Αγορά Πολιτών

Τρόπος Συμμετοχής

Χορηγίες

Πολίτες στην Αγορά

Έχουμε 875 επισκέπτες συνδεδεμένους

Επικοινωνία

Location: Southern Sweden

+41762833777

Citizen Band Radio:

- Channels: 11-19 AM (amplitude modulation)

- Callsign: EB-1142

Accountability-Free Genocides

 

Militarized "psychiatry"

 

The Absolute Evil

 

Gang-stalking Greeks

 

Byzantine Atrocities

 

European Dissidents ALARM

 

Human Rights' Court

 

The used up men

 

Dissidents - USG RICO crimes

 

Open Letter to Theresa May

 

Open Letter to António Guterres UN's SG

 

Triangulation - Zersetzen

 

Open Letter to Andrew Parker, MI5

  

Πράξεις ποταπές - Despicable choices

 

 

My father's death

 

Cavitation damage

 

Burglary and vandalism

 

Dry mini submarine

 

Message to Bundeswehr 2

 

Message to Bundeswehr 1

 

“Tough” guys and TOUGH guys

 

Μοναδική λύση, το Χόλιγουντ

 

Charlatans

 

Zeppelin: Beyond Gravity

 

Foreign intervention in Greece?

 

Η ανελεύθερη Ελλάδα

 

Η Ελλάδα καταγώγιο;

 

Αν.Επ. Π. Παυλόπουλο

  

Intangible prisons

 

Plausible deniability

 

Images of German w & s

 

Crimes against Humanity

 

"Chimera" - "Bellerophon"

 

pr. Donald Trump

 

  

Legal Notice 87

 

Βδέλλες, αποικιοκρατικές

 

Being a German

 

Legal Notice 84

 

Dirty colonial methods

 

Georgi Markov, BG - KGB

 

Samples of Barbarity

 

Ελλάδα - αποκόλληση

 

Έλληνες, στο έλεος...

 

Harvester's log 16/3/17

 

 

Legal Notice 66

 

Execrable

 

Legal Notice 62

 

  

My story

 

  

Aggression?

 

  

Η Εστία μου

 

  

Why so untidy?

 

  

Αποικιοκρατία

 

  

Εξόντωση Ελλήνων αντιφρονούντων;

 

  

Ζήτημα εμπιστοσύνης

 

  

Μεθοδικότητα

 

  

Ανοικτή Επιστολή πρέσβη ΗΠΑ

Αφορμή, U2RIT vs Ελλάδα;

Βιοηθική

A request to U2RIT

Colonial aggression - 2

Open Letter to UN S.G.

Open Letter to p.C. & p. O.

Δήλωση πρόθεσης επαναπατρισμού

 

Ο "εφιάλτης" της Νυρεμβέργης

Συλλογή Φωτογραφιών

Αίτημα προστασίας, προς Ιταλία

Chroma key, background removal

Science and Ethics

Να συμβάλει και η U2RIT

Θα ξαναφτιάξουν πολλές φορές Άουσβιτς και Zyclon B

 

Split-Screen effect

Η Ζωή είναι Ωραία.

Βόρεια Κορέα

Λευτεριά στους Έλληνες, εξανα- γκαστικά "Εξαφανισμένους"

 

Μυστικές δίκες;

Trustworthiness

Πολιτισμό, ή, απληστία;

Ακραία Στυγνότητα

Η Τέχνη της Επιβίωσης

Political Asylum 3

Επιστροφή στις ρίζες

The Human Cost of Torture

An urgent appeal for solidarity

More obvious than the Sun

Western "culture"

Political Asylum

Έννομη Προστασία

Μια μήνυση που εγείρει ερωτηματικά

 

 

 

Honor your father...

Noise

Creative Greeks

A pair of Dictatorships

A “Silent War” Is Being Conducted Against Unknowing Civilians PDF Εκτύπωση E-mail
Αξιολόγηση Χρήστη: / 0
ΧείριστοΆριστο 
Συνεννόηση για Δράση - Απόψεις
Συντάχθηκε απο τον/την Χρήστος Μπούμπουλης (Christos Boumpoulis)   
Κυριακή, 26 Μάιος 2019 19:23

Edward Snowden on the most shocking way the NSA spies on people 2014

www.youtube.com/watch?v=rKGh4LoL5mQ

 

Youtube: A “Silent War” Against Unknowing Civilians

www.youtube.com/watch?v=w5zOmQl8vNU

 

A “Silent War” Is Being Conducted Against Unknowing Civilians

 

Crime of aggression

A crime of aggression is a specific type of crime where a person plans, initiates, or executes an act of aggression using state military force that violates the Charter of the United Nations. The act is judged as a violation based on its character, gravity, and scale.

Acts of aggression include invasion, military occupation, annexation by the use of force, bombardment, and military blockade of ports.

The crime of aggression is a crime under the Rome Statute of the International Criminal Court. The definitions and the conditions for the exercise of jurisdiction over this crime were adopted by consensus at the 2010 Kampala Review Conference by the States Parties to the Court.

Source: https://en.wikipedia.org/wiki/Crime_of_aggression

 

Denmark May 26th, 2019

 

The colonising Nations’ criminal aggression against innocent European citizens is breath-taking.

The claustrum-manipulating, involuntarily implanted, RNM electronic implants are only “the tip of the berg”.

The tortures that my innocent and kind parents have pass through remain unspeakable.

The tortures that I am being subjected to, since my childhood, are undescribable.

Millions of others, due to ignorance, they faultily consider the tortures that they are passing through as supposed “misfortunes” or supposed “mistakes”.

Adequate public information exists that discloses, the identities of this aggression’s instigator sand perpetrators; the technology and methods that are being used; and the colletive identities of the victims.

As far as Greece is conserned, nothing is more important than defending the Greek Nation from the colonising Nations’ unprovoked, unilateral and atrocious criminal aggression.

 

Christos Boumpoulis

economist

 

Appendix

 

Microchip Implants, Mind Control, and Cybernetics

- by Rauni-Leena Luukanen-Kilde, MD Former Chief Medical Officer of Finland December 6, 2000

In 1948 Norbert Weiner published a book, Cybernetics, defined as a neurological communication and control theory already in use in small circles at that time. Yoneji Masuda, "Father of the Information Society," stated his concern in 1980 that our liberty is threatened Orwellian-style by cybernetic technology totally unknown to most people. This technology links the brains of people via implanted microchips to satellites controlled by ground-based supercomputers.

The first brain implants were surgically inserted in 1974 in the state of Ohio, USA and also in Stockholm, Sweden. Brain electrodes were inserted into the skulls of babies in 1946 without the knowledge of their parents. In the 1950s and 60s, electrical implants were inserted into the brains of animals and humans, especially in the U.S., during research into behavior modification, and brain and body functioning. Mind control (MC) methods were used in attempts to change human behavior and attitudes. Influencing brain functions became an important goal of military and intelligence services.

Thirty years ago brain implants showed up in X-rays the size of one centimeter. Subsequent implants shrunk to the size of a grain of rice. They were made of silicon, later still of gallium arsenide. Today they are small enough to be inserted into the neck or back, and also intravenously in different parts of the body during surgical operations, with or without the consent of the subject. It is now almost impossible to detect or remove them.

It is technically possible for every newborn to be injected with a microchip, which could then function to identify the person for the rest of his or her life. Such plans are secretly being discussed in the U.S. without any public airing of the privacy issues involved. In Sweden, Prime Minister Olof Palme gave permission in 1973 to implant prisoners, and Data Inspection's ex-Director General Jan Freese revealed that nursing-home patients were implanted in the mid-1980s. The technology is revealed in the 1972:47 Swedish state report, Statens Officiella Utradninger (SOU).

Implanted human beings can be followed anywhere. Their brain functions can be remotely monitored by supercomputers and even altered through the changing of frequencies. Guinea pigs in secret experiments have included prisoners, soldiers, mental patients, handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children, and any group of people considered "marginal" by the elite experimenters. The published experiences of prisoners in Utah State Prison, for example, are shocking to the conscience.

Today's microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. Such a technique was among a number tested in the Iraq war, according to Dr. Carl Sanders, who invented the intelligence-manned interface (IMI) biotic, which is injected into people. (Earlier during the Vietnam War, soldiers were injected with the Rambo chip, designed to increase adrenaline flow into the bloodstream.) The 20-billion-bit/second supercomputers at the U.S. National Security Agency (NSA) could now "see and hear" what soldiers experience in the battlefield with a remote monitoring system (RMS).

When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillimeters) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights, and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be reexperienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target's performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads.

Every thought, reaction, hearing, and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures, and voices. Electromagnetic stimulation can therefore change a person's brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.

The NSA's electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just as we have unique fingerprints. With electromagnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24 hours a day.

The Washington Post reported in May 1995 that Prince William of Great Britain was implanted at the age of 12. Thus, if he were ever kidnapped, a radio wave with a specific frequency could be targeted to his microchip. The chip’s signal would be routed through a satellite to the computer screen of police headquarters, where the Prince’s movements could be followed. He could actually be located anywhere on the globe.

The mass media has not reported that an implanted person's privacy vanishes for the rest of his or her life. She can be manipulated in many ways. Using different frequencies, the secret controller of this equipment can even change a person's emotional life. She can be made aggressive or lethargic. Sexuality can be artificially influenced. Thought signals and subconscious thinking can be read, dreams affected and even induced, all without the knowledge or consent of the implanted person.

A perfect cyber-soldier can thus be created. This secret technology has been used by military forces in certain NATO countries since the 1980s without civilian and academic populations having heard anything about it. Thus, little information about such invasive mind-control systems is available in professional and academic journals.

The NSA's Signals Intelligence group can remotely monitor information from human brains by decoding the evoked potentials (3.50 HZ, 5 milliwatt) emitted by the brain. Prisoner experimentees in both Gothenburg, Sweden and Vienna, Austria have been found to have evident brain lesions. Diminished blood circulation and lack of oxygen in the right temporal frontal lobes result where brain implants are usually operative. A Finnish experimentee experienced brain atrophy and intermittent attacks of unconsciousness due to lack of oxygen.

Mind control techniques can be used for political purposes. The goal of mind controllers today is to induce the targeted persons or groups to act against his or her own convictions and best interests. Zombified individuals can even be programmed to murder and remember nothing of their crime afterward. Alarming examples of this phenomenon can be found in the U.S.

This “silent war” is being conducted against unknowing civilians and soldiers by military and intelligence agencies. Since 1980, electronic stimulation of the brain (ESB) has been secretly used to control people targeted without their knowledge or consent. All international human rights agreements forbid non consensual manipulation of human beings — even in prisons, not to speak of civilian populations.

Under an initiative of U.S. Senator John Glenn, discussions commenced in January 1997 about the dangers of radiating civilian populations. Targeting people’s brain functions with electromagnetic fields and beams (from helicopters and airplanes, satellites, from parked vans, neighboring houses, telephone poles, electrical appliances, mobile phones, TV, radio, etc.) is part of the radiation problem that should be addressed in democratically elected government bodies.

In addition to electronic MC, chemical methods have also been developed. Mind-altering drugs and different smelling gasses affecting brain function negatively can be injected into air ducts or water pipes. Bacteria and viruses have also been tested this way in several countries.

Today's super technology, connecting our brain functions via microchips (or even without them, according to the latest technology) to computers via satellites in the U.S. or Israel, poses the gravest threat to humanity. The latest supercomputers are powerful enough to monitor the whole world’s population. What will happen when people are tempted by false premises to allow microchips into their bodies? One lure will be a microchip identity card. Compulsory legislation has even been secretly proposed in the U.S. to criminalize removal of an ID implant.

Are we ready for the robotization of mankind and the total elimination of privacy, including freedom of thought? How many of us would want to cede our entire life, including our most secret thoughts, to Big Brother? Yet the technology exists to create a totalitarian New World Order. Covert neurological communication systems are in place to counteract independent thinking and to control social and political activity on behalf of self-serving private and military interests.

When our brain functions are already connected to supercomputers by means of radio implants and microchips, it will be too late for protest. This threat can be defeated only by educating the public, using available literature on biotelemetry and information exchanged at international congresses.

One reason this technology has remained a state secret is the widespread prestige of the psychiatric Diagnostic Statistical Manual IV produced by the U.S. American Psychiatric Association (APA) and printed in 18 languages. Psychiatrists working for U.S. intelligence agencies no doubt participated in writing and revising this manual. This psychiatric "bible" covers up the secret development of MC technologies by labeling some of their effects as symptoms of paranoid schizophrenia.

Victims of mind control experimentation are thus routinely diagnosed, knee-jerk fashion, as mentally ill by doctors who learned the DSM “symptom” list in medical school. Physicians have not been schooled that patients may be telling the truth when they report being targeted against their will or being used as guinea pigs for electronic, chemical and bacteriological forms of psychological warfare.

Time is running out for changing the direction of military medicine, and ensuring the future of human freedom.

This article was originally published in the 36th-year edition of the Finnish-language journal SPEKULA (3rd Quarter, 1999). SPEKULA (circulation 6500) is a publication of Northern Finland medical students and doctors of Oulu University OLK (Oulun Laaketieteellinen Kilta). It is mailed to all medical students of Finland and all Northern Finland medical doctors.

Source: https://www.conspiracyarchive.com/NWO/microchip_implants_mind_control.htm

 

The Selection and Preparation of The Victim

 

This excerpt was taken from the hardtruth wake up America website which was taken down. Although this article features the Monarch Project, the findings could relate to other projects and programs as well and give you insight as to why you may be targeted or why others are.

 

A. Selection Based on Genetics and Dissociative Abilities

B. Availability

C. Mental and Physical Features

One of the primary reasons that the Monarch mind-control programming was named Monarch programming was because of the Monarch butterfly. The Monarch butterfly learns where it was born (its roots) and it passes this knowledge via genetics on to its offspring (from generation to generation). This was one of the key animals that tipped scientists off, that knowledge can be passed genetically.

The Monarch program is based upon Illuminati and Nazi goals to create a Master race in part through genetics. If knowledge can be passed genetically (which it is), then it is important that parents be found that can pass the correct knowledge onto those victims selected for the Monarch mind-control.

The primary important factor for the trauma-based mind-control is the ability to disassociate. It was discovered that this ability is passed genetically from generation to generation. American Indian tribes (who had traumatic ritual dances and who would wait motionless for hours when hunting), children of Fakirs in India (who would sleep on a bed of nails or walk on hot coals), children of Yogis (those skilled in Yoga, who would have total control over their body in trance), Tibetan Buddhists, children of Vodoun, Bizango and other groups have a good ability to disassociate.

The children of multigenerational abuse are also good at dissociation. The Illuminati families and European occultists went to India, and Tibet to study occultism and eastern philosophy. These Europeans learned yoga, tantric yoga, meditations, and trances and other methods to disassociate. These skills are passed on to their children via genetics. A test is run when the children are about 18 months old to determine if they can dissociate enough to be selected for programming or not.

Mind-controlled slaves are created for different purposes, hierarchy or non-hierarchy purposes. The Illuminati create mind-controlled slaves who are to function within the Illuminati hierarchy. These slaves will usually have their genealogies hidden, and will be created to have excellent cover lives to insure that they are not detected. They will be given multifunctional programming, and will usually be used to help program other slaves. The abuse will not be as physically visible as it will be on the bodies of slaves who are not born to be part of the Illuminati elite.

Members of Moriah’s (Moriah = the Illuminati) LUCIFERIAN elite will have undergone as much trauma as other slaves, however the torture scars and the control are better concealed. These children will often receive lavish experiences as well as talks to convince them that they are part of the elite. (By the way, body scars will show up better under black light, that is the same black light as used in clubs).

The Illuminati and other organizations have also programmed individuals who are simply expendable. These are sex slaves who are used up and killed very early in life, one-time use saboteurs, breeders, soldiers, drug couriers and so forth. The bodies of these people will often show visible torture scars. The expendable are the children of parents who were blackmailed into turning their children over to the CIA. This is all hidden by the power of the National Security Act. These are children, who have been sold by pedophile fathers, or pornographic parents. The programmers/masters program them with the expectation that they will be "thrown from the freedom train" when they get to age 30. (Freedom Train is the code word for the Monarch trauma-based mind-control. To be thrown from the Freedom Train means to be killed).

The CIA and the Illuminati are skilled at blackmailing parents to give up their children. They would watch the mail for porn. Pedophile and murderers who abuse their children are warned that they will go to prison for long lengths of time if they do not cooperate by selling their children into mind-controlled slavery. In return for the parent’s cooperation, they provide rich financial rewards to the parent(s). It’s clearly a case of "if you don’t cooperate you lose in life big time, if you do cooperate you win big time."

Ministers are often set up with Betas (a sexual model) who then blackmail them. The ministers do not want to lose their status and profession via scandals, so they agree to turn their children over when young to the CIA to work with. The Illuminati like to blackmail these ministers when they are finished with their Seminary schooling and committed to the ministry at about 33 years of age. The idea of having nothing to fall back on after they have committed their entire life to one profession is too much for these weak willed men, and they buckle under the threats. If they don’t buckle under, the resulting consequences will remove them from ministry.

The type of father who is most preferred by the Programmers to offer up their children for programming is the pedophile. If a father will abuse his own little baby girl, then the Programmers know that the man has no conscience. This father’s involvement in criminal activity (and thereby his vulnerability) can be continually increased. They want men who they believe will not develop any qualms later on in life about what they have done. A man, who waits until his daughter is a teenager to molest her, is usually esteemed to have too much conscience for the programmers.

A big distinction must be made between hierarchy Monarch slaves, and non-hierarchy Monarch slaves. The reason there is such a big distinction is that they are not programmed the same way. Since this book is giving the recipe for how to create a Monarch slave, we will have to cover the distinction between slaves within the Illuminati and those slaves who function outside of the Illuminati hierarchy. It is important to stress that the label "Monarch" is used in this book in a generic sense for the modern trauma-based total mind-control that is taking place. Whether an Illuminati mind-controlled slave is technically in the Monarch records or out of the actual Monarch Program data files kept on computer is merely a technicality.

In my (Fritz’s) other writings, I explain about how the Illuminati created the CIA. I know that some of its directors were members of the Illuminati and I strongly suspect that the other CIA directors were probably full-fledged members too. The two organizations need each other. If the CIA didn’t have the international backing of the movers and shakers of the world, it would have been exposed and done away with. Likewise, the Illuminati, because it is so secret, needs organizations through which it can work. The CIA is a front for the Illuminati, and the CIA in turn sets up fronts.

 

Some of those fronts, are elaborate well-staffed, well-equipped programming sites, (such as many of the state mental hospitals, McGill Psychiatric Training Network consisting of 8 Montreal hospitals esp. St. Mary’s, NASA in Huntsville, AL; the Presideo, CA; and NOTS at China Lake, CA, to name a few. For a more complete list see Appendix B.) The Illuminati couldn’t do it alone without its fronts.

Satanists within the Network & the CIA took over Boy’s Town, NE in the early 1950s, & used that famous orphanage for a constant supply of boys for programming. Boy’s Town is perhaps the most famous, but there are whole long list of others.

When the Monarch Programming started, the top men were Illuminati. Originally, Joseph Mengele was the lead programmer. He had already achieved the rank of Grand Master (later Ipssimus) within the Illuminati. He had become skilled in music, in Kabbalistic Magic, in dancing, in abortions, and in torture (by the way, Mengele had a sadistic mother) and programming children. Many of the concentration camp children that Mengele programmed still survive and still love him to this day as "Daddy".

Mengele disappeared from Auschwitz in Jan. 1945, several months before the final chaos began in the Third Reich. He disappeared so the Illuminati could smuggle him to the U.S., so that his exceptional knowledge of programming--honed and fined tuned on thousands of concentration camp child victims could be put to use on a grand scale in the U.S. He traveled worldwide but especially in western U.S. doing his programming accompanied by his pair of two black servants.

American Monarch survivors remember his spotless German uniform, his shiny boots which he wore during programming, his thick German accent, his handsome features, his cleft chin, the space in his front teeth, the way he would jab with his thumb while programming, as if he were still saying "links, rechts" to lines of Jews coming into the concentration camps.

The reason Mengele was so excited to do the selection process of inmates coming into Auschwitz was that he was choosing inmates for his numerous mind-control trauma experiments. He was especially anxious to get identical twins, because his genetic research related to mind control needed persons of identical genetic makeup.

Traditionally, the Illuminati had been having their children inspected by a woman with the rank of Grande Mother. She would determine the fitness of the children and then present them for a formal acceptance ceremony at age 3 to the Grande Druid Council. This procedure didn't change when Mengele came over--the programming just jumped from being an occult science to one that had full access to the Medical, Psychiatric, Judicial, Scientific and Governmental sectors via the power of the National Security Act and the Intelligence agencies.

The Illuminati's programming of multiples prior to Mengele's arrival were simplistic, compared to the sophisticated techniques engineered by the Nazi Germans (whose Mind Control research included some non-German nationals such as some Italians).

Just as a victim who is killed by an 18th century musket is just as much victimized as someone killed by an M-16, so a victim of the pre-1946 programming was just as victimized as those programmed with more sophisticated techniques. For the Illuminati, the child's programming is planned by the Circle (another name for their organization) before it is born.

From the Illuminati's perspective their plans involve generational spirits and positions within the hierarchy. The child is conceived according to their rituals, and the steps that that child will go through follows a well-thought out detailed regimen for programming it. In contrast, the children from foster homes, or pedophiles do not receive the same regimen.

Hierarchy slaves will in turn be used to program and train other hierarchy children, while CIA slaves and Mafia slaves and KKK slaves etc. will be discarded. This is why a Presidential Model is "thrown from the Freedom Train [the name of the Monarch Program in the Underworld]".

Women and men in the Illuminati will continue to help with the programming their entire lives.

The Illuminati is programming such vast numbers of children, they need everyone of their able members to help. Moriah's total membership worldwide numbers in the millions. The Illuminati regimen for their children is far more controlling than the CIA's programming. Not everyone in the Illuminati gets their mind-split and becomes a programmed multiple. However, everyone does get some type of mind-control.

Those who have been spared multiplicity still must participate in a two-week intense mind-control session that might be compared to the Army's Ranger school. Those who participate in this have learned obedience. Those who haven't learned obedience, are forced into ritual gladiator type duels or other punishments to eliminate them.

Finally, a traitor’s death as pictured on one of the Tarot cards is waiting. Sharon Tate was left hanging in the No. 12 Tarot Card’s "hangman position" from the house rafters.

The best therapists will quietly admit that traditional therapy is inadequate. Unless God intervenes, people who are born into the Illuminati don’t escape it while alive. This book isn’t a mere exercise of academic thinking, but is written with the assurance that freedom is possible, there are viable answers.

Some children live in foster homes, or with adopted parents, or in orphanages, or with caretakers and guardians. Because these children are at the mercy of the non-related adults, these types of children frequently are sold to become mind-controlled slaves of the intelligence agencies.

In review, remember that because many of these organizations are controlled by the Illuminati; an Illuminati slave may often work for one of these front groups, while the Illuminati maintain control over the base-program. The intelligence networks were started by and run by the Illuminati. They are Illuminati fronts.

The use of slaves crosses many organizational boundaries within the overall Network. If a slave is to be used as a Delta model (assassination), they may be selected for strength and dexterity. The Delta Force is the army’s elite unit made up of Monarch slaves.

If they are to operate as a Beta model (sexual slave), they will be chosen if they can master technique. Occasionally they might in some circumstances be selected for how pretty the programmers expect the child to become. Some parents have produced good looking children and are actually sought-after to bear children to sell into the Mind Controlled Slavery "Freedom Train" System.

However, vastly more important for Beta Sex Slaves are their ability to be programmed to have charm, seductive skills, charisma, and creativity. Beauty is in the eye of the beholder, and the programmers can put almost any kind of body to use as a sex slave.

Almost any sex slave can fit somewhere into the script of the Illuminati/New World Order/crime syndicate "porn" movies. (I place porn in quotation marks--because what they call porn doesn’t resemble what the public thinks of porn—we’re not talking Playboy type porn, we’re talking ghastly horrible atrocities that are as sick as anything done in the Nazi concentration camps). For instance, it takes little acting ability or beauty to have one’s head chopped off while having sex.

There are different types of sexual slaves, but the Illuminati wants to get Beta alters which are sharp, talented, skilled, and resourceful. They will use these Beta alters, such as the Black Widow alters, for espionage and blackmail.

To make sure that the child’s mind develops properly, the baby will be interacted with so that those areas of the brain that are important to develop will develop to the maximum. It is a well-known fact, that areas of the brain grow according to how much stimulation and use that area of the brain receives. For this reason, Grande Dames, who are involved in programming, will spend time drawing and showing faces to the child and seeing if the child can recognize identical faces. Almost any other item will be used, candy canes with stripes (match the candy canes with the same no. of stripes), trees, or pencils. The child must learn to match identical items very early--even before they can speak. This is so they will be able to build mirror images into their mind.

Source: http://www.orgoneblasters.com/mindcontrol-choosingthevictim.htm

 

Mind Control: Method and History

IT ACTUALLY HAPPENED...and it still is

Mind control starts with dissociation, followed by repetition. Mind control training is a weapon, and it can be used for positive or negative ends, much like any weapon. The Ellipsis Manual teaches the methods in great detail in hopes they are used to lift others up.

The following is an excerpt:

Dissociation simply means the detachment or separation from something. It's the opposite of association. In psychology, it can actually mean a range of things.

All of us dissociate. We get completely tuned in to a conversation we like, become unaware of our surroundings during interesting movies and are able to even drive a car without actually being 'aware' of what is going on around us.

When we disconnect from the moment, be it from boredom or severe trauma, our mind splits. One part of the mind remains there as a 'data collector' and the other is 'shut down'. Dissociation is a survival mechanism that allows the compartmentalization of traumatic information. When children are abused for example, the fight or flight response is not a viable option at their age. The only viable option for a child's subconscious is to use the 'flight' instinct and retreat into the recesses of the mind. In cases of post-traumatic stress disorder (PTSD), the memories and content of the experience can continually stay in the background of the mind and play in 'loop fashion' in the unconscious. Experiences can range from a feeling of disconnectedness from the self to completely independent 'personalities' forming within a person. The SEVERITY of the dissociation is what makes the difference.

How the brain adapts to environments

In the case of post-traumatic stress disorder, the mind of a victim becomes disconnected from reality for a time as a result of battlefield or trauma exposure and emotional disconnection. The brain continuously adapts in order to protect the psyche (self) from emotional harm. This is one of the main reasons that people have 'blackout's during car accidents, torture, rape and childhood abuse. Our minds continuously search for a 'way out' that can repress or eliminate the experience from having happened to US.

The CIA and mind control

There are more conspiracy theories about the CIA and mind control than almost anything else. The CIA released thousands of documents under the Freedom of Information Act and it has caused many people to perform extensive investigative research and spawned countless conspiracy theories. The CIA did, in fact, have fully functional programs to developing techniques and methods for mind control. While the programs have different names, the name 'MK ULTRA' is the most commonly referred to. This project, and its subprojects involved torture, drugs, hypnosis, brainwashing and many other related practices.

While the techniques you will learn in this chapter will absolutely allow you to create an alter-personality in a subject, they are all very elementary. There are absolute ways of creating the ‘Manchurian Candidate’-style of mental programming. You will be able to physically create another identity in a subject’s mind after your training in this chapter. This is only the beginning of what makes this course a legitimate WEAPON.

Dissociation is the most common technique the CIA doctors used to perform mind control experiments. The experiments for mind control have involved several doctors, but we will discuss two in this training.

The Clinical Uses of Dissociation

In clinical psychotherapy or hypnosis, dissociation takes place in order to benefit the client. However, the type of dissociation performed in a clinical setting is much different than what you will use. In therapy, the patient is told about the conscious and the unconscious mind, and the hypnotist will offer suggestions and commands for them to let their conscious mind drift away and allow the unconscious mind to become completely open. This helps the patient to identify and understand that their brain essentially has two parts. In overt and clinical hypnosis, dissociation is almost always used; separating the 'parts' of the mind in order to establish more direct communication with the unconscious mind. A therapist or hypnotist will generally be overt and unambiguous when speaking about the dissociative process because it is in the best interest of the patient. While the patient becomes aware of the two parts of their mind and consciously makes the choice to separate one from the other, dissociation begins to occur.

In hypnosis, techniques are continuously employed to increase or maintain the amount of psychological dissociation a client is experiencing. By increasing the amount of general relaxation and keeping the client in a daydream state, the dissociation can remain relatively intact. Phrases such as, 'go deeper', 'drifting off', 'letting go' and 'all the way down' are examples of what some hypnotists refer to as 'deepeners'. Although they serve to theoretically increase the depth of trance, deepeners and phrases like these also help to dissociate the mind. As the mind becomes relaxed, the subject is more dissociative and, in turn, more able to absorb suggestions and commands from the hypnotist.

Confusion, whether used covertly or overtly is a small step to cause the mind to temporarily become dissociative while a subject makes the effort to make sense of the confusion-statement. The deliberate introduction of a confusing phrase is the most common method. Confusion is a technique used by a majority of practitioners today and it produced the desired results quickly. Although it produces only a small window with which a practitioner can 'install' further commands, confusion is highly effective as a therapeutic tool.

Monarch Programming

Although not officially declassified, a program a large sum of data and documents have surfaced under the Freedom of Information Act documents released by the CIA in regards to project MK ULTRA. A subproject of MK ULTRA was Project MONARCH. In the intelligence community it is a household phrase. Project MONARCH had a few subprojects, but the most relevant goals of the project are referred to in the unclassified/civilian world as BETA (kitten) programming and DELTA programming.

In BETA programming, severe dissociation is accomplished via torture, electroshock, trauma and sensory deprivation. Within the MK ULTRA projects, several doctors could dissociate subjects to the extent they developed completely separate personalities (Dissociative Identity Disorder) and program these personalities to perform tasks ranging from delivering classified information and carrying out assassinations to field intelligence operations and sex-slave behavior. These alter personalities could be 'activated' on command of a doctor or 'handler' of the subject and would remain in the state until deactivated. Many of the sex-slaves created under the MONARCH program have come forwards after having retrieved the information under hypnosis. The methods used to program these subjects always involved the advanced use of hypnosis and linguistics to modify behavior and implant false memories of trauma. Once a subject was programmed, they could be passed to a handler who would have training in linguistics and could activate them on command. As much as this may sound like fiction, it is a very real and well-documented program.

DELTA Programming

While the name of the programming may not be the officially released name, this is the common name used by the intelligence community. DELTA programming was a program supervised by Dr. Ewen Cameron and heavily contributed to by Dr. George Estabrooks. This program was developed to create and program assassins and couriers. A subject would be programmed to "kill on command" and either commit suicide or wipe the memory from their mind. Subjects would be programmed to have an amnesic episode immediately upon performing the task they were given to do. Even after being given advanced polygraph (lie detector) testing, the subjects were unable to recall that they had performed any action while in their altered state.

The following excerpts from released CIA documents show a very small sample of what has been released to date. They involve programming to kill and the automation of amnesic behavior immediately following the programmed event.

 

 

CIA document and page number: 190691, p. 1, 2

Title: Hypnotic Experimentation and Research

Date: 10 February 1954

A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses [deleted] and [deleted] immediately progressed to a deep hypnotic state with no further suggestion. Miss [deleted] was then instructed (having previously expressed a fear of firearms in any fashion) that she would use every method at her disposal to awaken miss [deleted] (now in a deep hypnotic sleep), and failing this, she would pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her rage would be so great that she would not hesitate to "kill" [deleted] for failing to awaken.

Miss [deleted] carried out these suggestions to the letter including firing the (unloaded pneumatic pistol) gun at [deleted] and then proceeding to fall into a deep sleep. After proper suggestions were made, both were awakened and expressed complete amnesia for the entire sequence. Miss [deleted] was again handed the gun, which she refused (in an awakened state) to pick up or accept form the operator. She expressed absolute denial that the foregoing sequence had happened.

Miss [deleted] felt reluctant about participating further since she expressed her doubt as to any useful purpose in further attendance. The Operator thereupon proceeded in full view of all other subjects to explain to Miss [deleted] that he planned to induce a deep state of hypnosis now. The reaction was as had been expected. Miss [deleted] excused herself to make a telephone call (defense mechanism?). Upon her return a very positive approach was adopted by the operator whereupon a deeper, much deeper state of hypnosis was obtained.

Immediately a posthypnotic was induced that when the operator accidentally dropped a steel ball in his hand to the floor ... Miss [deleted] would again go into hypnosis. Miss [deleted] then advised that she must conclude her work for the evening. She arose to adjust her hair before the mirror. The ball was dropped and she promptly slumped back into the chair and back into hypnosis. It is the opinion of the operator the Miss [deleted] if properly trained (positive approach) will continue to improve.

CIA document and page number: 190527, pp. 1, 2

Title: SI and H Experimentation

Date: 25 September 1951

(Note: SI stands for sleep induction and H for hypnosis)

"Prior to actually beginning the more complex experiments, several simple post H were worked with both of the girls participating. The first major experiment of the evening was set up as follows without previous explanation to either [deleted] or [deleted]. Both subjects were placed in a very deep trance state and while in this state, the following instructions were given:

(A) [Deleted] was instructed that when she awakened, she was to procede to [deleted] room. She was told that while there, she would receive a telephone call from an individual whom she would know only as "Joe". This individual would engage her in a normal telephone conversation. During this conversation, this individual would give her a code word and upon mentioning the code word, [deleted] would go into a deep SI [sleep induction] trance state, but would be "normal" in appearance with her eyes open.

[Deleted] was then told that upon the conclusion of the telephone conversation, she would proceed to the ladies room where she would meet a girl who was unknown to her. She was told that she would strike up a conversation with this girl and during the conversation she would mention the code word "New York" to this other girl, who, in turn, would give her a device and further instructions which were to be carried out by [deleted]. She was told that after she carried out the instructions, she was to return to the Operations Room, sit in the sofa and go immediately into a deep sleep.

(B) [Deleted] was instructed that upon awakening, she would proceed to [deleted] room where she would wait at the desk for a telephone call. Upon receiving the call, a person known as "Jim" would engage her in normal conversation. During the course of the conversation, this individual would mention a code word to [deleted]. When she heard this code word, she would pass into a SI trance state, but would not close her eyes and remain perfectly normal and continue the telephone conversation. She was told that upon conclusion of the telephone conversation, she would then carry out the following instructions:

[Deleted] being in a complete SI state at this time, was then told to open her eyes and was shown an electric timing device. She was informed that this timing device was an incendiary bomb and was then instructed how to attach and set the device. After [deleted] had indicated that she had learned how to set and attach the device, she was told to return to a sleep state and further instructed that upon concluding the aforementioned conversation, she would take the timing device which was in a briefcase and proceed to the ladies room.

In the ladies room, she would be met by a girl whom she had never seen who would identify herself by the code word "New York." [Deleted] was then to show this individual how to attach and set the timing device and further instructions would be given the individual by [deleted] that the timing device was to be carried in the briefcase to [deleted] room, placed in the nearest empty electric-light plug and concealed in the bottom, left-hand drawer of [deleted] desk, with the device set for 82 seconds and turned on.

[Deleted] was further instructed to tell this other girl that as soon as the device had been set and turned on, she was to take the briefcase, leave [deleted] room, go to the operations room and go to the sofa and enter a deep sleep state. [Deleted] was further instructed that after completion of instructing the other girl and the transferring to the other girl of the incendiary bomb, she was to return at once to the operations room, sit on the sofa, and go into a deep sleep state.

For a matter of record, immediately after the operation was begun it was noted that a member of the charforce was cleaning the floor in the ladies room and subsequently, both [deleted] and [deleted] had to be placed ... once again in a trance state and instructions changed from the ladies room to Room 3. It should be noted that even with the change of locale in the transfer point, the experiment was carried off perfectly without any difficulty or hesitation on the part of either of the girls. Each girl acted out their part perfectly, the device was planted and set as directed and both girls returned to the operations room, sat on the sofa and entered a deep sleep state. Throughout, their movements were easy and natural."

http://www.scribd.com/doc/45949553/CIA-Hypnotism-1955

Hypnotism and Covert Operations

CIA Document (Memorandum) 228.11

5 May 1995 (Author Blacked-Out)

"Frankly, I now distrust much of what is written by academic experts on hypnotism. Partly this is because many of them appear to have generalized from a very few cases; partly because much of their cautious pessimism is contradicted by agency experimenters; but more particularly because I personally have witnessed behavior responses which respected experts have said are impossible to obtain. In no other field have I been so conscious of the mental claustrophobia of book and lecture hall knowledge. I don't think we have enough evidence to say positively that hypnosis is a practicable covert weapon, but I do say that we'll never know whether it is or not unless we experiment in the flied where we can learn what is practicable (materially and psychologically) in a way that no laboratory worker could possibly prove."

As you can see in the documents, the use of amnesia, dissociation and hypnosis was absolutely critical. Their specific methods have not been released to the public, but will be discussed in detail in this chapter and others in this book.

We will discuss the conversational and the institutional means to fractionate and dissociate the mind of a subject and you will be able to see the specific techniques within each step of the programming process. The process features steps that were only BEGINNING to be discovered when the CIA began this research. You will learn far more advanced methods in this chapter.

Source: https://www.chasehughes.com/mind-control.html

Τελευταία Ενημέρωση στις Κυριακή, 26 Μάιος 2019 19:38