Welcome to The Machine

welcome-to-the-machine

Welcome my son , welcome to the machine
Where have you been ?
It’s alright we know where you’ve been
You’ve been in the pipeline , filling in time
Provided with toys and scouting for boys
You brought a guitar to punish your ma
And you didn’t like school, and you
Know you’re nobody’s fool
So welcome to the machine

Welcome my son , welcome to the machine
What did you dream ?
It’s alright we told you what to dream
You dreamed of a big star
He played a mean guitar
He always ate in the Steak Bar
He loved to drive in his Jaguar
So welcome to the machine


Cultocracy note :

  • ‘The Machine’ is with us and has been for some time .
  • It has been developed as a society wide system of eugenics , control & conditioning .
  • It employs EM (electromagnetic) wavelengths directed at individuals , groups of individuals or even whole societies .
  • Phased array RADAR , LIDAR , terrestrial communication and broadcast networks , power grids & satellite technology are used to form a consolidated ‘hitchhiker’ system .
  • Interferometry is applied to extract biological signals .
  • The system can be further enhanced for specific individuals by using D.N.A modification , implants & nano particles .
  • The return signal is in the form of fMRI / E.E.G / ECoG neural & biological signatures .
  • Quantum effects are now being utilized .
  • The return wavelengths are fed through computers employing neural imaging software .
  • The neural and biological patterns of an individual can be interpreted by the computers .
  • A bio-feedback loop is created .
  • The feedback loop is interposed with super computer powered AI (artificial intelligence) .
  • Human operators and handlers can interject at any time .
  • The system is able to source information from multiple electronic ‘intelligence gathering’ operations .
  • The Five Eyes crime syndicate controls the infrastructure .
  • As usual , the keyword is control .
Advertisements
This entry was posted in Psychotronic Warfare, State Surveillance & Control, Targeted Individuals, Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s