Cultocracy note :
This paper (or book?) was first published in 1999 , I am not sure who the author is but I assume they are from the U.S.
The author gives a brief overview of the technologies that were available then , we have come a long way since .
The author often mentions the ‘illuminati’ , the group does not really exist , they are a convenient invisible ghost , a ghost where other more visible groups can lay the blame .
In modern terms the ‘illuminati’ can be thought of as an amalgamation of the military , intelligence agencies & the global corporate structure . This large group spans the globe & it’s prime function is the accumulation of technology , the suppression of the technology where applicable & the use of the technology for full spectrum dominance of the population . In simplistic terms it can be seen as an insane urge to gather information & use this information to gather more information , knowledge is power .
The existing disparate groups of ‘secret societies’ are seen as ‘useful idiots’ , although a large portion of cult ideology has been assimilated by the military & intelligence agencies , specifically the indoctrination & mind control aspects of the cult networks . Proof of this is the insidious existence of secret societies embedded inside the intelligence agencies , such as the Skull & Bones within the C.I.A & the Royal Arch within UK intelligence . These & similar groups are now seen as dinosaurs by the ‘new kids on the block’ , who are armed with sophisticated electronic & computing technologies .
The control techniques employed by the various cults were often crude & unreliable , these techniques have now merged with new technology , most of which is researched & funded by the military & other associated subsidiary corporations . Any emerging technology that is under private development is monitored by the intelligence agencies & co-opted if thought to be of use .
The military corporate complex now spans the globe & it’s prime function is the accumulation of technology , the suppression of the technology where applicable & the use of the technology for full spectrum dominance of the population , that is the global population .
If you live in the Western world this deep state or shadow state now permeates every aspect of your life including the media , finance & the military , it is visible in terms of increasing state surveillance & control and an impotent political system . If you live elsewhere you will feel the brunt of this group in more tangible terms ; invasions , occupations , manufactured conflicts , colour revolutions , puppet administrations , terrorism , false flag attacks & economic sanctions .
The first part of the paper is below .
Re: OPEN LETTER TO YOU FROM TRANSPORT PILOT
Date: Thu, 21 Sep 2000, 15:25:44 PDT
1) Where are the Chemtrail aircraft based?
Edwards, AFB; Point M. Naval Station (UH1H, helicopters); Nellis, AFB; Tucker, AFB; PLATTSBURGH, AFB; Andrews, AFB; Hickam, AFB; Kirtland, AFB; Langley, AFB (these flights originiating out of Langely are for experimental “soups.” And for laying in on the tri-state area around DC); Peterson, AFB; Osan, AFB.
2) Who is funding Operation Cloverleaf/Raindance?
The NSA. Command center for ops located in Pacific Northwest at:
| | | POSITION: ITRF94 (EPOCH 1996.0) | | Computed in June, 1997 using 13 days of data. | | X = -2316901.100 m latitude = 45 46 57.48208 N | | Y = -3806506.850 m longitude = 121 19 39.21908 W | | Z = 4548956.553 m ellipsoid height = 732.427 m | | | | VELOCITY: ITRF94 | | Predicted with HTDP_2.1 in May, 1997. | | VX = -0.0165 m/yr northward = -0.0146 m/yr | | VY = -0.0022 m/yr eastward = -0.0130 m/yr | | VZ = -0.0102 m/yr upward = 0.0000 m/yr | POSITION: NAD 83 (EPOCH 1996.0) | | Computed from ITRF94 value using a 7-parameter transformation. | | X = -2316900.557 m latitude = 45 46 57.46118 N | | Y = -3806508.061 m longitude = 121 19 39.16851 W | | Z = 4548956.400 m ellipsoid height = 732.841 m | | | | VELOCITY: NAD 83 | | Predicted with HTDP_2.1 in May, 1997. | | VX = 0.0000 m/yr northward = 0.0000 m/yr | | VY = 0.0000 m/yr eastward = 0.0000 m/yr | | VZ = 0.0000 m/yr upward = 0.0000 m/yr |
3) Are there/is there a squadron name/number associated with the JET chemtrail aircraft? If so, where are ALL bases located?
These are NSA birds for the most part (red/orange engine cowlings, red trailing edges, etc, and NO insignia. But most National Guard Tankers (one to two from each wing from all over the US) have been reassigned to Edwards for tasking and for the installation of a 5-piece, self-adjusting nozzle. There is no unit, per se. Call signs change with each mission. Example (one used last month in Calif. Was “Baby’s Breath.”) This last call sign should let any spooks catching this that the information is now out there and wacking me out won’t stop it.
4) Need the location/maps of ALL GWEN (ground wave emergency network) towers. See attached. [Ed: attachments weren’t available to post]
5) See below for sources you can verify the above and below data. Don’t take my word for a thing. I’ll put together one big bundle of data and mail it off to SURFING. I’ve already been warned twice, but in point of fact, they don’t really care who knows now, considering the ops are nearly complete.
The Ground-Wave Emergency Network (GWEN) System
The Ground-Wave Emergency Network (GWEN) is a communications system that the military is in the process of constructing as we speak. It operates in the very-low-frequency (VLF) range, with transmissions between 150 and 175 kHz. This range was selected because its signals travel by means of waves that have a tendency to hug the ground rather than by radiating into the atmosphere. This signal drops off sharply with distance – a single GWEN stations transmits in a 360 circle to a distance of 250 to 300 miles. The entire GWEN system consists of approximately 300 such stations spread across the United States, each with a tower 300-500 feet high. The stations are from 200 to 250 miles apart, so that a signal can go from coast to coast from one station to another. When the system is completed around 1993, the entire civilian population of the United States will be exposed to the GWEN Transmissions. Read Appendix 4 and then re-read this section.
APPLICATION OF MILITARY FREQUENCY WEAPONRY
According to a 1982 Air Force review of biotechnology, ELF has a number of potential military uses, including “dealing with terrorist groups, crowd control, controlling breaches of security at military installations, and antipersonnel techniques in tactical warfare.” The same report states:
“Electromagnetic systems would be used to produce mild to severe physiological disruption or perceptual distortion or disorientation. They are silent, and counter- measures to them may be difficult to develop.”
Between 1980 and 1984 I was in England, and I got to see some illustrations of how some of this technology actually works. During this period, there were a lot of protests, sit-ins and demonstrations by Greenpeace and many other groups against the deployment of Cruise missiles, especially at Greenham Common, which was south of where I was located.
In 1983 and 1984 there was a very large presence of military police at the base when the Cruise missiles arrived. Around mid-1984 this presence diminished considerably, and some of the protesters who were outside the base started claiming that they were being irradiated from the base because of physical problems they were unable to link to any other source. This was reported in Electronics Today magazine in 1985. The symptoms ranged from skin burns to headaches, drowsiness, menstrual bleeding at abnormal times, bouts of temporary paralysis, faulty speech coordination, and in one case circulatory failure severe enough to require hospitalization. Such a complex series of symptoms fits well with severe EM field exposure. The Ministry of Defence (MOD) denied that any harmful electromagnetic signal was being used against the women, but did not deny that an electromagnetic signal may be in use which, if below lOmW/cm2, would not, under UK guidelines, be officially acknowledged as harmful. In other words, they lied.
Cases of Deliberate Experimentation on Individuals for Military Purposes : In one study over 100 Washington and Oregon state prisoners (recall the discussion of Phase II drug testing in Chapter 5) between 1963 and 1971 had their testicles dosed with radiation to discover what doses would sterilize them. The project was funded by the Atomic Energy Commission at a cost of $1.5 million.
From 1945 to 1947, 18 hospital patients, one of them only five years old, were injected with plutonium to measure how much the body would retain. The injections were represented as “experimental treatments” for the patients’ illnesses. This appalling scheme was reviewed in the British Medical Journal in 1987, where it said that the “redeeming feature of the test was that the results were made available to other countries for their use.”
II. ADVANCED MIND CONTROL APPLICATIONS
By now you have acquired quite a bit of background knowledge – it is knowledge that you will need to draw upon to properly understand and evaluate the information in this second section of Chapter 7.
The Psychology Behind Mind Control and Psychic Warfare:
Body identification gives rise to a host of sociological phenomena, the least of which is the mechanistic view that consciousness is a product of the brain, and secondarily that the mind is centered in the brain. Dr. Jose Delgado was one of the chief proponents of this viewpoint. Delgado was the author of the book “Physical Control of the Mind: Toward a Psychocivilized Society”. For Delgado, the mind existed only in the brain; to postulate its existence as an independent entity was to him sheer nonsense. He rejected the concept of free will, and proposed that the mind was a functional entity produced by the electrical operations of the brain, and as such should be manipulated and controlled in order to control the behavior of the population. This was a view that seems to be shared by proponents of the New World Order. Delgado, since the mid-1970’s, was the director of the Spanish neurophysiological laboratory Centro Ramony Cajal. As time went on, his interests shifted from direct stimulation of the brain to the broader area of the biological effects of electromagnetic fields, an area that has been eagerly embraced by the military and political system as a means to achieve their goal of absolute control of the population.
There are several psychological schools of thought that have been adopted by government psycho-scientists and the military to justify mind control. All of them relate to the idea of psychic energy as originating in the human psyche, typified by the work of Carl Jung. The energy originating in the human psyche consists of thoughts, feelings, emotions, and neuro-physiological stimuli and responses. It consists of a physical component that can be measured and an etheric hyper- spacial component that can only be measured by specialized equipment. These schools of thought are as follows:
Suppression of Vital Data in Physics:
For thousands of years, many discoveries have been suppressed from the populations of the planet in order to keep them in bondage. The burning of the libraries of Alexandria is one example of how information can be suppressed.
Another example would be the common technique of suppression of scientific information by alteration of the information itself. Perhaps the most blatant and far reaching alteration of data was the alteration of Maxwell’s equations. James Clerk Maxwell was a mathematical genius who lived in the late l9th century. His original work, which is available to covert scientific departments in the government, had the potential to radically alter the entire course of our civilization.
It is certainly clear to most of you by now that the human population can easily manipulated by electronic means using various methods developed through the military industrial complex. What may not be clear to you is that many of the EM effects can be initiated from outside of what is normally seen as the electromagnetic spectrum. Just as a magnetic field in a wire is at right angles to the current flow, other fields and waveforms exist that are an integral part of the electromagnetic spectrum, yet exist at a certain number of right-angle rotations (orthogonal rotations) away from the electromagnetic field components we are normally accustomed to. If these hyperspacial components, which are not subject to the usual electromagnetic constraints of time and space, are generated and manipulated, they can in turn generate EM effects that have the capability to influence human biology and consciousness.
Let’s take a brief look at how and by whom the equations of Maxwell were changed, in order to make subsequent open scientific development that would have influenced civilization in a positive way, impossible.
The Hertzian Conspiracy:
In late 1864, James Clerk Maxwell published his epic material on electromagnetic waves. His material dealt not only with electrical and magnetic waves, but also the relativistic/ etherial psycho-active component of these waves (representing electromagnetics of the second order and above). The equations also included transformations that enabled the change from inertial frames of reference to non-inertial frames of reference. Maxwell’s original equations were written in Quaternion notation, a complex mathematical system available at that time before Vector Analysis was introduced by Oliver Heaviside. Today’s generalized equivalent of Quaternions is Tensors.
In short, Maxwell’s original work gave the necessary information for gravitational propulsion and psychoactive devices. Someone somewhere recognized this, for shortly after his death, the mathematician Oliver Heaviside, the chemist Willard Gibbs, and physicist Heinrich Hertz decided to “edit” or “interpret” Maxwells famous equations which were, in the original form, the foundations of electromagnetics and Unified Field Theory (UFT). This “unholy trio, especially Heaviside, disregarded the Quaternions or Scalar components of Maxwells original equations, because they represented potentials and not fields. He thought potentials were akin to “mysticism”, because “everybody knows that fields contain mass, and mass cannot be created from apparently nothing, which is what potentials are, both literally and mathematically; they are an accumulation or reservoir of energy.
Furthermore, not only did they throw away the gravitational component with the Quatern- ion/Scalar, but also postulated that gravitation and electro- magnetism were mutually exclusive, not interdependent. That was the death blow to subsequent efforts by scientists to realize a functioning unified field theory. Because of this one act, electromagnetism was reduced from its original five dimensions to only four: X, Y, Z, and time. The element of G was removed.
Because of this deliberate act, twenty-two other errors exist today in electromagnetic theory. The very concepts of force, mass and charge are ill-defined, and the so-called “static” electrical charge has been discovered by Quantum mechanics not to be static at all, but to move rotationally by virtue of the quantum mechanical spin. Finally, adding insult to injury, the so-called “imaginary components” of Maxwells original equations as well as the mutilated version of the equations have also been discarded or ignored. With this last error, the door to hyperspacial domains was forever closed, for the present mathematics and physics of electromagnetic theory do not allow for hyperspacial domains (domains out- side of three dimensions), superluminal signals (signals that exceed the speed of light or are infinite in speed), and a unified field theory.
The edited version of Maxwells work, which every physicist and engineer has had to contend with, discards electrogravitation, and avoids the unification of gravitation and electromagnetics. It also prevents the direct engineering of gravitation, space-time, time flow rates, free energy devices, and quantum changes, which is viewed by the altered equations that are vector-based as only a statistical change. The quaternion approach captures the ability to utilize electromagnetics and produce local curvature of spacetime. Heaviside wrote a subset of Maxwell’s equations where this capability is excluded.
Dr. Henry Monteith has independently discovered that Maxwell’s original quaternion theory was a unified field theory. Einstein assumed, because he only had access to the altered equations, that curving spacetime could only be achieved by the weak gravitational force due to mass, that the local frame would always be a Lorentz frame, which would mean that all operations would be constrained to “conservation laws of physics.” In the 1960’s the Hertz (Hz) replaced Cycles Per Second. Since, then everyone thinks that all electromagnetic waves are hertzian. Only the upper portion of the spectrum before Infra- red contains Hertzian waves. ELF and ULF are not; waves in biosystems and natural phenomena are not Hertzian in nature.
SITE-R links to GWEN
Two US Air Force Ground Wave Emergency Network (GWEN) Relay sites in the vicinity of Site-R differ from the standard GWEN configuration in that they had direct links to the AJCC (via Site-C).
The USAF’s GWEN system was designed in the early 1980s to provide a survivable Emergency War Order communications capability for Air Force SIOP asset command posts and missile sites. GWEN Relay sites are small, unmanned automatic relay nodes located in various remote areas of the United States not known to otherwise be targeted. Site configuration consists of a 299′ Low Frequency tower/antenna (with buried copper mesh providing an RF ground-plane), and fenced shelters housing emergency power generators, LF transmitter and receiver, and at designated Input/Output sites, a UHF transceiver for EWO injection into GWEN from airborne command post aircraft. LF (150-175kHz) and UHF (225-400MHz) antennas are housed within the fenced equipment shelter compound.
Routine site maintenance was performed by a USAF contractor. GWEN sites were not hardened. Their trans and post-nuclear war utility relied on two factors:
* GWEN Relay Node siting topology was a cellular architecture that would automatically re-route the packetized message traffic in order to bypass disabled nodes.
* Low Frequency GWEN signals would be difficult to jam, and are robust enough to survive an electromagnetic pulse environment.
System life of the Ground Wave Emergency Network was projected to be 15 years, after which the system would be replaced by the MILSTAR satellite communications system. MILSTAR (MILitary Strategic and TActical Relay) was originally designed to be a survivable strategic communications system for use during all aspects of nuclear war. For political, budgetary and operational reasons, the MILSTAR system actually deployed in the early 1990s was much less survivable, but expanded to allow more tactical users.
Two GWEN sites in the vicinity of Site-R had an extra communications capability to allow for direct message traffic injection into the network from the Air Force Emergency Operations Center and/or Alternate National Military Command Center via a point to point radio link located at Site-C. These GWEN sites were located near Gettysburg, Pennsylvania and Antietam, Maryland (on the grounds of the state prison).
AF EOC Link antennas were broad-banded VHF/UHF log-periodic type. It is unknown whether this was done to deny hostile forces the ability of approximating the link operating frequency band by determining the length of yagi antenna elements, or if there was another reason. The GWEN system was officially deactivated in the Fall of 1998.
Antietam GWEN site. Small ‘eggbeater’ style receive antenna at the lower left, the standard 299′ GWEN transmit tower, a 225-400MHz antenna atop a telephone pole for message injection via airborne command post, and on the far right is the unique tower for the special link to Site-C.
Closer shot of the top of the log-periodic antenna tower.
Close-up of the log-periodic at the GWEN site, taken from underneath it.
THE USE OF ELECTRONICS & ELECTRICITY
Developments in fiberoptics, computers, electronic communications, nano-technology, bio-chips & neuro-electrical research have combined to bring mankind to the point where mankind can be controlled by one centralized monolithic Beast computer. The ultimate mind-controlled slavery is now possible. We are in the first stages of its implementation. The chapter will be organized in the following sections & subsections:
Section A. An overview of the subject.
Al. Where this article is headed
A2. Where the NWO is headed
Section B. An intro to implants
B1. Three typical implant victims
B2. Documentation of implants
B3. GWEN Towers
B4. Body suits
Section C. Specific Implants
Cl. Audio implants (a. public. b. secret)
C2. Body manipulation implants
C3. Visual holographic implants
C4. Memex/Brain Link implants
C5. Torture/Nerve & Muscle Stimulation Implants
C6. Tracking & I.D. Implants.
Section D. Direct monitoring & manipulation of the brain/mind
Dl. Direct monitoring
D2. Direct manipulation
Section E. Auxiliary uses of electronics & electromagnetic waves.
El. hypnotic induction
E3. attacks against people & objects
E4. virtual reality
Al. Where this article is headed
This chapter is designed to cover the complexities of hi-tech mind-control in simple-to-understand language. To accommodate those who are more technically literate and who want more, some clues to more technical sources are given, but time & space limitations mean that much has gone unsaid.
My deep thanks to the many victims, who placed their trust in me to get their stories out to the world. I hope that I have vindicated their trust. There are a number of disinformation agents that appear to be putting out good information on implants, but are actually disinformation agents. We can error by undershooting or overshooting the truth. The principle topics that these pretend “whistle blowers” have been discussing are the tracking implants and remote viewing. (For RV info, see Theta Programming material in Vol. 2.)
Neither topic is any revelation, nor are they the most dangerous items in the elite’s electronic mind-control arsenal. If the reader has not skipped chapter 5 on disinformation, then he will be aware how factual information can be used in deception, such as in chicken feed & building bona fides.
Why is it that the TV program “The Real X-Files” shown on channel 4 was created by a CIA operative, Jim Schnabel? And why are all the “private” Remote Viewing organizations run by what appear to be entirely all intelligence operatives (such as Ed Dames, et. al.)? And why do we see mind-control specialists, like “ex”-Intelligence officer C.B. Scott Jones who gets involved with several UFO research organizations & disseminating disinformation?
One “researcher”, who is publicly “exposing” the NWO, tried to convince this author, “The government has no secrets.” (A word-for-word quote by the way.) He needs to read a supplement to the National Industry Security Program manual (Mar. 92 release) where the Air Force teaches their DoD contractors how to construct cover stories to lie about the nature of their work for the government.
I will not take cheap shots at the World Order, & I will not intentionally mislead the reader. You will get the whole truth and nothing but the truth, as well a single chapter can present it. Vol. 2’s chapter 6 which was on this same subject was not the final word and neither is this chapter. Before I start passing on lots of information, I should clarify one point. Human brain cells communicate by superconductivity, not electricity. Electricity travels near the speed of light, while superconductivity is in the range of the speed of sound. Government researchers have a device called a SQUID (Superconducting Quantum Interference Device) which actually monitors the light flowing from brain cell to brain cell. This is why over 5% of the brain’s dry matter weight is iridium and rhodium. However, this does not subtract from the fact that electromagnetic waves have the ability to change what the brain experiences and thinks. I must also provide a small glossary for electronic mind-control terms that most people are not familiar with.
GLOSSARY OF TERMS FOR understanding ELECTRONIC MIND CONTROL
Bio-medical telemetry–Transmitter-receivers that are often located at the base of the skull which record body functions & brain wave activity. Their data is sent to remote computers for monitoring. A bio-medical telemetry implant may also function as the primary control implant on body suits of implants. Early versions were used on astronauts.
EMF weapons–Electromagnetic Frequency weapons. These basically are machines that can modulate and beam electromagnetic waves in such a fashion that they control biological/mental functions within the victim. Portals to the central nervous system can be manipulated to create visual images, project voices into the mind, and create pain, moods and emotions.
Psychotronics–This word was originated from Soviet research. The American public have mistakingly thought that the word is equivalent to psychic activity. A more precise translation of the Russian term would have been “applied psychoenergetics”. American psychotronics research was initially done at Stanford Research Institute. This is the Theta Programming that Vol. 2 described.
Remote Viewing (RV for short)–This means psychic viewing of something.
Syntel–This is short for synthetic telepathy, which is the remote sending of voices and thoughts into a victim of electronic mind-control. The military and intelligence agencies have successfully achieved this capability and have carried out countless meetings over their possible uses of syntel.
A2. Where the NWO is headed
Since 1991, this author has been in contact with various victims of implants. The natural first reaction of many initial listeners would be skepticism to the subject. The psychological profession has had articles in their professional journals ridiculing these poor victims. If a fair-minded person will match the experiences of what one can witness happening to these implant victims (as well as their evidence) to the cutting edge of what science is researching and capable of doing, then there is no doubt that implants are being used on an ever increasing mass scale. The World Order is using amplifiers, generators, electronics, listening devices, non-ionizing electromagnetic radiation, a snapping type sound energy that hits and burns the body, closed-circuit videos to monitor implant victims, nanotechnology, and tracking devices that scanners (incl. mobile hand-held scanners) can pick up– JUST to name a few. This chapter will provide an in depth overview of many of these electronic mind-control gadgets.
Unfortunately, the twilight zone of Big Brother is upon us. People (such as limousine drivers) that have been around the movers and shakers report that they brag about these technological controls. The technology described in this chapter, such as nanobots, and holographic implants are in the “R&D stage” of use. What is meant by “R&D stage” means that the World Order is using a large variety of experimental items, but the reader should be forewarned that this does not mean that these items are any indication of where the World Order’s actual secret R&D is at. This author has worked with enough mind-control victims to have established several facts:
· Society is getting only the crumbs of what is known by the World Order’s hierarchy.
· The World Order is releasing technology at a control rate, much of it through mind-controlled slaves who are programmed to “discover” a particular “discovery”. They are in reality only disclosing what has been known in secret, and their discoveries are actually helping cover up where the World Order’s secret research is at.
However, it’s not difficult to see the direction the World Order is headed. They are working at making virtual reality (aka cyberspace) the “in” thing. They are fusing the human mind to computers. Computers/robots are taking over human jobs, and humans are becoming more like computers/robots. Sci-fi gurus, cyberpunks, and establishment scientists are selling and advertising this technological direction as “freedom”, and the crowds of sheep are accepting things like brain implants as “survival equipment” and “freedom”. The “cool” technological pied pipers of our time are teaching our children that gadgets that remove their minds from reality are giving them new freedoms. But this chapter is written because there are still a few people with the neural-receptors and the computing capacity left in their craniums to comprehend the dangers that these mind-controlling devices have for humanity.
Witnesses have told me that the creation of “robocop” type cyborgs (the fusion of man & other equipment) has already been experimented on in secret. Indeed, the government gave out research contracts for cyborg research back in the 1960’s. And the use of electro-magnetic waves (esp. Tesla waves), implants, and other electronic devices by the Illuminati for mind-control is on the increase.
How much of a genuine threat do these things pose humanity? [I’ll spell it out for the reader, but we must remain calm, a fear-based response only makes things worse.]
Yes, it is true that the NSA can remotely track people if they know the specific EMF waves (evoked potentials from EEGs in the 30-50 Hz, 5 milliwatt range) of a person’s bioelectric field. Each person’s emissions are unique, just like their fingerprint, palmprint, and their voiceprint. This means that the NSA can remotely track anyone in public.
And yes, it is true that the NSA’s RNM system can remotely send EMF Brain stimulation signals which create visual images, subliminal audios, what appear to be audible sounds, and thoughts into people’s minds.
Yes, it is true that body suits of implants are used to control people’s minds and bodies, as well as track them.
Yes, it is true they have voice prints of hundreds of thousands of Americans and can identify & track via their computers all electronic communications in this nation. Most phone calls go through about 30 computers before they reach their destination. The phone companies’ computers, according to someone who worked for AT&T and witnessed it, record ALL phone calls using computers. However, to weed out the worthless from the worthwhile, the Illuminati’s fronts use a list of key words, such as names or phrases called THE WATCH LIST which the computer uses to identify conversations worthwhile to listen to. supercomputers, it is monitoring most communication on the entire planet so they have to squeeze the WATCH LIST as tight as possible. According to Bamford, James. The Puzzle Palace. NY: The Puzzle Palace, 1983, p. 459, “…according to Raven, programmers would simply reduce Malcolm X to the last two letters in his first name (lm) followed by a space and then the letter X. Then any time an intercepted data communications containing that particular combination of letters and spacing (lm X) streamed past the computer’s reading head, it would automatically be kicked out for further analysis.
Part of the reason that the computers are swamped with Watch list submissions is that many items require numerous entries. When searching for derogatory references to President Richard M. Nixon, for example, technicians would have to program a variety of possible key words, such as “Tricky Dicky”. This, according to the former G Group Chief would be converted to The new technology which is being implemented in stages includes computer imaging of a person which makes a “whole body map” of the person’s body which is stored in the computer.
Something that has been only developed for a narrow use by the NWO is the downloading of the holographic image of a person’s thoughts so they can be transmitted to another. (See Appendix 3 on cloning for more on this.)
The majority of the few people who know this is going on wouldn’t waste time reporting it, because the public wouldn’t believe it anyway. However, some prominent scientists are predicting that it is just around the corner.
The three top research institutes in this field, Stanford Research Institute, MIT, and the Carnegie-Mellon Univ. all have people saying that this capability is “almost here”.
Austrian born Hans Moravec, dir. of the Robotics Inst. at Carnegie Mellon Univ., is quoted in The Indianapolis Star, 6/14/1987, in an article entitled “Immortality”, “In an astonishingly short amount of time, scientists will be able to transfer the contents of a person’s mind into a powerful computer, and in the process, make him–or at least his living essence–virtually immortal.”
MIT artificial intelligence researcher Gerald J. Sussman states, “I’m afraid, unfortunately that I’m the last generation to die. Some of my students may manage to survive a little longer.”
But as fantastic as all these powerful capabilities sound, there are glitches in their electronic control of humans. As an outsider looking inside for a number of years, this author has been able to take note of some of the success and failures of the New World Order’s electronic mind-control.
First, the NSA picks up so much intelligence information, they are drowning in their own information. Only so many people can make decisions, and they can only digest so much information. They may try to manipulate people and events, but Christians (who are free of the mind-control) can step through those manipulations by having the mind of Christ.
Next, if a person understands who they are & believes in following Christ, outside visions & outside or strange voices or thoughts do not alter the course that a person will take. Most of the people this author has met who have been subjected to remote electronic control over their mind–HAVE REJECTED the instructions & harassment of their electronic handlers. Not only is it clear that the voices are being transmitted from an external source to the victim, others can also detect that something is amiss. The element of secrecy is missing.
One man spent an afternoon talking to this author about the World Order had tried to electronically control his mind, and turn him into a drug pusher. He had successfully foiled them for several years. Although he has had to flee & try to go into hiding to keep his own mind.
The most powerful mind-control is still trauma-based mind control built on a foundation of multiple personalities (dissociated personalities and dissociated parts of the mind). It appears that electronic mind-control is being overlaid on top the mind-control based on dissociation. When this is done, the electronic mind-control is frightening, because the victim’s consciousness is not able to think passed the electronic mind-control which catches their undivided attention. They are too distracted to deal with the deeper issues of trauma-based mind-control. Imagine being a programmed multiple, and your handler doesn’t have to even be near you to relay complicated codes and instructions. He can use your implant.
But again, how serious is electronic mind-control? Let me relate to you about a guided tour that a civilian friend of mine took through a NWO’s major beast computer center in Alaska back in the 1970’s. The engineer, who was in charge of building and getting the center operational, gave him a tour of the site’s capabilities.
At that point, the NWO had built a massive computer center in Alaska, one in So. Africa (believed to be located at the U.S. embassy in Johannesberg), and one in Pine Gap, Australia. These three sites were very specific, because they formed a triangle on the globe, and couldn’t be located anywhere else, due to the naturally occurring lines of force of the planet. These Beast Computer Centers consist of aisles and aisles of big state of the art computers. They each have several dozen people to run them. Even in the ’70’s, an operator could speak into the computer and it would answer. For instance, if you asked the computer about anyone on the planet, it could usually pull up all kinds of information about that person. If you asked the computer how could you get that person to kill someone? or how can I isolate this person? The computer would spill out a plan almost instantly, telling you all the people around that subject who could be manipulated and in what fashion those people need to be manipulated to cause the end result.
This is the end result of years of “BLACK PSYCHIATRY”–which means applying psychiatric techniques to manipulate people and nations. These computers electronically connect to some of those people who are electronically controlled, so that the controllers can actually control the world from a computer. These computers also store vast amounts of personal information about people’s thought processes and thinking. It is possible that electronic surveillance is being done to read the thoughts of people and that the computers are actually able to store this information in some usable fashion.
Because this is so secret, they can’t give any hints of their vast ability to monitor thoughts, as well as organize and store those thoughts. This sounds like science fiction, but from people who invent & work at state of the art technology, this is actually said to be old technology.
They are limited in how they use this technology because they want it to remain secret. Meanwhile on the surface, the public system has automated fingerprint identification with the AFIS system, and has automated birth certificates electronically too. This all ties in with the intense desire of the World System to use the potential of their computers’ memories. Large Neural computers that have artificial intelligence using neural processing which is a type of learning similar to learning done by the human brain are being used.
Recently, the world champion chess player was beat by a computer. This author’s friend, who toured the Alaskan computer center, was shown how a war could be created between any two nations. The operator merely asked the computer what it knew about a certain country and then ask it how could a war be created with a neighboring country. This is the end result of countless studies such as the U.S. military reference book Basic Psychological Operations Study (BPS) which outlines country by country, specifying where each country is vulnerable for PSYOP operations (psychological warfare).
This kind of thing has a long history. For instance in W.W. II, the Office of War Information and the OSS cooperated in psychological warfare projects. What this author’s friend saw was a network of Cray-type computers, perhaps similar to the EMASS system of Cray computers that E-Systems developed. Such a system can store 5 trillion pages of text and work with that data base with lightening speed. The reason this author’s friend was allowed to see this technology, was that he happened to be at the right place at the right time, and the Engineer operator of the Beast Computer said that this system was obsolete. Which is true, today’s 9 Beast computers are much better at speech than the computers at these three control sites were in ’73.
The Beast computers can (according to another eye witness who used it) hear human voices and determine what language is being spoken and then can listen and answer in that language. These computers link directly to thousands of mind-controlled slaves and can– via various methods– almost instantly control the behavior of numerous people. This, along with good old fashioned phone calls, allows the elite to manipulate events very fast. Anchorage is the site of a National Security Agency NSA listening post(LP). The Beast computer was located northeast of Anchorage, and so is the HAARP project.
The HAARP facility is near Gakona, a hamlet about 140 miles north of Prince William Sound and its signals travel on a field line to Australia. The Beast Computer is also linked to Australia as well as satellite systems. The HAARP site took a 4-wheeled truck to reach, and the Beast Computer site in 1973 was even more remote. The University of Alaska Fairbanks (which has its own super computer) and the Alaskan Poker Flat Rocket Range also were involved with the HAARP project. 30% of the U of A’s supercomputer’s use was for DoD projects. HAARP uses 3 powerful transmitter sites in Alaska.
Somewhat on the flip side, the human brain which they control can, IF it has a memex implant, terface with the Beast computer which acts as a vast repository of human knowledge as well as answering questions to essentially all previously answered questions instantaneously. If the human brain has some type of virtual reality holodeck attachment, the computer can even walk the slave through a realistic setting indistinguishable from the real world. Robocop or robo-soldier has an incredible advantage with such extended memex/remote viewing capabilities.
The World Order has experimented in memex/remote viewing along several divergent paths. One method has been psychic (demonic) method, where the “natural” mental facilities of the human are trained. The other route has been high-tech. According to eye-witnesses both methods have yielded positive results, although it sounds like they are still refining their capabilities.
The word telematics has come into use to denote the interconnection between computers and telecommunications. France has a National Telecommunications Research Center, which works with groups such as CII-Honeywell Bull (Jean-Pierre Brule, Pres., & Emmanuel de Robien, Sec.-Gen.). CII-Honeywell Bull did telematics and implant research, and so has IBM France. IBM’s subsidiary SBS developed satellite-based communications. In Britain, their National Physical Laboratory NPL has been active in telecommunications research. Professional computer groups have umbrella groups such as the British Computer Society, which help determine policies.
In the U.S. the National Center for Supercomputer applications works on virtual reality interface with humans. Meanwhile SCAN (Swinburne Centre for Applied Neurosciences, Hawthorn, Australia 3122) has been working on how to monitor human thoughts.
These are just a few of a vast network of research groups applying their efforts to the types of things you will read about in this chapter.
Around 1973, TRW began designing a satellite that would allow the CIA to communicate with its assets/agents in “denied areas”. This was code-named Pyramider, and used frequency hopping. The signals can be hidden among random urban radio transmissions. (See Robert Lindsey, The Falcon and the Snowman. NY: Simon & Schuster, 1979, p. 218)
Some people who are related (in some fashion) to the CIA have been receiving Syntel implants that are communicating to them using signals that frequency-hop. So the proof is in the pudding, the CIA used Pyramider to contact implant victims. The World Order does not use every technological gadget they have in every situation. Use of secret weaponry is restricted so that the weaponry remains secret. This is one reason why victims of mind-control display such a wide variety of symptoms and control mechanisms. But what is scary is that any bozo can already purchase on the public market a frightening array of electronic mind-control devices.
Information Unlimited puts out a catalog that any bozo on the street can order from which advertises 200,000 volt stun guns, laser ray gun, compressed air guns (Air Tasers) that knock people down with probes that attach instantly to the human target and jam their nervous system with T-waves, laser listening devices to listen at long range via their windows, implants along with the tracking system to keep track of people, animals or objects. They also sell other novel devices. While this author has that catalog that advertises for sale computer chips to implant people with, the psychiatric profession is helping cover-up Big Brother’s implant technology.
For instance the Journal of Nervous and Mental Disease, Sept. 1995, Vol. 183 (9), pp. 603-604, has a story about two males (aged 33 and 53 years old) who were labeled delusional because they complained of implants hidden in their fillings in their teeth. The article is entitled, “Delusional electronic dental implants: Case reports and literature review.” The shrinks concluded the two men were obviously mentally ill and needed treatment with drugs because they are claiming that they have electronic dental implants. The psychiatrists wrote, “neither had any insight into the implausibility of the delusion.” The doctors gave anti-psychotic drugs, and physically intervened to “prevent an inappropriate dental extraction.” According to the article, for some unknown reason, the two men “responded poorly” to anti-psychotic drugs.
It never occurs to the psychiatrists that the reason the anti-psychotic drugs didn’t work is possibly because the men’s complaints were legitimate. The two shrinks were B. Sherwood Brown and Michael T. Lambert.
There are other cases too, where people complaining of implants have been labeled “delusional” by psychiatrists.
The Amer. Psychiatric Assoc. is guilty of refusing to seriously review evidence that harassment & mind-control may be impacting people mentally. DSM-IV reflects this continuing refusal to accord victims of electronic mind-control any official recognition by the therapeutic community. Based on research by Drs. W. Fry & R. Meyers, the Network has learned how to make brain lesions of a minute controlled size with ultrasonics, rather than doing a lobotomy.
In 1963, Dr. Peter Lindstrom at the Univ. of Pittsburgh was able to use a single unfocused sonic beam to destroy fiber tracts in the brain without damaging the nerve cells near them. Sonic beams (sound waves) can be used to control human thought. (We’ll discuss sonic beams some more later, now let’s delve into a key part of their electronic control–implants.)
Part 2 coming soon