodes. Just disconnect them. Erase their data and eliminate their connectivity to the GIG. Remove their relationships, communications, and earnings capability.
Moderator (John B. Wells): This is like Stalin on steroids. They’d go into the home and take everything- and effectively erase them from existence.
Where’s the central point for data collection? The GIG (Geographic Information Grid). And these NSA data dump centers in Bluffdale, UT-
Threat assessment centers are global and an integral part of this program. ABI (Activity Based Intelligence) gathered from open source data (facebook, linkedin, internet, cloud computing, cloud storage)- activities, transactions (physical and virtual), vulnerabilities and capabilities of individuals and groups across all domains of the operational environment. All collected data- is geo-located to a specific spot on the earth- and tied to you, the node.
The concept of humanity being managed and enslaved by an elite technocratic society is no longer a future vision. The network centric global A.I. system for human command and control is here.
A Subheading in their document states: “The process of sense making in complex human endeavors:” “This approach uses a set of cognitive constructs that translates tacit knowledge to the focal knowing of the objective world.”
How are they accomplishing this? They are mapping your mind. They are creating these maps with all of the information that’s being collected on everyone regarding every aspect of their lives. The macro-cognition component of the system is the process of dissecting the human domain.
Jade II AI computer software- it’s all network topography to optimize communication and data transfers. Everything, communications, everything, is tied in to the GIG.
The software is being used now. Another command and control problem is this system is designed to handle is:
“The enemy has always been able to adapt to a rapidly changing environment to hide itself from exposure. In order to adapt itself to combat this problem the kill chain had to be compressed from hours to seconds. The system removes the administrative delay in the kill chain. It has no moral compass, no empathy, or regrets.” (It’s a computer program.)
“The system is designed to achieve dominance in cyberspace, cyber-power, and cyber-strategy. This capability will continue to evolve even though key technical, social, and information trends begin to stabilize. It will capitalize on social engineering for offensive military and civilian operations.”
In other words, this is a technical approach to the (gang stalking) tactics employed in Nazi Germany by the Stasi, the Brown Shirts, and the SS. This is just a technological version of those social engineering tactics they used then.
“It’s a self-organizing, vision-capable, expectation-capable, recognition-capable, situationally-aware, emotionally-intelligent, goal-oriented system. The system thinks, plans, and executes.”
III.d. YOU Are THE ENEMY (6:00)
Music: After the Storm, Guitar Reflections Vol. 1)
From YOU Are THE ENEMY, Veterans Today (2014), by Preston James, Ph.D.,
“There is now a New American War. It is inside America. It is called the “War on Terror”. The enemy is YOU! It is a staged, Phony War that has been created by the International Zionist Crime Syndicate (IZCS).
Every Military Force needs an enemy. Without an ongoing or perpetual war, the War profiteers quickly go bankrupt. In order to keep their profit stream going from war, war-profiteers need to create successive new wars or a significant threat of impending war.
This New War on Terror has an enemy. That enemy is the American People, You and Me…. And anyone who wants to restore the American Republic will also be defined as a “Domestic Terrorist”.
This new War on Terror has been socially engineered to provide a continual stream of degradations and provocations against the average American, provoking many in a never-ending stream to resist, and causing them to be labeled dissenters.
Once they have been labeled dissenters they are put on a Department of Homeland Security (DHS) Main Core Terror Watch List, which top insiders know is a targeted assassination list for later eradication of all Freedom-loving Americans who want to restore the American Constitutional Republic.
At present the Main Core list has over ten million Americans on it, and it is growing every day with thousands of new additions. Get a ticket for a driving offense or any arrest (even if later proven innocent) and it is highly likely you will be placed on this Main Core Terror Watch and Assassination list.
Over time these provocations are designed to result in a continuing stream of American dissenters that want to take their Republic back from the Zionist hijackers and will meet DHS tyranny and force with the like. Any and all Dissenters are now being defined as “Enemies of the State”.
… the Department of Homeland Security is now recognized as a major IZCS beach-head inside America and part of a long term plan to establish a foreign-controlled IZCS neo-Bolshevik military force inside America to tyrannize, wage war against, and eventually serially mass murder most Americans.
DHS is a terrorist group, hand assembled by American/Israeli dual citizen Traitors and is designed to tyrannize, capture and eventually be deployed against Americans to serially mass murder them. This is why they have been called the New American Gestapo of the Neo-Bolshevik Red Cheka Terror Machine.
This is why some top insiders refer to DHS as the New American Gestapo or Stasi. Some see it now morphing into a New Red Cheka mass-murder machine for dispensing Bolshevik-style Red Terror and the serial mass-murder of Americans.
The War on Terror is obviously a Phony. But it has been the greatest boon to the American Defense Complex ever, with many times more net American Taxpayer dollars spent on this war than any other war in history, including WW2 or the Vietnam War.
Here is the new game in the so-called American Defense Industry. It is a stateside game and it involves magically transforming any and all innocent, Constitutional, law-abiding citizens into Domestic Dissenters, “Domestic Terrorists” or “Potential Domestic Terrorists. Either of these categories is considered “reasonable suspicion” enough to place then on numerous “watch lists” and to stalk or gang-stalk these folks Cointelpro-style.
Actually the real situation is just the opposite–it is the USG and specifically the Fusion Centers and the Department of Homeland Security run by perverts, thugs and lowlifes and enemies of “we the people”. These scum are the real risk to the true and actual National Security of America the Republic and a significant risk to all honest, law abiding, Constitutional Americans. And the USG and DHS and Fusion Center officials are nothing less than world class criminals committing both High Treason and Sedition against America the Republic. The USG has been hijacked and is being run by those who have turned everything upside down.”
….A SERIOUS SPELL, A RACIAL DELUSION OF SUPERIORITY HAS BEEN CAST ON MANY JUDAICS NO MATTER WHERE THEY LIVE, BUT ESPECIALLY SO AMONG THOSE LIVING IN GREATER ISRAEL, WHERE THE LUCIFERIAN HEX FLAG FLIES. WHETHER TRUE OR NOT, TOP ZIONIST LEADERS BELIEVE THIS HEX FLAG SIGNIFIES THE MERGER OF DEMONIC FALLEN ANGEL BEAST-BLOODLINES FROM ABOVE, BRED WITH HUMAN FEMALE BLOODLINES BELOW. THEY BELIEVE THIS MAKES THEM THE “CHOSEN ONES” OF THEIR GOD LUCIFER, AND SUPERHUMAN OR PART GOD ALSO.”
Preston James, Ph.D., YOU Are THE ENEMY, Veterans Today (2014)
1II.e A Race of Cybernetic Slaves? (1:32)
Music: On the Rez, Guitar Reflections Vol. 3
From James F. Marino, “The Human Species Is On The Precipice Of Becoming A Race Of Mind-Controlled Cybernetic Slaves”
It is Rothschild Zionism’s control over the U.S. Military Intelligence complex, and its total subversion of this complex, which the American citizenry must collectively be made aware of. Especially since this Orwellian complex is being used in secret to brain map the entire U.S. population in the interest of ultimately reducing us to a cybernetic race of beings, whose state of consciousness will come from a neural network of artificial intelligence driven computers.
Imagine a race of people all thinking the same thoughts simultaneously while being incapable of having an individual thought – a true slave race – and you can begin to understand the inherent evil which drives those who operate within the very hierarchy of this complex.
If we are attempting to unravel the secret of the most perplexing mystery of this century, we should acknowledge that certain segments of mankind, in order to accomplish their power-hungry plans, have often been happy to pull a veil over the eyes of (if not put out the eyes of) their fellows who inhabit this earth.
III.f. ”The Brotherhood” (10:16)
Music: Cottonwood Creek from The Refuge
The following is from 1998 and 2005 interviews of Ms. Kay Griggs, political insider, targeted individual, and descendant of Founding Father, James Madison. Ms. Griggs holds B.S. and M.A. degrees in history:
My former husband of 11 years, Marine Corps Col. George Griggs, would get drunk and tell me everything.
(My ex-husband was a) NATO intelligence wet operations/psychological operations guy.
Yes. George was the Chief of Staff for the Marine Corps, for “Gray’s Boys,” the assassins, who were working with General Steiner, General Jim Joy, and General Chuck Krulak and they work in the Nelson Rockefeller group in the Republican Party. Actually, they were working both sides (Democrat and Republican) with people like Walt Rostow and …. They’re all…
My husband was head of Special Operations. In Special Operations, all people are part of this “Firm.” Once they get (to be) Colonel, they get initiated—they get drunk, “dine in,” “shellback”, have anal sex, group sex.
If they are in Special Operations and they are Marines, they are all homosexuals. It’s kind of like the fast road to the top. SEALS, etc. This is the norm. There were Israelis at these parties, intelligence people. Intelligence? There’s no intelligence there. There’s perversion. They’re all nudists. Makes it easier, you know.
My former husband was way above Bo Gritz’s level, who I believe was an Army Guerilla Commando. My husband’s circle included Henry Kissinger, Crowe, General Alexander Haigh, Marine Corps and former National Security Advisor, Robert MacFarlane, Marine Lt. General, Victor Krulak. You see, General Al Gray is the control guy….. (Generals) Al Gray and Jim Joy are the big guys…..”
“There’s a group within the Marine Corps that has gone to Princeton and Annapolis, who are in the upper echelons of the Marine Corps. It has to do with which colleges they went to, the secret societies, eating clubs, etc. And their associations in Vietnam and their Sheik-Nato, Defense College in Rome experiences. They are very insecure.
This “brotherhood” that my husband was in feels they are totally above the law… they protect each other. (And they are determined to destroy this country.) It’s an international brotherhood and it is very much Freemasonic.
The people in charge of the men who were doing these (homosexual) things to my husband were Jewish people. Oppenheimer and those. The poor boys (recruited students at Princeton) didn’t hardly have time to go to class. They were under the Germans, the ones who have the “German disease,” homosexuality. I’m sure they did the same thing to John Nash, of “A Beautiful Mind.”
The Freemasons have a ladder and they are always climbing because they are very insecure. They give each other lots of medals. Rummy (Donald Rumsfeld) went to NATO when Nixon’s world was falling in – which saved him and protected him.
Interviewer, Jeff Rense: Who are these people? Is this group an enforcement arm of the Illuminati?
Griggs: They are. They are connected with the Joint Chiefs, NSA, and the White House. George told me that they wear different hats, and it doesn’t really matter which hat they wear. He had different passports with different names. I felt as though he might have even had a double. He was very insecure and robotic.
“Who’s behind all this? It’s Caspar Weinberger, Henry Kissinger, Nicholas Walt Whitman Rostow, Eugene Debs Rostow…. What’s going on here? These guys are not even born in America. They’re all Jews. They’re training mercenaries now to kill on an order. Not killing because people are breaking into their homes, not killing because they are bad. But just, we want to control this country. That’s what George told me. It’s political. The Marine Corps is the political arm of a group that wants to run everything. Control the drugs, sell the weapons… Keep the weapons and drug money flowing.
This “brotherhood” is a very small group: George Griggs, Bob Edwards, Donald Rumsfeld, William Colby, George Schultz, Frank Carlucci, and Allen Dulles. Dulles I believe is the one responsible for bringing my husband, Carlucci and Rummy in. All of these were in Princeton’s Cap and Gown fraternity; my uncle Ben had been in that club.
Princeton is/was the Mecca for Jewish/Zionist intelligence agents over here. All of the movie moguls started out in Princeton. The Psychological Operations crowd from the Nazis came to Princeton. And they spread out from there. This group includes Oppenheimer, (Albert Einstein) and others.
I began to connect dots… These are young men on scholarship, they don’t have parents, they’re poor, they have no careers, so they are really dependent on the political-military hoops and people to promote them. And Allen Dulles really pretty much oversaw their initial getting into political spheres of power.
When people go through initiations in the Masons, the shellbacks, the ceremonies that are really sort of gross…. They bond the boys. They’re drunk and it’s a memorable experience. It gave Leyman the courage to do what he did at Tailhook with all the Marines looking on. You know, it’s “we won’t tell.” Or if someone tells, they are disappeared, or neutralized, or ruined. So they’re afraid, but it’s also exciting. And they have affairs. They are doing homosexual/pedophilia/swinging and are all part of the group and nobody talks. All the Marines.
It’s a very small group that has been working together for a long time…. sort of like the Delta Team 1 in Italy, with a boss and so forth, and General Steiner was involved.
Jeff Rense: But this group was preceded by another group and a group before that. This is nothing new.
Griggs. Yes, the Dulles group. Paperclip was a huge operation. My grandfather Byrd was a high-level intelligence person during WWII, he was a doctor, he spoke German, he was a brilliant obstetrician. So I know a lot of what was going is on in Norfolk, Virginia, since WWI up through the 80’s. And I found out that the same thing goes on in other ports. And organized crime is totally involved in it, naturally.
There were German individuals, SS, who came into this country after World War II. I know because my grandfather was involved with that as a Naval intelligence officer/doctor during WWII. 100s of thousands that came over. I knew George’s family were German. I realized what he was talking about was institutionalized. It is structural and vital to the system.
MAC-SOG. Is a code word for sending out platoons to kill people in Vietnam. SOG is Special Operations Group. If you know anything about the German high command, they are connected with the Opus Dei, they are kind of a business group that works within the Vatican.
Skull and Bones induction methods are now used in the Army. This goes back to the “German thing.” Not everyone does it. But the ones that do it (are the “rising stars”) and they get right to the top.
“It’s Training and Doctrine Command, it’s NATO, it’s SHAPE (Supreme Headquarters Allied Powers Europe), started by President Eisenhower (a Jew). It’s a totally independent corporation. Its main function is to sell weapons and launder money. It’s all being done by Army people who are now JOINT. The word JOINT is used to describe the people who came over illegally to escape Nazi Germany. They are cowards and bullies….
I know there’s a big Mason connection in the warfare-weapons selling group because the head Admiral in Norway is running the drug lord out of his prison. He is a friend of George’s. He has a house near where they have one of their underground bunkers. I know they are doing weapons shipments out of Norway.
Vietnam was really important because a lot of (mind control) experiments were done on boys who went over there.
Joint mob-military partnership operations were conducted in Korea and Vietnam. At the highest levels of the Marine Corps and the Army in the Special Operations Forces, the individuals are all actually in the (Jewish) Brooklyn-New Jersey mob. My husband, General Al Gray, General Sheehan, Henry Kissinger, Caspar Weinberger… are part of a group of Zionists who came over from Germany. They do a lot of money laundering in the banks, cash transactions in the banks for the drugs they are bringing over. The military people are all involved once they retire. They go into drug and secondary weapons sales. It’s all about the “funny money.”
You see the organized crime, the Meyer Lansky, the Jewish Kabalist group, who don’t believe in God, believe they have to get rid of all the good people… and they get brownie points in their little cult for doing that. They really do this. They are killing good people on purpose… And all Jews are automatically in the Israeli military.”
IV.a. EM Telecommunications and Cybernetics- ELECTROMAGNETICNEUROTELECOMMUNICATION AND CYBERNETICS, PRESENTED AT 33rd INTERNATIONAL CONGRESS ON MILITARY MEDICINE, HELSINKI, FINLAND, JUNE 30, 2000 (10:47)
Music: The Fall from The Refuge
Dr. Rauni Kilde M.D.
In 1952, when electronic implants were placed in the brain and teeth for tracking, behavior and mind control, conditioning, programming, and covert operations, it became necessary to hide the technology, Electrical Stimulation of the Brain (ESB) and implants during surgery or abduction from the public because of the Nuremburg Code, which prohibits involuntary medical experimentation on humans. The DSM (Diagnostic and Statistical Manual) for Psychiatry was created in 20 languages. Today, it lists the (symptoms created by the) four methods used on unsuspecting targets (electronic, chemical, or bacteriological, and psychological warfare experiments) as signs of paranoid schizophrenia. All medical schools teach that one is mentally ill if they hear voices in their heads, feel they are surveilled, poisoned, beamed with microwaves, listened to via radios, telephone, loudspeakers, or TV, feel that their thoughts are read and responded to by strangers, and if they experience paranormal phenomena. The alternative diagnosis that the individual is a victim of mind control is never taught. Neither is the fact that the technologies to create such symptoms have existed for 50 years without public knowledge.
The public is unaware, for example, that electrical activity of the visual cortex of a subject’s brain can be mapped out from images of the subject’s brain that appear on video monitors. Operatives see what the surveillance subjects’ eyes are seeing. Visual memory can also be seen and images can be inserted into the subject’s brain while they are in REM sleep for programming purposes. Two-way electronic brain link-up is done by remotely monitoring audio/visual information while transmitting sound to the auditory cortex that bypasses the ears and transmitting faint images to the visual cortex that bypass the optic nerves and eyes.
Nanotechnology computers are a generation ahead of present academic computer technology. There has been a Signals Intelligence Network since 1940 in the USA. And the Russian “Woodpecker” signal has been beamed against Americans since in the 1960s. In Moscow, Russia, high frequency beams of radiation directed at the American Embassy caused malaise, irritability, and extreme fatigue. These effects are not temporary and include cataracts, blood changes that induce heart attacks, malignancies, circulatory problems, and permanent deterioration of the nervous system. Today, the sudden attack of flu symptoms (without virus) or epileptic attack can be remotely induced in electronic warfare and an “amnesia beam” can be used to cause a sudden blank-out of memory of a target (“targeted individual” or TI) who is giving a public presentation. The latest technology includes cloning of EEG (electroencephalograms) and isolating an emotional cluster signature. The frequency/amplitude cluster is synthesized, stored on another computer and each negative emotion (fear, shame, envy, terror, hate, indifference, despair, frustration, anger, jealousy, pity, angst, embarrassment, remorse, anxiety, rage, guilty, resentment, sadness, etc.) is properly tagged and then placed on the silent-sound carrier frequencies. These frequencies will silently trigger the same basic emotions in another human being.
According to a Defense Intelligence (DIA) report, “Controlled Offensive Behavior” (1972), the most bizarre threat is the “Apport” technique, which is a form of astral projection where the “energy body” is transported to a remote site, where it de-materializes an object, transports it back, and re-materializes it. (In this form of) psychotronic warfare, electromagnetic fields and Apport phenomena mentioned in the DIA report have caused PH objects to pass through solid walls. The goal may be to use neural resonance to suppress psychic abilities via EG microwaves of the general population, as in Project Tower conducted in 1990.
Neural degeneration and DNA resonance modification can be achieved with the cellular telephone system and ELF (extremely low frequency) modulation. The two types of modulation that are biologically important are pulsed modulation and amplitude modulation. Modulation is the secret of transmitting information by electromagnetic fields, mobile phones, and new street lamps with micro-processors at malls, parks, streets, metro stations, etc.
Silent sound technology used in the (First) Gulf War was very successful. Our brain has specific frequencies for each voluntary movement called “preparatory sets.” Specific “preparatory sets” are encoded on microwave beams. Paralysis can be achieved and missing time can be induced with RHIC and EDOM (Radio-hypnotic Intra-cerebral Control and Electronic Dissolution of Memory). These methods can be used when the UFO question is used as a testing ground for electronic warfare or programmed assassins. Dr. Ross Adey found out that 0. 75 MW/cm2 pulse intensities can be used to control all aspects of human behavior.
In the United Kingdom, police have been granted the exclusive use of the 450 MHz microwave range. Microwave phones cause the neurons to release calcium ions which make the user tired and irritable, and when stressed, prone to emotional outbursts. ELF signals can cause cancer by modifying the function of the RNA transferences so that amino acid sequences are scrambled and produce unnatural proteins.
The greatest threats to our privacy are synthetic telepathy and the ability to scan our brains and read our minds using maser beams from a distance. Synthetic telepathy detects the 15 Hz 5 milliwatt auditory cortex brain emissions that are linked with the excitation potentials in the brain that are associated with sub-vocalized thoughts. New technology involving low frequency microwaves and RP can scan through walls and look inside people’s bodies as well. This allows computer-controlled targeting of specific centers in the victim’s brain even when he is walking inside the house. Microwave radiation excites the hydrogen bonds in the cell and can interfere with meiosis. This causes cell division to malfunction and leads to cancerous cells and hence, tumors.
The testing period of implanting certain groups of people (soldiers at war, prisoners, mental patients, handicapped children, the deaf and blind, single women, homosexuals, etc.) is over. Today, anyone can be targeted and plans to microchip and control the whole world population through brain-satellite-computer links are far advanced.
The Swedish State Report SOU 1972:47 reveals a lot and Director General, Jan Freese of Sweden’s DATA INSPECTION for 13 years states that the elderly in Old People’s Homes were targeted in the mid-1980s.
On July 21, 1994, the US Department of Defense (DOD) proposed that “nonlethal” weapon be used against anyone engaged in activities that they opposed. That could include almost anything and anyone. Mind control technology is classified under “non-lethal weapons.” DOD’s potential enemies may be counter-culture individuals, those with opposing political views, economic or financial competitors, biological undesirables, etc.
There is evidence that some (civil-military gang stalking) organizations have moved against these people or groups, slandering, harassing, and even killing without adequate cause or sanction.
Secret neuro-telecommunication, cybernetics, and electronic warfare capabilities can lead to abuse by unethical people in positions of power. Globus 2 in Vardo, northern Norway, operating since 1999, and HAARP (High Active-Frequency Auroral Research Project) in Alaska are of great concern because of their long-distance capabilities to influence both global weather and the human mind and behavior. “He who controls the human mind controls the world.”
IV.b. NEURO-ELECTROMAGNETIC TELECOMMUNICATION: Poster Presentation-Abstract at a RCTIC Symposium on Mechanics of Memory and Memory Disorder: March 17-18, 2001. (3:29)
Music: The Path from Wyoming Waltz
By Dr. Rauni-Leena Luukanen-Kilde (M.D.)
Biotelemetry, neurological communication, and control methods have been used for decades and the mental and physical health effects after the year 2000 are discussed. The objectives of achieving behavior modification and influencing bodily and brain functions and mental and emotional processes remotely and wirelessly through COMPUTER-SATELLITE LINKS have been achieved. Methods used in this research are literature surveys and experimentation. The astronauts were implanted with microchips so all their body functions, feelings, thoughts, dreams and even subconscious could be continuously seen and monitored from earth.
Supercomputer screen of over 200 billion bits/sec override human thought of 5000 bits/second 152 micro millimeter diameter chips also create a computer generated visualization based upon the user request. They are usually situated in the cochleas or optic nerve or temporal frontal lobe or placed (via endoscopic trasphenoidal pituitary surgery or subcutaneously). During a checkout of the laser machine in DISCOVERY, it began eliminating pulses of 10 per/second rate which is within the frequency of the human brain’s alpha wave range. Microchips operate with a low frequency radio wave aimed at it through satellite and the implanted person can be located anywhere. Two-way radio-communication controls the subject.
CONCLUSIONS: The neuro-electronmagnetic wireless control is successful technology and shows that microwaves can cause healthy persons to hear voices and motion, and emotions and behavior can be directed by electrical forces. The European Parliament has in its Resolution on Environment, Security, and Foreign Policy (28 Jan. 1999) suggested it is necessary to introduce a global ban on all developments and deployments which might enable any form of manipulation of human beings. The RHIC-EDOM system (Radio-hypnotic Intra-cerebral Control and Electronic Dissolution of Memory) is of utmost importance today and is being used with military and intelligence operations in NATO countries.
IV.c. Bio-electromagnetic Weapons” (time: 6:51)
Music: Why Should It Be? from Guitar Reflections Vol. 2
From: “Bio-electromagnetic Weapons: The Ultimate Weapon” (Girard, 2007) and “A Current US Program of Involuntary Human Experimentation” (2005)
“Electromagnetic weapons operate at the speed of light; they can kill, torture and enslave; but the public are largely unaware that they exist, because these weapons operate by stealth and leave no physical evidence. Electromagnetic weapons have been tested on human beings since 1976. By widely dispersing the involuntary human test-subjects, and vehemently attacking their credibility, it has been possible for the United States to proceed with these human experiments unhindered by discussions or criticisms, let alone opposition.
This ultimate weapon system is currently being deployed in Iraq. The US Air Force and the Marine Corps refer to it as “active denial technology”, as if it were used purely for defense, but it is not.
There is only one electromagnetic spectrum. The US military has weaponized the non-ionizing radiation below the visible range, the microwaves and radio waves that are used in mobile phones and telecommunications. The US government has strenuously denied that there could be health hazards from non-ionizing electromagnetic radiation, both as a defense of the involuntary human research it has been conducting for many years but has not yet acknowledged, and to dissuade other countries from developing similar weapons.
In 1959, Saul B. Sells, a professor of social psychology at a minor US university submitted a proposal to the Central Intelligence Agency (CIA) to build for them the most sophisticated electroencephalography machine that would have an integral computational capacity to analyze and, hopefully, make sense of the brain waves it recorded. In other words, the professor proposed to make a machine that could tell the CIA what a person was thinking, whether or not the person wished to disclose that information.
The CIA approved the project in 1960, adding some library research with five objectives. The fifth objective of the research was, “Techniques for Activating the Human Organism by Remote Electronic Means”. The entire assignment was thereafter known as MKULTRA subproject 119, MKULTRA being the CIA’s notorious mind control program. It was based on the erroneous notion that the Soviets already possessed the means to control minds and the US had to catch up as rapidly as possible.
In 1973, Joseph C. Sharp, an experimental psychologist at Walter Reed Army Institute of Research performed an experiment that was pivotal to the development of the torture equipment being shipped to Iraq today. He had James Lin set up equipment in his laboratory which converted the shape of sound waves into microwave radiation that enabled him to hear himself vocalize the names of the numbers from one to ten in his head, by-passing the mechanism of his own ears. This particular experiment was never published but is mentioned in Lin’s book, Microwave Auditory Effects and Applications, published in 1978 [5].
The experiment has been confirmed in US Patent 6 587 729, “Apparatus for Audibly Communicating Speech Using the Radio Frequency Hearing Effect” [6]. This patent is for an improved version of the apparatus used in the 1973 laboratory experiment, issued on July 1, 2003 and assigned to the Secretary of the Air Force. It provides scientific evidence that it is possible to hear threatening voices in one’s head without suffering from paranoid schizophrenia.
The equipment that produces synthetic telepathy is sometimes referred to as “influence technology”. While voices and visions, daydreams and nightmares are the most astonishing manifestations of this weapon system, it is also capable of crippling the human subject by limiting his/her normal range of movement, causing acute pain the equivalent of major organ failure or even death, and interfering with normal functioning of any of the human senses. In other words, any of the tortures with which the words Guantanamo Bay have become synonymous can be achieved by remote, electronic means.
When George Herbert Walker Bush became president (in1989), the incidence of co-worker killings in the post offices became so great that the expression “going postal” began to replace the commonly used expression of “going crazy”. The killing of co-workers in other workplaces began to command more media attention too [7].
I estimate that the cost of imprisoning a human being in his/her own body and applying unremitting torture is US $5 000 000 to $10 000 000 a year (see below).
By “unremitting torture” I mean exactly that. Because there is no visible evidence left by this new torture equipment such as damage to the skin, it is possible to torture the involuntary human subjects for 24 hours a day, 365 days a year. This can be done and is being done even on Christmas and Easter [8].
Torture is a labor-intensive business. What objective would justify this investment? Could it be something as insane as to rule the world by enslaving the democratic governments of the more populous countries?
IV.d. The Human Brain Project (5:22)
Music: Twinkle Little Star Twinkle from Guitar Reflections Vol. 3
From a lecture on the Human Brain Project by Robert Naeslund, Swedish TI and Mind Control Victim:
The history of Cybernetics is the history of the human brain project. It was developed as a collaboration between Military Research Agencies and major hospitals in the world.
Brains can be stolen and raped. The authorities do it!
In April 10, 1967, the New York Times editorial, “Push-Button People,” discussed the ongoing experiments and warned about the dangers of this technology. They also mentioned that probably there were countries in the world that had already planned to subjugate their people using this technique. Both the U.S. and Sweden were countries that had far-reaching plans to subjugate citizens beyond their knowledge in brain control systems.
(The Phoenix Program) in Vietnam in 1970 used this same brain technology to identify and mass murder 33,000 civilians who were identified, by the technology, as Vietcong sympathizers!!!!!!!”
In 1977, the New York Times published 30 articles about the CIA’s brain control systems. The most important thing that was brought into light was that this project already had begun in the late 1940’s, and that they had built, with this technology, a state within a state.
From New York Times editorial, August 5, 1977:
Control CIA Not Behavior
So we must add repugnant medical experimentation to the list of horror stories emerging from the CIA. It was no secret that the agency once hunted desperately for means to control human behavior. One objective was to program individuals so that they might do the agency’s bidding even to the point of ignoring such fundamental laws of human nature as self-preservation. We are not sufficiently schooled in ethics to know how this differs from murder. There is no substitute for also holding their senior officials ethically and legally responsible as individuals for all activities. Even at this late date the country should be told who sanctioned such projects and how.
“A conference was held in 1986, March 13, about the issue of mind control at the Swedish Department of Justice. Swedish Justice Minister Sten Wickbon had invited some professors, researchers, and a few politicians… One professor, Bengt Pernow, said that researchers from all over the world are coming to Sweden to experiment on humans because they don’t have the right to do that in their own countries. Because we here in Sweden have less protection for our Human Rights than other nations.
Many of those that sit in the (EU) parliament also have their brains incorporated into the defense departments’ supercomputer control systems. Of course, they become a type of puppet for the will of others.
THE EUROPEAN COMMISSION’s ETHICAL BOARD wrote (2005):
“Brain-computer interface (BCI) or direct brain control are communication technologies: they take information from the brain and externalize it…. Contemporary society is confronted with changes that have to do with the anthropological essence of individuals…To what extent might this technology be misused by the military? The Member States and their ethics councils have a responsibility to create conditions for education and constructive, informed debates in this area.”
Throughout the history of mankind, there has never existed anything more totalitarian. There has never been anything more anti-democratic. A dictatorship can never be greater than when its citizens’ brains are linked to computer control.
The State has become a cannibal, a rapist who is eating its citizens. Transforming us into biological manipulable components.
What happened during over 60 years of brain experimentation? Which doctors, professors, what institutions have been involved in the most anti-democratic project that ever existed? By what kinds of methods has it been possible to keep it off the media and people’s attention? What is the role of the medical corporations? They are involved. What does the government say? FOI’s (Sweden’s DOD/DARPA) supercomputers must be turned off. We are all about to become the State’s lab rats and chip-regulated behavior-skulls.
V.a. The Secret Team and the High Cabal (4:40)
Music: The Golden Sword from Guitar Reflections Vol. 3
From L. Fletcher Prouty’s “The Secret Team: The CIA and Its Allies in Control of the United States and the World” (1973):
The Secret Team is the functional element of the dominant power. It is the point of the spear and is neither military nor police. It is covert. It gets the job done whether it has political authorization or direction or not. In this capacity, it acts independently. It is lawless. It operates everywhere with the best of all supporting facilities from special weaponry and advanced communications, with the assurance that its members will never be prosecuted. It is subservient to the Power Elite and protected by them. The Power Elite or High Cabal need not be Royalty in these days. They are their equals or better.
Note with care, it is labeled a Team. This is because as with any highly professional team it has its managers, its front office, and its owners. These are the “Power Elite,” to whom it is beholden. They are always anonymous, and their network is ancient and world-wide.
The CIA’s most important “cover story” (lie) is that of an “intelligence agency.” Of course the CIA does make use of intelligence and its assumed role of intelligence gathering, but that is largely a front for its primary interest, “Fun and Games”- as the “Old Boys” or Jeburghs of the WWII period Office of Strategic Services (OSS) called it.
The CIA is the center of a vast, and amorphous mechanism that specializes in Covert Operations… or as Allen Dulles always called it, “Peacetime Operations.” In this sense the CIA is the willing tool of a higher level High Cabal.
It must be made clear that the heart of Covert Operations is the denial by the “operator,” i.e., the US government, of the existence of national sovereignty (of any nation). The covert operator can, and does, make the world his playground… including the USA.
The most remarkable development in the management of America’s relations with other countries since the end of World War II has been the assumption of more and more control over military, financial, and diplomatic operations at home and abroad by men whose activities are secret, whose budget is secret, whose very identities as often as not are secret- in short, by a Secret Team whose actions only those in them are in a position to monitor and to understand.
The power of the Team derives from its vast intra-governmental undercover infrastructure and its direct relationship with great private industries, mutual funds and investment houses, universities, and the news media, including foreign and domestic publishing houses. The Secret Team has very close affiliations with elements of power in more than three score foreign countries and is able when it chooses to topple governments, to create governments, and to influence governments almost anywhere in the world.
The Secret Team does not like criticism, investigation, or history and is always prone to see the world as divided into but two camps- Them and Us.
When a total communications system such as that available to the ST exists all over the world and is concealed by secrecy it is not difficult to yield to the urge to “play God” and make everything come out as desired.
V.b. Quotes on CIA Mind Control (5:27)
Music: Opus 1 from The Refuge
From; Psychic Dictatorship in the U.S.A. 1995 by Alex Constantine,
“In 1953, (CIA Director Allen) Dulles, speaking before a national meeting of Princeton alumni, distinguished two fronts in the then-current “battle for men’s minds”: a “first front” of mass indoctrination through censorship and propaganda, and a “second front” of individual “brainwashing” and “brain changing.” Before an audience of fellow Ivy Leaguers, Dulles skipped the usual pieties about democracy. The same year, Dulles approved the CIA’s notorious MKULTRA project, and exempted it from normal CIA financial controls.”
From: Mass Control: Engineering Human Consciousness (1999) by Jim Keith,
“One of the most macabre series of experiments outside of the Inquisition was funded by the CIA and conducted by Dr. Ewen Cameron, with funds also coming from the Canadian government, the Rockefeller Foundation, and the Gershickter Foundation. Cameron had studied at the Royal Mental Hospital in Glascow, Scotland, under the tutelage of eugenicist Sir David Henderson. He later took over the psychiatric division of the Allen Memorial Institute at McGill University in Montreal, which had been founded with Rockefeller monies. Allen Dulles called Allen Memorial “a good source for human guinea pigs.”
From: In Search of the Manchurian Candidate, the CIA and Mind Control (1976), by John Marks:
“The principal secret of secret intelligence is how to get someone to do your bidding….. From its beginning in 1947, the CIA… has spent millions of dollars (actually now probably billions – ETK) on a major program of research to find drugs or other esoteric methods to bring ordinary people, willing and unwilling alike, under complete control- to act, to talk, to reveal the most precious secrets, even to forget on command.”
From: Operation Mind Control: The CIA’s Plot Against America (1978) by Walter Bowart,
“Cryptocracy” is a compound of “crypto”, meaning “secret,” and “cracy,” meaning “rule, government, governing body.” The “cryptocracy” then is the secret government whose identity and whereabouts have slowly and reluctantly been hinted at by the Congress through its investigations into Watergate, the CIA, and the rest of the intelligence community…..
The cryptocracy invades the privacy of citizens and corporations. It meddles, often violently, in the internal politics of foreign countries, and has hired, trained, and equipped mind-controlled assassins for the murder of heads of state (including JFK, RFK, MLK Jr. etc.- author’s addition)…. The story within the story, I discovered, is an astonishing one of a psychological war waged by the U.S. cryptocracy against the American people.”
From CIA Spychiatrist, Dr. Jose Delgado’s, testimony in front of US Congress, 1974:
“The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Some day armies and generals will be controlled by electric stimulation of the brain.”
From The Illuminati Formula Appendix I: The Programmers by Fritz Springmeier,
“Over two million Americans have been programmed by trauma-based mind control since 1947, and the CIA admitted its Mind Control publicly in 1970, and yet the existence of the mind-control is still secret to the general public.”
From British psychiatry: From Eugenics to Assassination, Executive Intelligence Review, V. 21, 2002, by Anton Chaitkin:
“……the overall project, including MK-Ultra, has been foreign-sponsored and anti-American in its purposes. We shall outline here the British background of this deeply criminal enterprise, with its roots in the political and psychiatric movement called eugenics.”
V.c. More On The CIA’s “No-Touch Torture” (6:31)
Music: Meadows of Dan from The Refuge
From Carol Welsh, “Making Sense Of Mind Control and No-Touch Torture: In Contravention of Conventional Wisdom” (2012)
“Through covert trial and error, the CIA, in collaboration with university researchers, slowly identified three key behavioral components integral to its emerging techniques for psychological torture.
“Discovery #1: Sensory deprivation. In the early 1950s …Dr. Donald Hebb found that he could induce a state akin to psychosis in just 48 hours. …after just two to three days of such isolation [sitting in a cubicle ..with goggles, gloves and ear muffs on.] “the subject’s very identity had begun to disintegrate.”
“Discovery #2. Self-inflicted pain. …Albert Biderman, Irving L. Janis, Harold Wolff, and Lawrence Hinkle, advised the agency about the role of self-inflicted pain in Communist interrogation. …During the 1950s as well, two eminent neurologists at Cornell Medical Center working for the CIA found that the KGB’s most devastating torture technique involved, not crude physical beatings, but simply forcing the victim to stand for days at a time, while the legs swelled, the skin erupted in suppurating lesions, the kidneys shut down, hallucinations began.
“Discovery #3. Anyone can torture. …Finally, a young Yale psychologist Stanley Milgram, …conducted his famed obedience experiments, asking ordinary New Haven citizens to torture on command and discovering that, in contravention of conventional wisdom, anyone could be trained to torture. …[Milgram] did controversial research under a government grant showing that almost any individual is capable of torture, a critical finding for the agency as it prepared to disseminate its method worldwide.
By the project’s end in the late 1960s, this torture research had involved three of the 100 most eminent psychologists of the 20th century-Hebb, Milgram, and Janis, as well as several presidents of the American Psychiatric Association and the American Psychological Association.
That notorious photo of a hooded Iraqi on a box, arms extended and wires to his hands, exposes this covert method. The hood is for sensory deprivation, and the arms are extended for self-inflicted pain. … Although seemingly less brutal than physical methods, no-touch torture leaves deep psychological scars on both victims and interrogators. One British journalist who observed this method’s use in Northern Ireland called sensory deprivation “the worst form of torture” because it “provokes more anxiety among the interrogatees than more traditional tortures, leaves no visible scars and, therefore, is harder to prove, and produces longer lasting effects.”
Doerr-Zegers explained that techniques of torture work by creating deception, distrust, fear, disorientation, a “kind of total theater” that leaves the victim disoriented and “emotionally and psychological damaged.” The similarity of the explanation below to “street theater” found in mind control allegations is remarkable:
As Doerr-Zegers describes it, the psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction.
To make their artifice of false charges, fabricated news, and mock executions convincing, interrogators often become inspired thespians. The torture chamber itself thus has the theatricality of a set with special lighting, sound effects, props, and backdrop, all designed with a perverse stagecraft to evoke an aura of fear. Both stage and cell construct their own kind of temporality. While the play both expands and collapses time to carry the audience forward toward denouement, the prison distorts time to disorientate and then entrap the victim.
As the torturer manipulates circumstances to “maximize confusion,” the victim feels “prior schemas of the self and the world … shattered” and becomes receptive to the “torturer’s construction of reality.”
The U.S. government is using mental illness as a cover-up of mind control experimentation. Many of the experiments are designed to mimic mental illness. For example, the mental illness diagnosis manual for psychiatrists states that the mentally ill patient put unusual meaning or interpretations into normal objects. The experimenters can engineer visual and audio patterns and change the amount and timing of any environment in a specific way to make the victim see what a mentally ill person would see. In my case, I have videotaped evidence of this effect.
I and most survivors have not been able to obtain help. This is typical in government cover-up situations. And because of the nature of the technology itself, any efforts to stop the experimentation can be sabotaged with the mind control technology itself.
V.d. Confessions of CIA Operatives (4:05)
Music: Early Autumn from Guitar Reflections Vol. 3
James Jesus Angleton summed up his career in the CIA in a mid 1980’s interview with author, Joseph Trento:
“You know how I got to be in charge of counterintelligence? I agreed not to polygraph or require detailed background checks on (Wall Street lawyer and spy) Allen Dulles and 60 of his closest friends. The real problem, Angleton concluded, was that “there was no accountability. And without real accountability everything turned to xxxx.
You know, the CIA got tens of thousands of brave people killed… (ETK: Actually, the figure is estimated in the range of 6 to 30 million). We played with lives as if we owned them. We gave false hope. We – I – so misjudged what happened.
Fundamentally, the founding fathers of U.S. intelligence were liars. The better you lied and the more you betrayed, the more likely you would be promoted. These people attracted and promoted each other. Outside of their duplicity, the only thing they had in common was a desire for absolute power.
Allen Dulles, Richard Helms, Carmel Offie, and Frank Wisner were the grand masters. If you were in a room with them you were in a room full of people that you had to believe would deservedly end up in hell. I guess I will see them there soon.”
From Joseph Trento’s “The Secret History of the CIA,” (2001) pp. 478-479
-Colonel George Hunter White, overseer of four of CIA’s 149 MKULTRA Subprojects, including “Midnight Climax,” CIA/OSS (Office of Strategic Services)/FBN, in his final report to Dr. Sidney Gottlieb, head of CIA’s TSS (Technical Services Staff),
“I toiled wholeheartedly in the vineyards because it was fun, fun, fun. Where else could a red-blooded American boy lie, kill and cheat, steal, deceive, rape and pillage with the sanction and blessing of the All-Highest?”
(EX-CIA Whistleblower, John Stockwell: “US Fascist Shadow Government, CIA Secret Wars and Drug Running, Gulf War I and NWO, JFK Assassination, etc. (1986, 1989, 1991)
John Stockwell, The Praetorian Guard; The US Role in the New World Order (1999)
“It is the function of the CIA to keep the world unstable, and to propagandize the American people to hate, so we will let the establishment spend any amount of money on arms….” -John Stockwell, Ex-CIA Station Chief and highest CIA employee to “go public”
Coming to grips with these US/CIA activities in broad numbers and figuring out how many people have been killed in the jungles of Laos or the hills of Nicaragua is very difficult. But adding them up as best we can, we come up with a minimum figure of 6 million- and this is a minimum figure. Included are: one million killed in the Korea War, two million killed in the Vietnam War, 800,000 killed in Indonesia, one million in Cambodia, 20,000 killed in Angola, and 22,000 killed in Nicaragua. These people would not have died if the US taxdollars had not been spent by the CIA to inflame tensions, finance covert political and military activity, and destabilize societies.
V.e. CIA As Organized Crime (4:07)
Music: Highland Fling from Guitar Reflections Vol. 3
1) Douglas Valentine’s “The CIA as Organized Crime, How Covert Operations Corrupt America and the World” (2017) states:
“Over the course of its 70-year reign of terror, the CIA has overthrown countless governments, started innumerable wars, costing millions of innocent lives, and otherwise subverted and sabotaged friends and foes alike. Despite all this murder and mayhem, it has only lost around 100 officers.
…. CIA officers are at the pinnacle of the Brotherhood. Blessed with fake identities and bodyguards, they fly around in private planes, live in villas, and kill with state-of-the-art technology. They tell army generals what to do. They direct Congressional committees. They assassinate heads of state and innocent children equally, with impunity, with indifference.
In Afghanistan, CIA officers manage the drug trade from their hammocks in the shade. Opium production has soared since they purchased the government in 2001. They watch in amusement as addiction rates soar among young people whose parents have been killed and whose minds have been damaged by 15 years of US aggression. They don’t care that the drugs reach America’s inner cities.
…. The CIA plays the same role in Afghanistan that the Gestapo and SS Einsatzgruppen performed in France in World War Two- terrorizing the urban resistance and partisan bands in the countryside by targeting their friends and families. The CIA’s objective is to rip apart the poor and working class families and, in the process, unravel the fabric of Afghan society, until the Afghan people accept American domination. They don’t care how long it takes either. Afghanistan is a means to get at Russia, similar to how Nixon played the China Card in Vietnam.
…. The Afghan people hate the Americans more and more, year after year. And that makes the CIA happy, in so far as it spells protracted war and increased profits for its sponsors in the arms industry.
Afghan anger means more resistance. And more resistance provides a neat pretext for the eternal military occupation of a disposable nation strategically located near Russia and China. The Taliban will never surrender, and, for the CIA, that means victory in Afghanistan. But it also means spiritual defeat for America, as it descends ever further into the black hole of self-deception, militarism, and covert operations.
The CIA regards us all as either cannon fodder or lab rats.”
2) From Maria Serna’s article Crusade For Justice (From CounterSpy Volume 3, Issue 1, 1976) (Declassified “CounterSpy” Magazine (1973-1984) Issues Expose U.S. Government-CIA-FBI Criminal/Terrorist Operations Worldwide
“Intelligence operations have turned out to be a domestic war.”
3) (From CounterSpy Volume 2, Issue 4, 1976)
“Abolish the CIA and Covert Action: The Organizing Committee demands the CIA and covert action be abolished not only because we recognize that the CIA serves only the multinational corporate empire, which is thoroughly antidemocratic and unAmerican, but also because the CIA is a criminal organization and covert actions are criminal actions.”
V.f. Ode To Jimmy: The Backstory (3:15)
Music: Ode to Jimmy from Guitar Reflections vol. 1
From: From “Whiteout: The CIA, Drugs, and the Press,” Alexander Cockburn and Jeffrey St. Claire (1998) (3:09)
“General Vang Pao controlled the opium trade in the Plain of Jars region of Laos. By buying up the one salable crop, the general could garner the allegiance of the hill tribes as well as stuff his own bank account. He would pay $60 a kilo, $10 over the prevailing rate, and would purchase a village’s crop if, in return, the village would supply recruits for his army.
In 1967, the CIA and USAID purchased two C-47s for Vang Pao, who opened up his own air transport company, which he called Xieng Khouang Air, known by one and all as Air Opium. At the time the CIA decided to give Vang Pao his own airline, the CIA station chief in Vientiane was Ted Shackley, a man who had gotten his start in the CIA’s Paperclip project, recruiting Nazi scientists. Before he came to Laos, Shackley had headed the Agency’s Miami station, where he orchestrated the repeated terror raids and assassination bids against Cuba and consorted with the local Cuban émigrés, themselves deeply involved in the drug trade. Shackley was an ardent exponent of the idea of purchasing the loyalty of CIA clients by a policy of economic assistance. Tolerance, indeed active support, of the opium trade was therefore a proper military and diplomatic strategy.
When Shackley was in Vientiane, his associate Thomas Clines, was handling business at Long Tieng. Another CIA man, Edwin Wilson, was delivering espionage equipment to Shackley in Laos. Richard Secord was supervising CIA operations, thus participating in a bombing program depositing more high explosive on peasants and guerrillas in the Plain of Jars than did the US on Germany and Japan during the whole of World War II. Shackley, Clines, Secord, and Air America cargo kicker Eugene Hasenfus, show up later in our story, in Central America, once again amid the CIA’s active complicity in the drug trade.
This CIA-transported opium engendered an addiction rate among US servicemen in Vietnam of up to 30 percent, with the soldiers spending some $80 million a year on heroin. In the early 1970s, some of this same heroin was being smuggled back to the US in the body bags of dead servicemen.
VI.a. William Binney Ex-NSA on Operation Stellar Wind (3:22)
Music: Sombra del Alma From Wyoming Waltz
“NSA (National Security Agency) decided that with bulk acquisition of data, US citizens would be the first to have (all) their information collected. The rest of the world are now being treated like US citizens.
(This) falls back to the principles of totalitarianism and how dictators have operated down through the centuries. It’s know what your people are doing and find the ones who are not conforming to what you want them to do and then get rid of them. And that’s fundamentally what this process does.
It gives them that kind of knowledge about everyone in the country. And if you start to speak up about some issue or something you get noticed and they have all that data already assembled on you. And they simply go compile it and look at it and see how they can influence you to do what they would conceive to be the right thing. So that’s how they use it against people. And you make sure that they know what you know about what they’ve got. So then they (the people) fear you and will conform to your wishes. And if they can’t find anything on you specifically, but they can find something on somebody you care about, then they’ll use that against you.
These are standard KGB tactics also.”
“President Obama is fundamentally attacking all whistleblowers as much as he can. He has prosecuted more whistleblowers than the entire set of presidents before him. He wants to silence them. He’s a constitutional lawyer (so) he knows this is a direct violation of the constitution.”
.. this goes back to Caesar Augustus. Anybody that opposed him- you needed to know about it first of all, and once that happened, they would disappear. The same was true of the Soviet Union or East Germany with the Stasi. If you said anything out of line, you ended up in jail or in a sanitarium or something or in a gulag somewhere. The same was true of the Nazis and the Gestapo and SS.
This is the way totalitarian states operate. This gathering knowledge about people and the entire population is a totalitarian procedure. This is the domestic threat that our Constitution and the oath of office we took was given to prevent. No other country in the world could have done to us what we have done to ourselves.
This is the time when all good Americans need to stand up and oppose this. … These agencies are threatening what is fundamental to human rights everywhere. (We) have to ensure that we have some way of verifying and keeping these agencies in line.
VII.a. Confessions of a Neuroscientist (2:04)
Music: Em Twins from Guitar Reflections Vol. 3
Dr. James Giordano, Professor of Neuroscience, Georgetown University, and DARPA/U.S. Army Consultant, in a lecture entitled: “Brain Science from Bench to Battlefield: The Realities – and Risks – of Neuroweapons” Aug 29, 2017
“Neuroscience captures $175 billion dollars annual market space…. The brain is the next battlespace…. We are targeting the brain…. We need to recon (the) target area (i.e., the domestic population) in order to: 1) acquire viable targets and 2) avoid collateral damage. Like (in) any race, the morbidity and mortality, going at this speed… is real.
We are tracking neurological or brain signatures of key targeted individuals that are thought to represent whole groups. If I understand how his or her brain works and do this on a broad enough scale, I can develop patterns and I can use this in ways that informs my intelligence; this force multiplies and synergizes my human intelligence (HUMINT), my signals intelligence (SIGINT), and my communications intelligence (COMINT). NEURINT (Neuro intelligence) coupled with assessment and access gives me these capabilities….
I can utilize neuro-pharmacologics and various forms of brain stimulation to extract information from key intelligence targets.”
Dr. Giordano has served as Senior Science Advisory Fellow of the Strategic Multilayer Assessment Branch of the Joint Staff of the Pentagon and as an appointed member of the Neuroethics, Legal and Social Issues (NELSI) Advisory Panel of the Defense Advanced Research Projects’ Agency (DARPA)
VIII.a. Kay Griggs’ Gangstalking Testimony (5:20)
Music: A Patch of Blue from Guitar Reflections Vol. 1
Kay Griggs holds B.S. and M.A. degrees in history and she is a political insider. She was the wife of Col. George Griggs, U.S. Marine Corps Special Ops assassin, for 11 years. The following is excerpted from interviews she gave in 1998 and 2005.
They are psychologically and financially trying to destroy me because I’m telling the truth. I was being handled psychologically. On the 4th of March, 1996, my home was broken into. They tried threatening me and so forth. Each time I was totally traumatized. They were sabotaging my car. They are doing psychological operations in my home. And this is being done to other women and (military) wives and men who don’t go along with the program. They poison people. They would “mind jag” me, having fun with me psychologically.
This is why I got “flagged:” I stopped the topless go-go dancers in the officer’s club dining hall. General Al Gray had me marked as a troublemaker.
When the “psyching” (i.e., gang stalking) was beginning, I had white blouses in my closets but they would break in and paint black dots on them. Later, they would (break in and) put lots of batteries in a drawer. Then they (broke in and) put about 12 screwdrivers on the table.
I called the police after a number of little break ins. The policeman they sent was a short guy with a short haircut, named Shorty Satterwhite…. And he said, ‘Mrs. Griggs, you are just traumatized, you’re making this up.’ And now I found out, he was a 20-year marine. He’s still reserve.
So I called Torrence, the head of the FBI. He sends out Dan McNally, another 20-year marine.
Things were done to me… and I was trying to figure out what was going on. Some of the guys laughed and said we just practice on the (military) wives. Some of the things done to me were not only sadistic, but cruel. One night the SEALS were caught in my neighborhood. The windows in my car were smashed two or three times. I had tires flattened. They laugh about it; Ha ha ha.
Sarah McClendon, the Senior White House Correspondent, told me she had to call me from another house, because every time she called here, a man came to the phone and said this was a military base and “the Griggs’ don’t live here anymore.”
Griggs shows the “Intelligence and Electronic Warfare Operations Field Manual (1983)” of the US Army.
“This book is all about what happened to me. Army, Air Force, Navy, Marine Corps. This shows how arrogant they are about subversion and deception. Deep operations and deep cover. Deception is so important to them.
Reading from the Manual: “An important part of electronic warfare is deception”.. and knowing everything about the person who is designated as the target….
Human beings are called “targets.” Women, wives like me, are called “targets” and are being “targeted” by the military. So they’ll have a team to trying to find out everything about me, and my family, my grandparents, my friends, etc. to try to discredit me. And of course everybody who is “flagged” who is a “target” (is subject to electronic) “jamming”…. being hit by electromagnetic radiation….
(And) if they transgress that line, where they upset somebody in the high command, just like in Germany, they all of a sudden move from being a person to being a “target,” from being a human being to being a target, therefore “the enemy.” Which is also what happened in Germany.
The Justice Department is involved in this. There are rogues in the Justice Department who think they are handling people by using cruelty, tricks, psychological games.
The ‘psychological operations group’ came in through some of the Germans…. It was institutionalized before, during and after WWII, when the entire German Command, the SS, were given money by the Joint Chiefs of Staff, the Army. In fact, (Nazi General Reinhard) Gehlen (Head of German Intelligence, the “Gehlen Organization”) himself was in Virginia for a whole year with his 6 guys. And lots of people went up to Fort Hunt to see him.
So the psychological operations games that the Soviets and Germans used were institutionalized in our American Army and Joint Command. It wasn’t just the CIA. That’s just wrong.
We’ve got to stop the growth of this stuff. It’s a growth industry and it’s growing exponentially. They are intending to destroy America. The frightening thing is that this exactly the same pattern that happened in Nazi Germany.
VIII.b. Dr. Rauni Kilde’s Testimony Part 1 (7:23)
Music: The Ancient Forest from The River
The Late Dr. Rauni Kilde was stalked, zapped, and tortured for 30 years and probably murdered by induced heart attack in 2015. She was a medical doctor and researcher, Chief Medical Officer of northern Finland, author, lecturer, and a Targeted Individual. From her book: “Bright Light on Black Shadows:” Here Dr. Kilde refers to herself in the third person:
“One after another, previously friendly neighbors turned against her. They stopped greeting her, their children were forbidden to come and play in the victim’s garden as before, and they spread nasty rumors and lies about her. Just like that, they portrayed her as a member of a group of 12 naked women who worshipped the sun! They said she was a spy; a threat to “national security.” All nonsense, of course. One by one, her friends were recruited, bought, or blackmailed. A couple friends who remained were recruited to be her “best friends”- to find out all the information about her they could and report on her reactions while they were harassing her and to report her intentions and travels and contacts to “The Organization.”
Her neighbors started wearing black sunglasses when seeing her come out of her house. Black sunglasses are worn by all recruiters, soldiers, agents, etc., even in the winter and evenings. They are left on the table as a sign of belonging to the Organization. They are used for signaling that they are recruits. Just as they use bicycles, often old, black, men’s bicycles (but other types can be used too), in front of their front door or garage or office or shop or institute to show that they are in The Organization. Suddenly her neighbors started leaving their bicycles out- after their recruitment.
Suddenly “look alike cars” started coming to her neighbors for visits. Even license numbers were almost the same; only the last number or two were different. Of course, the aim was to confuse. A noise campaign started. The neighbor started slamming garage doors and house doors with great intensity several times a day. Also, lights were all lit in the house and outside, unlike before. A new strange light was built on the telephone pole giving a great intensity at night, as measured by an electromagnetic light detector.
The neighbors were always at their windows when she came home at night- or they came out and stared at her like lunatics, saying nothing. When she had been out, someone had broken into her house and turned on the lights. Someone had stolen her keys and kept breaking into her house when she was gone. Then the terrorizing intensified. Documents were constantly stolen from locked drawers. Passports, ID cards, hospital records, fax papers, insurance papers, etc. disappeared. The reports from her scientific work vanished as well as important new books acquired from abroad, conference reports, etc.
Then the sabotage spread to the furniture, which was cut and painted and some was destroyed as with some kind of heating instrument. The refrigerator and freezer doors were broken; the stove was broken, and the electricity was tampered with. She got an electric shock when putting the lights on – someone had been rewiring the electrical cords. Her alarm code was changed and later the door alarm was shot down as with a laser gun from the nearby house where recruits were having their weekly meeting. Then they shot a big energy blast in her garden and her windows shattered. Then they started using gasses and poisons. They used NSA kits. They spread chemicals through the air ducts and water pipes which cause sickness and alter the mind and moods. This went on for over a year, and still continues today, though less often.
When she lit the fireplace, suddenly a gas poison with a burning smell spread through the room. At the same time, the neighbors’ kids were grilling and a huge, unusual black smoke came up so as to camouflage her fireplace poison. The poisonous smell of the poisonous gasses were also camouflaged by familiar smells such as the smell of strong coffee, freshly-baked bread, the smell of ginger or old clothes, the smell of benzene, etc.
Then came the strange whistles and bird sounds, the sounds of dogs barking- as signals from the recruits for surveillance. When she went to another town and stayed overnight with friends, garbage disposals started running for prolonged periods and way too often- as if to signal she was under surveillance. In her city apartment, her mail came late- after 10 PM, when she had just come in 5 minutes before. This became a pattern. Also, a CIA “safe house” on the other side of the street always put the lights on in the room opposite to the room she was staying in.
Also, she started hearing comments by strangers which try to awaken paranoid reactions and there are recurrent confrontations by unusually rude and hostile strangers. For example, at a railway station, guards in uniform hit her suddenly “by accident” and their police dog tries to attack her for no apparent reason. She is attacked by strangely-behaving men in the street who knock her down onto the street and then receive no punishment by the legal system.
Burglary in her house has become routine. Every time she is out, someone has been in and committed acts of vandalism. The police superintendent says only: “I cannot help you” (Are these orders from above?) and no investigations are made. Homeless people, men and women looking like bums start following her. Their clothes and faces look dirty at first, but on a closer look, they are clean. Women wear a wig and their faces are made up to look like someone who has a black eye. They simulate mental illness, trying to create a public scene around the targeted victim.
Simulated drunks also follow the victim. At home, burglars have replaced normal light bulbs with exploding ones and replaced the screws of the door handles and bed with other metallic ones that are more sensitive transmitters for electromagnetic beams.
Outside the house they have drilled several holes and put metallic-like thick needles or metal pieces into the walls. Vandalism of vehicles is commonplace. Once, they drained the oil from her car which was parked, and they failed the brakes and clutch, and contaminated the oil.
Rauni Kilde, MD, Former Chief Medical Officer of Northern Finland, Dec. 6, 2000.
VIII.c. Dr. Rauni Kilde’s TI Testimony Part 2 (7:32)
Music: Guitar Reflections; Guitar Reflections Vol. 1
From Dr. Rauni Kilde’s book, Bright Light on Black Shadows (2015):
Sleep deprivation is done by electronic harassment or other conventional means. Suddenly electronic household appliances break…. Toasters and water coolers burn out- and the stove gets red hot in a few minutes when an extra-strong, electronic current is fed in by strange means.
With (electronic) beams, they break lamps, turn on the radio by remote control in the middle of the night and zap her with radio waves. They have torn every handbag by breaking the inside lining… and also torn (her) clothing. She was told it was for looking into hidden documents!
What stupidity- doing this year after year to innocent people. (Her) elderly parents in their 90’s became targets of intimidation as well as young people. Microwaves are used to induce extreme stress and harassment. Strange people follow the victim in the street wearing T-shirts with special messages like “run dog run.” When she wrote Canada for help and mailed the letter, in 15 minutes a strange woman also jumped at her in the street wearing a plastic bag that had the word “Canada” written on it, and coughing excessively to attract her attention. Loud speaking and artificial laughs and coughs at inappropriate occasions are part of the harassment.
Several years of covert harassment has taught her a lot about their criminal methods. Satanism is widely used. Young women and men dressed all in black and wearing ear and nose rings are doing surveillance- sometimes with bicycles and rucksacks on their backs.
Recruits signal with colors in their clothing. Fresh recruits use pink- for reasons unknown. Old ladies wear white and black. During the Vietnam War when poisons and chemicals such as Agent Orange were used, the project was called Orange. Thus, today when recruits poison the victim, they commonly wear orange shirts, coats, blouses or shorts. When they radiate with microwaves or other electromagnetic or radio waves, they use yellow. Yellow towels, yellow T-shirts are a sign for danger and radiation and radioactivity.
They can also irradiate, poison and destroy bushes, trees and flowers in the garden fro helicopters when they have marked special houses for harassment. Nike clothing- caps, shorts, tennis shoes and sweat-shirts are also often worn by recruits. This is probably because a former Californian military based called NIKE has become a mind control training center.
She has often been followed by people wearing Nike caps and clothing when they terrorize her with laser beaming with instruments camouflaged as cameras, transistor radios, barbering machines, etc. The beams make one feel sick, nauseated, lethargic, and cause headaches.
They use them in buses, trains, and even airplanes, where “perps” often sit behind their victim. In buses, the recruits usually sit at the back and one comes from the same station as the victim into the bus. However, often another “soldier” who is already on the bus observes how his colleague is doing his task! Then one of them gets off the bus and another, maybe a woman, comes in with a rucksack and a fishing rod- another much-used camouflage for recruits.
Laser beaming devises can be hidden in these rucksacks, in attaché cases, and bigger EMP weapons are commonly hidden in a suitcase in the adjoining compartment of the train to where the victim sits and is beamed through the wall. They are also used in conference rooms when The Organization’s “soldiers” are trying to confuse the speaker. These are called “amnesia beams” and were already developed in the 1950’s. And yet very few people know about this technology even today.
She has seen one of these suitcases eve in the main post office- next to the photocopying machine. It was left there by itself. And while the victim makes copies, extremely powerful radiation emissions fed from the machine also makes extra copies which are left in the machine.
Did you know that authorities get automatically a copy of your papers this way? There are absolutely no secrets anymore, anywhere.
The victim also noticed in her apartment unusual patterns of occupancy in the flats surrounding hers, upstairs, downstairs and on all sides. Suddenly inhabitants changed apartments so that they appear empty- and then furnished- and strange operations seem to be conducted from them by electronic means. They seem to be used as bases of operation of mind control experiments. If families still live in them, they were recruited for sabotage operations. This encirclement facilitates studies of holographic human telemetrics. Devices are used to “see” through the walls and victims’ thought signals and intentions can be traced on a computer next door.
This might sound like science fiction, but it is only advanced technology today that has been kept secret from mediocratic academic circles and the general public for decades already! To camouflage all this criminal activity, doctors are taught in medical school that people that expose these “operations” are paranoid. Thus, they double the victims’ suffering, because they are not believed, and intelligence agencies’ criminality can continue as before!
“… One reason this technology has remained a state secret is the widespread prestige of (the) psychiatric DIAGNOSTIC and STATISTICAL MANUAL IV produced by the US American Psychiatric Association (APA), and printed in 18 languages. Psychiatrists working for US intelligence agencies no doubt participated in writing and revising this manual. This psychiatric “bible” covers up the secret development of MC (mind control) technologies by labeling some of their effects as symptoms of paranoid schizophrenia. Victims and mind-controlled experimentees are thus routinely diagnosed, knee-jerk fashion, as mentally ill by doctors who learned the DSM “symptom” list in medical school. Physicians have not been schooled that patients may be telling the truth when they report being targeted against their will or being used as guinea pigs for electronic, chemical, and bacteriological forms of psychological warfare. Time is running out for changing the direction of military medicine, and ensuring the future of human freedom.”
Rauni Kilde, MD, Former Chief Medical Officer of Northern Finland, Dec. 6, 2000.
VIII.d. Stephen O’Keefe’s TI Testimony Part 1 (6:12)
Music: Rocky Mountain Boogie from The Refuge
From: Targeted Individual As Lone Wolf Terrorist (Introduction to the Op Catalyst website now removed from the Internet:
I am what is called a “targeted individual,” or enemy of the state. Becoming an enemy of the state is quite easy: uncover a few of its crimes and criminal conspiracies; be as investigative and honest as you can be; and you’ll be an enemy of the state quite quickly.
… In my case, after some years of investigative research, I uncovered existing mysteries about my own life, while attracting the interest of government intelligence services and their secret police.
These government operations are clandestine…or secret or classified. Things a government calls secret are many times very illegal, and activities a government classifies are sometimes outright criminal. You can measure a government’s illegality and criminality in the vast number of documents it conceals from public view.
Governments which target persons in the way they have targeted me are mafia-states. Meaning the government operates in secret as a highly-evolved mafia. The way a mafia targets people is by surrounding the target mostly with others connected to, or owned by, the mafia state. Informants, government employees, snitches, lackeys…and the reason for this is because you are of more value to the government than you are a physical threat.
In my case, I was targeted at a young age because of my artistic skills, observational abilities and computer programming knowledge for what the Canadian and American governments have been testing on me, which is a highly sophisticated wireless surveillance and an unbelievably advanced intelligence and military technology.
It goes under various names; I call it virtual telepathy or VT. It’s called, ‘remote neural monitoring and prompting,’ brain ‘re-patterning,’ and ‘EEG fingerprinting’. Basically, it’s a way to wirelessly monitor anybody, using the body’s biometric displacement field and also computer-interfacing the target’s brain patterns. This transforms a target—that is, a responsive target—into a test subject for a super spy, soldier and super policing program.
Virtual telepathy [VT] is a bit of a parlor trick, being a combination of hands-free biometric surveillance and remotely-prompting the human target to receive and acknowledge these prompts. It may seem like telepathy, but it’s only one-way. You are a targeted individual, with no formal affiliation to the government, its military, police or intelligence services. The reason for this is simple; this elaborately advanced surveillance technology and its clandestine handlers will drive you insane.
It is a weapon, and it is also the most powerful of weapons, being invisible. Imagine wearing a set of wireless earbuds or secret service ear-prompter, where you are receiving wireless radio instructions day and night, even in your sleep. To wake up, to go for a walk, to turn left, to turn right, to stop, to start, to nod ‘yes’ or shake your head ‘no’…like an obedient soldier.
Now imagine receiving those instructions after taking off those physical headphones, and that these signals can reach your head wirelessly, anywhere you go, like a radio. You can understand why intelligence, military and police desire this immensely, as there are no communications which can be monitored or intercepted by a third party.
It is private, discrete and transmitted through an anonymous computer interface to the target’s own brain fingerprint, which is theirs and theirs alone, exploiting the same wireless frequencies which are all around us.
Adapting to this technology requires isolating the target and destroying their life and sanity in a complete personality disintegration, thereby infiltrating their brain.
Canada has a history of this brain ‘re-patterning’, going back to the 1950s with the government and CIA-funded MKUltra program at McGill University Dr E. Cameron].
Like every type of weapon, governments never stop advancing them. It took me a long time to adapt to the VT weapon I was (and am) subjected to—over ten years. It also involved treatment with anti-psychotics, so that I could both endure it and remain sane with undisturbed sleep.
The reality is that this weapons’ development has been going on in various forms through the participation of the American, Canadian, Israeli, and British governments for quite some time, and they generally use prisoners; who are both helpless and constantly monitored in jail cells. These governments, all the way to the top, want virtually telepathic soldiers, spies and secret police, expanding the required wireless neural monitoring to global populations, whether they know about it or not.
VIII.e. Stephen O’Keefe’s TI Testimony Part 2 (5:50)
Music: Flute Song From Guitar Reflections Vol. 2
From: Targeted Individual As Lone Wolf Terrorist (Introduction to the Op Catalyst website now removed from the Internet:
In order to both deceive the target, and the people around them, that the person is insane, paranoid, delusional and mentally ill…discrediting the unwitting target until they are no longer believed…while being of immense financial and technological value to a government’s military and intelligence, multiple cover stories are essential.
My cover stories were that I was a terrorist (since I analyzed black operation terror events like 9/11), a harasser (an army of police informants were directed by mobile phone to follow and provoke me), a white supremacist (since I was a harsh critic of Zionism and Israel), a hater of America (since I was critical of its wars) and a drug user and dealer (after being followed by the police’s informant-drug addicts, who will lie about anything). I should note that I have never owned or been given a mobile phone, or any device which had wireless communication functionality.
One can be remote-influenced to think and speak about any of these topics, until the profiling and targeting campaign has an à la carte menu of options to cover-up you’re being an enslaved Guinea pig. Especially if you’ve been prompted in sleep to obsess over these issues, as if receiving instructions for a covert mission. My remote-influencing was mostly about Jews, Israel and Zionism, as speaking critically of them gets the golden stamp of Jew-hater and white supremacist required for terror profiling.
Psychiatric discrediting is the most effective way to deceive others that the target is not a victim and slave of this clandestine government program. The target says they are being monitored and followed, they are diagnosed with any number of mental illnesses, then informants and government operatives smear the target as being ‘mentally disturbed’ to everyone they come in contact with.
Everyone wants a piece of this ultimate invisible weapon, as it is vital to the International and domestic terrorism racket. In my case, it is the Canadian government. Due to my campaign profiling, the nation of Israel within Canada is also a major participant, as reiterated time and again by my government’s statements of a relationship with Israel “through fire and water.” Of course, with the CIA funding brain ‘re-patterning’ experiments in Canada since the 1950s, the core involvement of the American government is a given. In fact, I grew up near a Canadian/U.S./British military radome, about a half-hour’s walk from my home…for fourteen years.
Some persons are being targeted with this technology, not only to monitor them, but so that they are in the right place at the wrong time for entrapment stings. The target being constantly followed…with layers of surveillance, discredited psychiatrically, discredited with smear campaigns, rumour campaigns, persons lying about the person being a harasser…compiles a dossier for the secret police. They want to fabricate some event around the target…a successful target. In most cases, that is a domestic terror event.
Now, if you don’t believe governments create the crises which kill innocent persons, I’ll draw your attention to all the wars in history which have come before us, where one government or another created the conflicts which killed millions of us. The ruling classes which govern us have no setbacks in killing us off in droves, nor commanding us to their will, nor exploiting us as a compliant labour force to be taxed. We all know this, whether we like to admit it or not.
Now, the government has created an even more strategic way to do it, through the terrorism racket. Meaning that, just one domestic terror event not only creates a sense of fear in the public, an immediate psychological dependence on their government for personal security—which would otherwise not exist—but it also creates a ‘no questions asked’ policy to initiate the aforementioned wars, which kill us off just the same. Military campaigns, invasions, nation-rebuilding, bombers in the air, drones in the skies…all with no questions asked since the public wants protection from an unseen terror hiding in their midst.
Just one domestic terror event can not only result in weapons and counter terrorism technology sales in the billions of dollars, but also immense income and funding for the mafia-state itself. Military police, secret police, regular police and law enforcement intelligence must expand to have the resources to keep the criminal methods used for this expansion from being discovered by the exploited public. This cycle is as deliberate as it is destructive. A ruling classes’ government, its police and militaries must reorganize the world into their ideology to continuously sustain the authority which has already placed them there.
VIII.f. Stephen O’Keefe TI Testimony Part 3: (8:07)
Music: Old Man, What Do You See? from Guitar Reflections Vol. 2
From: Targeted Individual As Lone Wolf Terrorist (Introduction to the Op Catalyst website now removed from the Internet:
After doing exhaustive research, and living for decades as a targeted individual, I’m afraid to tell you that most of the terror events the media outlets are feeding us are fabrications using wireless surveillance, to turn targeted individuals into convincing terrorism scapegoats. Yes, even 9/11, which was probably the biggest live run of this surveillance weapon’s potential, having turned people doing nothing on CCTV video into ‘terror masterminds’. As I make this recording on April 9, 2016, it is now on a daily basis.
Only governments rotted-through with corruption would plan, let along execute, events like these to further their invasions and warfare; with no foreseeable end in sight. Instead of cutting counterterrorism budgets when terror events occur, budgets are boosted, re-evidencing the racket. In the fifteen years of sustained domestic terrorism after 9/11, not one North American, Israeli or British political or military leader has been killed in a terror event. Allowing the state to invade our privacy and collect all the information it can, using the pretext of security, has resulted in more domestic terrorism in our lives than ever before. By design.
Fabrications by intelligence agencies and the secret police [the illegal police] keep the general public fearful, psychologically-dependent on its protector government, obedient, not speaking back, sticking to work, paying taxes and not protesting. All so that the police, intelligence agencies and government remain unchecked as they profit and benefit immensely from what they call a ‘war on terror’, or a war on anywhere or anyone.
While the ruling class feeds us media and popular culture that the world revolves around us, and that government exists to serve our best interests, it actually revolves around them.
If you’ve listened so far, you should see why I was targeted by multiple governments, and why they spent so much time, effort and money to convince everyone I knew that I was insane and a threat to society. I understand the technology and the methodologies required by weaponized surveillance, remote influencing and virtual telepathy; which has been used on populations without their knowledge for quite some time now.
I also understand that the ability to record anyone, anywhere, means that governments already know where legitimate terrorists and criminals already are, and that they are pretending that they do not. This also means that private government communications have become insecure, and they have developed completely discrete communication systems; the likes of which I have been subjected to. This also means that everyone is now on their list, and never coming off of it. Government employees and assets first.
If you read through my website, Op Catalyst, and review its multimedia, you will see everything from courier deliveries from a biometric surveillance company to my next-door neighbour, RCMP, living in my building doing counterintelligence gas-lighting skits…even if you don’t believe exactly everything you read, see and hear, you’ll be unable to deny that there have been serious, expensive and completely illegal government goings-on in my life for many years.
They’ve ruined me professionally and financially, then discredited me personally, psychiatrically and socially. They are recruited as sadists, gang-mentality abusers and are most likely collectively criminally insane. They target loners deliberately to bully them, ensuring the target is personally, professionally and psychiatrically abused to a point where they have nothing good to say about law, policing or government. It is as completely deliberate as torturers tormenting their victim until nothing but words of hatred and revenge come from their lips. Every provoked statement used against the lone and helpless victim, who threatens the criminal many with the truth about their torture and abuses.
This is what makes the contrived ‘lone-wolf’ profile so cyclical; the more they covertly abuse, provoke and gas-light you that you’re insane, the faster you’ll be speaking against police, government and whatever or whomever they’ve profiled you with. I’ll tell you this; secret police especially love stalking and provoking, then psyching you out like wife beaters that it’s all your fault. You’ll be hating the criminal apparatus of the mafia-state pretty fast, which spends immense amounts of money and effort on its public image, but is the very definition of a secret society.
How they really sustain control is classified and secret, and those who uphold that secrecy exist in the tens of thousands of people who work in the military, the intelligence establishments and the secret and regular police. So, we’re not talking about a few Illuminati or political Machiavellians or religious power players; we’re taking about entire societies which use secrecy to maintain their criminal control of whatever they cannot enforce with publicly-available laws. This ruling class is what the world exists for, despite movies, songs, books, television and news media reaffirming to you that the common person is what governance exists to serve.
There’s no use asking the Royal Canadian Mounted Police, the Canadian Security Intelligence Service or the Toronto Police Service what’s truly going on with me; they’re all lying about it. Tribunal Orders have already been fabricated from Orders that they be fabricated, when the tribunal itself would have known those Orders were as fabricated as the ones they were fabricating. I’ve already endured two police-fixed hearings and a wrongful conviction, which the RCMP prevented me from overturning by shutting down my lawyer’s downtown office. The money and influence backing this cutting-edge surveillance weapon, which major governments want to command—else be remotely commanded by—is limitless.
Persons regularly around the target will be either made part of the team—with a mafia’s code of silence—or pushed-away, just like I was isolated. Terrorism is the mafia-state’s ultimate protection racket, with unlimited profitability. Protected informants can be paid over four million dollars each in Canada to set-up other people and lie about it at hearings. Those paltry millions are a drop in the bucket compared to the billions in technology and weapons sales which come as a result of terror events. Our governing ruling class has profited and empowered themselves through warfare consistently in the past, and nothing has changed that to present.
VIII.g. Stephen O’Keefe’s TI Testimony Part 4 (7:49)
Music: Given Time from Guitar Reflections Vol. 2
From: Targeted Individual As Lone Wolf Terrorist (Introduction to the Op Catalyst website now removed from the Internet:
Another reason for virtual telepathy is because, even though I have what is called ‘hard’ remote-influencing as a targeted individual, it doesn’t mean that ‘soft’ remote influencing isn’t happening on a global level at this point. This technology can influence anything: it can make you turn left if you were going to turn right; it can make you buy sugar if you were shopping for artificial sweetener; if you want to vote for one person, it can influence you to vote for another.
Most importantly, what virtual telepathy can do is remote-influence you to resist something. Meaning that, you can be wirelessly prompted to think about something, and then remote influenced that it is not a good thing to do, in combined association. That is what psychiatrists refer to as ‘thought implantation’ in diagnoses of schizophrenia, and this is why psychiatry is so important in the cover stories required by governments which fund the psychiatric institutions themselves.
If a targeted individual’s remote handlers want them to go to a certain place, they will transmit the name of that place to the target’s biometrically-located brain. Remember, this is a computer interfacing with the EEG pattern, or signature of the target’s brain, it is not a sound. It is an electronically-interpreted suggestion transmitted through an EEG pattern in the target’s spoken language. As if hearing the name on invisible wireless headphones, the brain creates an image of that place in hypnotic autosuggestion.
The mental images are triggered in the mind from memories, since the remote handlers know almost everything about their target. If this seems unreal or impossible, think of it this way…you are asleep in bed and having a dream—suddenly, the image and sound of a fire truck appears in your dream. You snap awake, and a fire truck was indeed passing by your home. Your mind formed the image of the fire truck to awaken you, based on your memory’s association with the noise outside. This is how remote-influencing works, whether you are awake or asleep, and it can trigger recurring dreams…and even the way you dream.
When the handler does not want a target to go to a certain place or do a certain thing, the name of the place or thing will be repeatedly transmitted, followed by an EEG pattern with a negative association, like insecurity or fear. These EEG-sampled emotions can be played like musical instruments, and this is why many targeted individuals feel they are communicating with a higher power or god. As before, associations with a higher power yield yet more diagnoses of mental illness, and one can see why there is a noticeable outburst in the diagnoses of bipolar disorder, schizophrenia and complex mental illnesses.
This isn’t to say mental illness does not exist and there is no need for psychiatry. On the contrary, the public being unwittingly influenced in this manner will create much more need for psychiatry and emotionally-stabilizing medications. Remote influencing becomes an immediate danger when its psychiatric abuse causes the target to lose connection with reality in a psychotic break—a reflex response by the brain to external abuse. Many victims of torture or warfare experience these reactions and, in combination with remote influencing, it makes the target unable to maintain control while being targeted with EEG-patterned prompting.
Virtual telepathy, military human targeting, weaponizing one’s own body, will eventually be sold to the public as something beneficial. Something which allows the ‘blind to see’ without Seeing Eye dogs, allowing a missing child to be found or any police suspect or domestic terrorist to be tracked with secret telepathic soldiers embedded within society. Whatever will permanently monitor entire populations into an open prison yard, which stretches both to and across a nation’s borders.
Governments have remotely tracked us and catalogued us and sorted us as persons of suspicion as long as technology has allowed them to. This first became revolutionary when International Business Machines created a punch card system for the NSDAP to organize their labour camps and classify the affiliation of the prisoners interned within.
After World War II, the victorious allies absorbed the NAZI’s technology with German scientists through Operation Paperclip, and re-adapted their experiments for North America, like project MKUltra.
Governments have since continued influencing our thoughts and monitoring the public in every way that they can. Whether it’s through our electronic communications, on foot with CCTV video, by satellite, by drone, by wireless mobile surveillance or our regular patterns of bank card and e-mail use…they do it.
“What is next? What are these huge and remotely-located data centres being built for? Why are the GPS and geographic functionalities of all these wireless devices becoming more powerful? Who benefits?” Well, obviously, the answer is not good for you.
My being a slave, a psychiatric abuse victim and, most importantly, a live human experiment with the Canadian, American, Israeli and British governments all involved… these governments would never test this on anybody they cared about, and require socially isolated people who live alone in apartments or condos, where they can be surrounded by surveillance technology to contain and control them.
You’ll understand the need for the false cover stories to ensure nobody wants to be around you anyway. This is why the terror racket has created and heavily-promoted the ‘lone wolf’ profile. Meaning that the person is isolated and that government, using immense amounts of money, technology and persons in a code of silence, work at molding the isolated target into whatever they want.
I’ve never had any intentions of being a terrorist, as these events only reinforce the sadists who ultimately benefit from such events. However, one can see why a cover story of a targeted individual being a terrorist is so essential, because once a target finds out what is happening to them, the most normal, healthy and sane response would be to strike back at a government so criminally sadist as to track and bully people around using their own body and brain patterns.
VIII.h. Stephen O’Keefe’s TI Testimony Part 5 (8:14)
Music: The Ancient Forest from The River)
From: Targeted Individual As Lone Wolf Terrorist (Introduction to the Op Catalyst website now removed from the Internet:
The powers-that-be profit from domestic terror and warfare, and they will frame those who resist the mafia-state as potential terrorists to eliminate them. The public is in the most danger it has ever been in, and if it comes to understand precisely why, wireless biometric monitoring has been established to target any resistance.
This may be why I’m still alive to be the first to break the bad news…those who remain free are free to move only in a cage of illusions. I also regret to inform that personal privacy is dead, and a continued lack of privacy eventually drives people insane.
Nobody knows this better than those who developed VT, biometric tracking and EEG brain pattern-influencing. If anything, consider this recording an urgent public health and safety notice.
Visit my website, opcatalyst.net, and its YouTube channel, Twitter feed and photo, audio and print evidence archive on MediaFire. There are many PDFs linked on the website itself, evidencing my years of abuse and entrapment by the RCMP, CSIS and the Toronto Police Service. You’ll find print materials, even audio recordings, of them fabricating evidence and lying to me both personally and on the public record. One recording has a counterintelligence provocateur lying at an average speed of seven times per minute. The compulsive lying is concurrent with the use of wireless surveillance technology to fabricate any law-enforceable crisis.
As if bringing a Hollywood movie production to the city streets, the secret police can deceive anyone from passers-by to the regular police to the media who document the aftermath. As I have experienced firsthand for years, plain-clothed intelligence agents and paid informants are used as crisis actors and witnesses to sell the surveillance production as legal reality. It works, because as soon as lawyers and judges hear ‘terror’ they know their reputation and career get a major boost for doing whatever the police want done to the suspect. Especially if a target has been diagnosed insane from the required counterintelligence stalking procedures.
Layers of surveillance are already in place before any staged crisis is initiated. Mini-disasters were staged around me to see how I would react: a car crash at the Israeli embassy; a rape in a parked car; a take-down of a cabbie with automatic weapons the day after 9/11; a swarming of police officers as I walked alone at night; a fake rooftop fire and even a faked movie set. The secret police want to see how you will react in a black operation, hoping you will run away to sell the resulting CCTV video as an admission of your own guilt. I never ran, and instead documented whatever setups I could, which will be released in the future through Op Catalyst.
If something can be vocalized by the human brain, it can be sampled by the wireless brain/computer interface. Anything you say, no matter where you are, in bed asleep or awake at work, no matter whether alone or in a group, any spoken secret, any romantic encounter, any closed-door political meeting can be sampled as speech-to-text, requiring the need for massive data centres. The best way to recruit a super soldier, spy or cop—or frame the most effective government resistance as terrorists—is to seek them through all available intelligence on all available persons.
The significant increase in mental illness diagnoses is most certainly related to the seeking of human targets most responsive to remote-influencing. Someone’s propensity to mental illness may be another factor in the targeting process. My mother had a psychotic break after her divorce, but I was never told she had any mental illness until many years later. Was she targeted after leaving my father, who had once worked on an American military base? Again, I lived in a home with a Canadian/U.S./British military radome just up the hill.
A target can be remotely-infused with whatever is required to discredit or frame them, and the interests of the nation of Israel in this remote influencing technology extend to my long-term employer. My targeting really picked-up when they were awarded a file involving the future Attorney General of Israel, and a failed hedge fund whose owner had fled there. The RCMP were corrupting my employer with the wireless entrapment setup at my contract site; a corporate sabotage directed at and through me.
I never had any psychotic break before in my life, but once I dumped my handlers at work, where the RCMP were assigned, electronic harassment kept me sleepless until I went fully psychotic and into a highly suggestive state where I could be remote-influenced about anything – like repeatedly visiting the CBC building until I said something bizarre, which those tailing me could exploit as death threats and photography.
Yes, everything sounds like criminal conspiracy when it is one. What I’ve described sounds incredible, but is no different than wearing an invisible set of headphones which receive silent and wireless instructions from military-grade technology. Fifty years ago, psychiatry blamed such lofty beliefs on having a failed parental relationship, and I’ve had that, too. As Op Catalyst has evidenced, all psychiatry can diagnose you as is mentally ill.
As far as a DSM-IV psychiatric classification, I am fully diagnosed with Bipolar I disorder. Many others in my situation may be, as well. The advancement of gender neutrality, fluidity and multicultural society, as revolutionary as it may seem, is mass militarized remote influencing at work right now, breaking down and aggregating the cultural, political and sexual identity of the world’s minds; yet slowly enough to not be noticed as something artificial.
This is why those persons breaking down personal boundaries and sexual identity have become so aggressive in doing so. Society appears to be freer in a mix of identities, cultures and religions, while populations are enslaved more than they ever have been before in history. While remote influencing is behavioral conditioning, virtual telepathy is no-touch torture and psychiatric abuse, breaking down the identity of the individual into wirelessly-socialized networks of militarized obedience. Its prisoners will be born into open captivity, being both abused and influenced hands-free, not knowing that there is another natural world to be discovered: A world without invisible captors.
Stephen O’Keefe
VIII.i. Stephen O’Keefe’s TI Testimony Part 6 (5:34)
Music: Lake Song from The River
In his youtube “Deceive and Hide-Jewish Mob Stalking Culture, Canadian Targeted Citizen, Stephen O’Keefe, states:
With so many jews involved with methods of deep psychological torment directed at me for so many years, it is impossible that these methods are not culturally jewish, known by all jews above a certain age….
This culturally jewish method of profiling and stalking someone to ruin would have existed before technology made it easy, perhaps explaining why jews have been exiled from so many lands.
The benefits to shadow governments are endless; spy operations, police stings, drug dealing, money laundering drops and black operation terror events where an asset or target are surrounded by nothing but layers of backup in a pre-scripted crowd simulation….
What gave away the core of this mob stalking method as culturally jewish was that Israelis always positioned themselves in the lead to appear as a victim, with their terrain cues consistently ordinary, per Mossad and Shin Bet’s mottos of deception and concealment as a strategy.
The culturally jewish methods of deception and concealment are mafia tactics, as evidence by the similarity in criminal activities between the American jewish mafia and the Israeli mafia; the embedded Nation of Israel and Israel proper:
Jewish-American mafia criminal activities: Narcotics trafficking, racketeering, gambling, loan sharking, bookmaking, contract killing, diamond trafficking, extortion, weapons trafficking, fraud, prostitution & money laundering.
Israeli mafia criminal activities: Drug trafficking, diamond trafficking, racketeering, loan sharking, robbery, extortion, money laundering, highjacking, gambling, prostitution, bookmaking, weapons trafficking and human trafficking.”
“This video profiles the surveillance proficiencies of jews, and their Nation of Israel, as Shin Bet, Mossad and their sayanim (helpers)- who profiled, mob stalked and ruined my personal and professional life- and have declared themselves “deceivers in hiding.”
Original Mossad slogan: “By deception thou shalt do war.”/”Deceit is essential in warfare”
Shin Bet slogan: “Defender that shall not be seen”
Jewish mob stalking works like this: jews pass your photo and details around by mobile phone and conspicuously stalk you wherever you go. Once you start discussing it, or taking their photos, they complain to authorities that you’re insane and obsessed with jews, a Nazi, white supremacist or potential terrorist and that you must be watched very closely, and that jews will help. Helping means setting you up for ruination which benefits the police state which protects Israeli interests. The power of jews over my host nation of Canada is irrefutable.
So CSIS (Canadian Security Intelligence Service), the RCMP (Royal Canadian Mounted Police), the Toronto Police Service and the Nation of Israel embedded within Canada expanded my targeting to develop a GPS terrain surveillance and cueing system. This involves portable biometric gear in backpacks, duffle bags and luggage totes which redundantly biometrically position you amongst plain clothed police, spies and their assets and targets; fed to and through satellite GPS.
It’s designed to move the target into a scripted surveillance sequence where anything can happen to them, like a mock collision to take them out while appearing accidental, with all immediate witnesses in on the black operation.
If the target has been conditioned to EEG remote influencing, as I was, they can be led along a pre-scripted surveillance path like a marionette; directed, misdirected and delayed as needed using GPS-positioned cues and resists. The cueing system covertly developed around me uses any object or mark on the terrain, other people in the biometric field or even GPS-located aircraft in the sky.
Domestic terror black operations send government officials, police, intelligence and the military to Israel for counter-terrorism training. There, they can be covertly EEG-fingerprinted and their unique biometric signatures cultivated by Israeli intelligence.
Beyond detecting the International locations of plain clothed intelligence and police for Israeli-jewish operations using GPS cueing systems, important decision makers can be covertly mob stalked by jews for life- yielding unlimited political blackmail.
As jewish deception and hiding are further finessed to fabricated domestic terror patsies and the events to go with them, more persons seek Israel for the best counter-terrorism training.
Jewish stalkers were so intent on always appearing to be a victim in anything I recorded, they gave themselves away as my core predators despite so many government agencies serving as their camouflage.
X.a. Voices of Hope and Inspiration (3:43)
Music: West Fork from Guitar Reflections Vol. 3
Thomas Jefferson, author of Declaration of Independence and US Constitution, Third President of the US, stated:
“Truth will do well enough if left to shift for herself. She seldom has received much aid from the power of great men to whom she is rarely known & seldom welcome. She has no need of force to procure entrance into the minds of men. Error indeed has often prevailed by the assistance of power or force. Truth is the proper & sufficient antagonist to error.”
“It is error alone which needs the support of government. Truth can stand by itself.”
“The God who gave us life, gave us liberty at the same time; the hand of force may destroy, but cannot disjoin them.”
Patrick Henry, a Founding Father of America, first Governor of Virginia, stated:
“The liberties of a people never were, nor ever will be, secure when the transactions of their rulers may be concealed from them.
…. The eternal difference between right and wrong does not fluctuate, it is immutable.
…. Should I keep back my opinions at such a time, through fear of giving offense, I should consider myself as guilty of treason toward my country, and of an act of disloyalty toward the Majesty of Heaven, which I revere above all earthly kings.
“They tell us, sir, that we are weak; unable to cope with so formidable an adversary. But when shall we be stronger? Will it be the next week, or the next year? Will it be when we are totally disarmed, and when a British guard shall be stationed in every house? Shall we gather strength by irresolution and inaction? Shall we acquire the means of effectual resistance by lying supinely on our backs and hugging the delusive phantom of hope, until our enemies shall have bound us hand and foot? Sir, we are not weak if we make a proper use of those means which the God of nature hath placed in our power.
“For my part, whatever anguish of spirit it may cost, I am willing to know the whole truth; to know the worst and to provide for it.”
…. Is life so dear, or peace so sweet, as to be purchased at the price of chains and slavery? Forbid it, Almighty God! I know not what course others may take; but as for me, give me liberty or give me death!”
William James, stated:
“Dissent is the only thing that rescues democracy from a quiet death behind closed doors.”
Edward R. Murrow, stated:
“A nation of sheep will beget a government of wolves.”
And from John 4:4:
Ye are of God, little children, and have overcome them: because greater is he that is in you, than he that is in the world.
One Reply to “Texts For 42 Informational – Musical Narrations That Explain The Global Gangstalking – Electronic Torture – Nonconsensual Human Mind And Behavior Experimentation Program (G5) Program (By Dr. Eric T. Karlstrom )”
Comments are closed.