“There will be no love, except
the love of Big Brother”
George Orwell – 1984
On the surface, the military/law enforcement unified biometric surveillance program appears to be of great and useful value to humanity. This is especially true when the public is sold on the “War on Terrorism,” the foundation and necessity for war, and numerous terrorist within the USA. This manifestation perception created the necessity for biometric signature download of US citizens, as discussed in previous blogs, and resulted in the Total Information Awareness Program, aka DNA data mining, and advanced technologies, little publicized, and operations which sprang up in Federal, State and local law enforcement counter-terrorism, and unified military divisions, which stepped forth center stage, legally, and officially, after 9/11.
SIGNAL INTELLIGENCE COLLECTION, INTELLECTUAL PROPERTY, MONITORING, TRACKING, AND MIND READING BY BRAINWAVES
RFID Chips implantation today is OBSOLETE in light of Brainwave Signal Intelligence Collection and Biometrics Signatures of EVERYONE, and counting.
The rule of the day is successfully uploaded biometric fingerprints into the supercomputer. You can be tracked, monitored, harassed, tortured and terrorized, and your Intellectual Property stolen by operatives listening to your thoughts or plans or even taken out anywhere on the face of the Earth!
MILITARY BIOMETRIC PROGRAM LINK
INTRODUCTION TO BIOMETRICS AND BIOMETRIC SYSTEM’S LINK
Essentially the technology they sold to track Terrorist or the War on Terror has been turned on US citizens and used for Biometric Satellite Surveillance.
Half of U.S. Adults Are in Police Facial Recognition Networks
*THERE ARE APPROXIMATELY 300 MILLION U.S. CITIZENS!*
LINKS TO DRONE BIOMETRIC SIGNATURE UPLOAD CAPABILITY
30,000 DRONES IN U.S. SKIES BY 2020
MICROWAVES DIRECTED ENERGY WEAPONS RESONATE WITH THE VICTIMS DNA. CAN’T THEY BE BLOCKED?
YOU CAN BE IDENTIFIED BY YOUR BRAINWAVE PATTERN WITH 100% ACCURACY
THE DYNAMIC OF HAARP BRAINWAVE MANIPULATION AND MIND CONTROL
BIOMETRIC TRACKING OF ANYONE, WHISTLEBLOWERS, AND ACTIVIST LABELED “DOMESTIC TERRORIST” CAN BE TRACKED FOR THE REST OF THEIR LIVES AND ARE
Most are sold on the concept. That is until the horrific realization, voiced by Targeted Individuals, nearing millions globally, began surfacing and reporting that this program, and the technology at hand, has been officially redirected, covertly, ‘covert’ being the key word, and today used in vicious targeting campaigns, focused on US citizens, nonconsensually, and of whom, in many cases, have been bogusly labeled as criminals to legitimized these operations and nonconsensual technology focus.
The sheer fact of these military/law enforcement operations bypassing the doctrine of ethical and moral conduct, and protocol, intentionally written into the United States Constitution and the subsequent horrors revealed by many, as being a 100% effort for covert destruction of life testing the technology to the limits.
Through ongoing targeting, Targeted Individuals have yet to see anyone released from “The Program” with everyone targeted right up until the death bed and a normal lifespan shortened due to slow, strategic heath deterioration. The fact is, this high tech, technology testing efforts appear designed to secretly push the target over the edge, to hurt self or others, into a psyche ward after mental illness discrediting to hide the truth, and through electromagnetic, manipulation and influencing entrapped then jailed, and, it is all in a day’s work.
The relentless nature of these joint efforts and technological capabilities reveal a program of non-stop biometric surveillance which tells a tale of a horrific truth regarding an intentionally, undisclosed program, unleashed Post 9/11 and for obvious reasons hidden from the public and, the macabre purpose revealed in 24 hour a day, 7 days a week, 365 biometric surveillance, monitoring, tracking, and relentless extreme psychological and physical assaults.
Some of the more horrendous, unethical, immoral, and inhumane efforts, are being reported as occurring within the civilian sector, by law enforcement, Federal, State/Sheriff, and local, DHS, the military who are seeking to create scenarios based on possibilities, through the focus of a mere thought deciphered from a target using documented, patented mind reading software.
Human thoughts are transitory, as the mind processes a variety and thousands of thoughts in a single a day, and our minds act as a filter before final conclusion are finalized but even this is subject to new experiences and changing views. Yet, anyone can become a target for a thought which may be emotionally connected and the result of a brief, passing, emotional response.
In this respect, biometric surveillance, and the many characteristics of biometric electromagnetic “Black Bag” technology frequency, mind invasive, manipulation and influence, as well as covert torture, Psy-Op / Psy War efforts work hand-in-hand within these operations, and the subsequent unscrupulous emergence of horror and becomes a monstrous reality thereby taking police brutality, within the “Militarized Police State” to a whole new, high-tech scientific level backed and enforced by globalization efforts and spearheading agencies.
THE NEXT GENERATION OF THE FBI’S BIOMETRIC DATABASE
BLACK BAG TECHNOLOGY FUNDED BY BLACK BUDGET
California Marine and Air Force Operation
The Strategic Defense Initiative (SDI) became a reality by United States President Ronald Reagan on March 23, 1983. However, again, spy satellites quite possibly were already functioning and violating people’s right to privacy when President Reagan proposed SDI, or “Star Wars.” The Cuban Missile Crisis of 1962 demonstrated the military usefulness of satellites.
The Strategic Defense Initiative at that time was for the use of ground (GWEN) and space-based systems to protect the United States from possible attacks by strategic nuclear ballistic missiles. The SDI laid the official foundation for the use of satellite surveillance and most believe the classified, little known, satellite-delivered technology which has trickled down to fusion center use on United States citizens today called “black bag” technology.
Black bag technology is referred as patented psychological electronic “psychotronic” technology such as mind reading, etc., and infrared lasers that can assault someone even while that someone is indoors. Aviation Week & Space Technology mentioned in 1984 that “facets of the project (in the Star Wars program) that are being hurried along include the awarding of contracts to study…a surveillance satellite network.”
This ideation was bound to be abused yet no group is fighting to cut back or subject to democratic control these programs or the terrifying new influence technology. As one diplomat to the United Nations remarked, “‘Star Wars’ was not a means of creating heaven on earth, but could result in hell on earth.”
The black budget is the government’s illusory and tangled accounting of what it spends on intelligence gathering, covert operations, and – less noticeably – secret military research and weapons programs.
Exposing the Black Budget – Washington Post
RECONNAISSANCE (SPY) SATELLITES
SIGNAL INTELLIGENCE COLLECTION, INTELLECTUAL PROPERTY, AND MIND READING BY BRAINWAVES
RFID Chips implantation today is used far less in light of Brainwave Signal Intelligence Collection and Biometrics Signatures of EVERYONE, and counting, that have been successfully uploaded into the supercomputer.
You can be tracked, monitored, harassed, tortured and terrorized, and your Intellectual Property stolen by operatives listening to your thoughts or plans or even taken out anywhere on the face of the Earth!
BIOMETRIC COLLECTION LAWSUIT
SATELLITE TRACKING BY FACIAL RECOGNITION
LOW ORBITING IRIDIUM SPY SATELLITES
THE STATIONARY IRIDIUM SATELLITE SYSTEM NEXT
SPACE-BASED DOMESTIC SPYING – KICKING CIVIL LIBERTIES TO THE CURB
ACLU TESTIFIES SPY SATELLITES CALLS MORATORIUM DOMESTIC USE
NOTE: The George Bush Jr. administration’s “National Application Office,” (NAO) was established without approval by the proper channels and was shut down, however, the same goal would emerge as, and become, DHS Fusion Centers.
The fact is, as shown below, Target Individuals are essentially being tracked by biometric characteristics, which resonate to an electromagnetic frequency such as DNA. Many targets have reported that even after having left one country, under extreme psychophysical torture horrendous attacks, hoping to save their lives, only to find, after arrival in another, that the inhumane targeting continues and in most cases without missing a beat.
There is a lot of controversy about how this is being accomplished. Many have zeroed in on the logical explanation when faced with the country to country targeting or even inside and outside the target’s residence, or from city to city, or state to state. The only method capable of this is satellite surveillance, and what is documented as a biometric program, through the use of spy satellites already in place, making, as stated in the last blog, satellite surveillance of anyone on the face of the Earth nearly cost-free to Federal, State and local agencies connecting the military, “Militarized Police State.”
DNA ELECTROMAGNETIC FREQUENCY EXPLANATION
YOUR DNA THE ULTIMATE ANTENNA
DNA FRACTAL ANTENNA
TARGETED VICTIMS CAN BE TRACKED BY DNA
BRAIN PATTERNS CANNOT BE FAKED
UNDERSTANDING FREQUENCIES AND MANIPULATION
DNA CAN BE REPROGRAMED BY FREQUENCIES
IRIS, FINGERPRINT, DNA FREQUENCY, BRAINWAVES
Now known as the Defense Forensics and Biometric Agency (DFBA), the term “BIMA” is still used in reference to the Biometrics Identity Management Activity in Clarksburg, WV, which maintains the Automated Biometric Identification System (ABIS). The term “BIMA” does not represent the organization at large, but only that specific activity.BIMA is the primary proponent of biometrics within DoD.
Biometrics are distinct, measureable features of an individual (e.g., facial features, fingerprints, voice/speech, walking gaits, etc.) that can be utilized to discern their identity.
BIMA leads the development and implementation of biometric technologies for DoD Combatant Commands and other related agencies to assist the U.S. warfighter in accurately identifying unknown persons.
BIMA also coordinates the activities related to the acquisition and maintenance of biometrics databases which U.S. warfighters can access to identify individuals.The Department of Defense Forensic and Biometric Research and Development Program (“Program”) is administered by the U.S. Army Research Office and the Defense Forensics and Biometrics Agency.
The Program aims to enhance the capability of forensic science and biometric applications for DoD customers both in traditional law enforcement/criminal justice purviews and in expeditionary environments.
The Program accomplishes this mission by funding research projects that lead to the production of useful knowledge, materials, devices, systems, or methods that a have forensic or biometric function. The Program also supports the Armed Forces Medical Examiner System (AFMES), Department of Defense Cyber Crime Center (DC3), and Joint POW/MIA (Prisoner of War/Missing in Action) Accounting Command Central Identification Laboratory (JPAC – CIL).
For more information about the mission, functions, and objectives of these customers please see their websites below…FBI
BIOMETRIC SURVEILLANCE CONNECTION
FBI BILLION DOLLAR BIOMETRIC PROGRAM IS FOR MONITORING **EVERYONE**
**ACTIVIST, WHISTLEBLOWER, HUMAN TEST SUBJECTS CAN BE LABELED AS TERRORIST**
MILITARY OPERATIONS ARE CONNECTED TO *ALL* LEVELS OF LAW ENFORCEMENT, OPERATING AS COUNTER-INTELLIGENCE DIVISIONS, FROM STATE-OF-THE-ART OPERATION CENTERS GROWING NATIONWIDE
HOW THE DOD AUTOMATION BIOMETRIC TARGETING SYSTEM IS SET-UP
ABIS interfaces with global biometrics data collectors and users, as well as outside databases.- Military Services and Combatant Commands collect biometrics data (fingerprint, palm print, iris scans, and facial scans) from persons of interest in the field using hand-held devices and submit that data to ABIS.
Intelligence analysts analyze and fuse biometrics information via the Biometric Identity Intelligence Resources (BI2R), an automated database outside the ABIS, and provide information back to the users in the field.
LEGAL CONCERNS RELATED TO THE ARMY’S BIOMETRIC HUMAN TRACKING AND MONITORING PROGRAM
Fingerprints being scanned as part of the US-VISIT programBiometric surveillance is any technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person’s manner of walking) or voice.
Facial recognition is the use of the unique configuration of a person’s facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems.
The Information Processing Technology Office, ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft by their facial features.
Another form of behavioral biometrics, based on affective computing, involves computers recognizing a person’s emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person is acting “suspicious” (looking around furtively, “tense” or “angry” facial expressions, waving arms, etc.).
A more recent development is DNA profiling, which looks at some of the major markers in the body’s DNA to produce a match.
The FBI is spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States.
The computers running the database are contained in an underground facility about the size of two American football fields.
The Los Angeles Police Department is installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.Facial thermographs are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of their face.
Law enforcement officers believe this has potential to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something.AERIALMicro Air Vehicle with attached surveillance cameraAerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle, helicopter, or spy plane.
Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.
Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles, forward-looking infrared, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper, a U.S. drone plane used for domestic operations by the Department of Homeland Security, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 60,000 feet, and has forward-looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers.
In an earlier instance of commercial aerial surveillance, the Killington Mountain ski resort hired ‘eye in the sky’ aerial photography of its competitors’ parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.
“HART” PROGRAM CONCEPT DRAWING FROM OFFICIAL IPTO (DARPA) OFFICIAL WEBSITE
The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection, border patrol, “transit monitoring”, and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from Honeywell, which is planned to be used in SWAT operations. Houston’s police department has been testing fixed-wing UAVs for use in “traffic control”.
The United Kingdom, as well, is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones, to be used by police forces throughout the U.K.In addition to their surveillance capabilities, MAVs are capable of carrying tasers for “crowd control”, or weapons for killing enemy combatants.Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process.
They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is “suspicious” and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station. In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.
DATA MINING AND PROFILING
Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior.
Data profiling can be an extremely powerful tool for psychological and social network analysis. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored data and records. In the past, this data was documented in paper records, leaving a “paper trail”, or was simply not documented at all.
Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.But today many of these records are electronic, resulting in an “electronic trail”. Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out a library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasily being digitized and made available online. In addition, due to laws like CALEA, web traffic and online purchases are also available for profiling.
Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs. Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections, and preferences of the individual. This profile is then used, by programs such as ADVISE and TALON, to determine whether the person is a military, criminal, or political threat.
In addition to its own aggregation and profiling tools, the government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers.
The United States has spent $370 million on its 43 planned fusion centers, which are a national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver’s licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc. — and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.
Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements.
Corporate surveillance is the monitoring of a person or group’s behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Or the data can be sold to other corporations, so that they can use it for the aforementioned purpose. Or it can be used for direct marketing purposes, such as the targeted advertisements on Google and Yahoo, where ads are targeted to the user of the search engine by analyzing their search history and emails (if they use free webmail services), which is kept in a database. For instance, Google, the world’s most popular search engine, stores identifying information for each web search.
An IP address and the search phrase used are stored in a database for up to 18 months. Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences. Google is, by far, the largest Internet advertising agency—millions of sites place Google’s advertising banners and links on their websites, in order to earn money from visitors who click on the ads.
Each page containing Google advertisements adds, reads, and modifies “cookies” on each visitor’s computer. These cookies track the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use for building a profile of the user to deliver better-targeted advertising.
According to the American Management Association and the ePolicy Institute that undertake an annual quantitative survey about electronic monitoring and surveillance with approximately 300 U.S. companies, “more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet“. More than 40% of the companies monitor e-mail traffic of their workers, and 66% of corporations monitor Internet connections.
In addition, most companies use software to block non-work related websites such as sexual or pornographic sites, game sites, social networking sites, entertainment sites, shopping sites, and sport sites. The American Management Association and the ePolicy Institute also stress that companies “tracking content, keystrokes, and time spent at the keyboard … store and review computer files … monitor the blogosphere to see what is being written about the company, and … monitor social networking sites“.
Furthermore, about 30% of the companies had also fired employees for non-work related email and Internet usage such as “inappropriate or offensive language“ and ”viewing, downloading, or uploading inappropriate/offensive content“.
The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies—such as Google—for augmenting the profiles of individuals whom it is monitoring.
The FBI, Department of Homeland Security, and other intelligence agencies have formed an “information-sharing” partnership with over 34,000 corporations as part of their InfraGard program.The U.S. Federal government has gathered information from grocery store “discount card” programs, which track customers’ shopping patterns and store them in databases, in order to look for “terrorists” by analyzing shoppers’ buying patterns.
Organizations that have enemies who wish to gather information about the groups’ members or activities face the issue of infiltration. In addition to operatives’ infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as informants (i.e., to disclose the information they hold on the organization and its members).
Fielding operatives is very expensive, and for governments with wide-reaching electronic surveillance tools at their, disposal the information recovered from operatives can often be obtained from less problematic forms of surveillance such as those mentioned above. Nevertheless, human infiltrators are still common today. For instance, in 2007 documents surfaced showing that the FBI was planning to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive sent out by George W. Bush in 2004 that ordered intelligence and law enforcement agencies to increase their HUMINT capabilities.
Reconnaissance (spy) satellite
On May 25, 2007 the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens.
The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and “underground bunkers”, and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.
NICK BEGICH – GLOBAL MIND CONTROL
Don’t miss reading “Identity Dominance” biometric surveillance” link within Jon Rappoport’s blog
Evidence is emerging of a global system of remote mind-control, primarily facilitated by the manipulation of the ionosphere to create a virtual global ‘radar’ system used for the guiding of ‘exotic’ energy pulses as carriers of acoustic and electromagnetic energies. This is supported by satellites, cellular telephone networks and the clandestine imbedding the of head and ear implants.
The technology is based on new science hidden from both the public and all governments around the globe, which is believed to have originated from Nikola Tesla’s work on scalar waves and other exotic ideas. The system is said to be capable of controlling any individual virtually anywhere on Earth by the use of remote mental-suggestions, hypnosis and alter-identity creation, among other brainwashing techniques.
The result is that you could be controlled in real-time to act out and say things that are not the product of your free will but someone else’s manipulation.
You could be mentally steered by subliminal suggestions to:
• Distract your own attention and mental focus.
• Steer your conversation and thinking process.
• Believe in principles and ideas which are a fraud.
• Frustrate other’s conversation.
• Spread lies and untruths.
•Create ersatz insights that mimic a process of discovery.You could be remotely hypnotized to:
• Stalk individuals.
• Bear false witness.
• Commit a crime.
• Incriminate yourself.
• Lure and trap a person into compromising sexual misconduct.
• Unwittingly participate to discredit honorable individuals.
Your alter-identity could be used to create:
• A political career for you only to be manipulated for other purpose.
• A terrorist to wreak chaos and destruction.
• An assassin to murder individuals for a political or other purpose.
• A TV or radio host to spread propaganda.
• A doctor to unwittingly aid the perpetrators’ cause
The above are a small example of possible uses of such a system; the power of mental suggestion, hypnosis and alter identity creation affords the ‘controllers’ an amazing array of means to manipulate the human condition on many levels.
THE MORE DISTURBING CAPABILITIES OF THIS SYSTEM ARE:
1. The stun effect: To render subconscious (effectively tranquilize) a person remotely so that prolonged and repeated pulsing of energy can be applied to cause bodily damage like burning, incisions, contusions, skin defoliating, etc. Also, while immobile and subconscious infra-sound pulsing to the head is used to damage a person’s brain or to cause mental dissonance, or to subject to electro-shock without the victim being aware. It is used under some circumstances to enter the victim’s house under stealth. And, to make the victim effectively brain-dead when sleeping so as not to allow the brain to do the normal housekeeping duties which progressively leads to mental disturbance or to aid in creating psychosis.
2. Mental-suggestion: The ability to ‘inject’ thought-webs as a mental suggestion by EEG composite transfer from the controller to the victim, which can contain primarily thoughts, but also sounds, imagery in daytime and dreaming or nightmares at night.
3. Hypnosis: The ability to hypnotise individuals while at sleep and to have the victims act out directions without being aware and having no memory of the event. This is accomplished remotely without any other preparatory work with the victim –it is applicable to anyone, virtually anywhere in the world.
4. Voice in the Head: The ability to generate voice inside the head that is as pure and obvious as somebody talking next to you. This can be used to create the belief in the higher being, to hypnotise, to cause mental dissonance or disturbance and disorientation. It is used extensively as a subliminal suggestion when the speech is generated at higher speeds and mixed with emotional content. This is enabled via an implant inside the middle ear, which converts an electromagnetic signal to speech inside the auditory cortex. Associated ability includes the creation of ‘new’ memories or beliefs and mental illness.
5. Alter-personalities: Creation of alter-personalities is performed inside your own home while you sleep over a period of a few days. The technique is to reduce the level of conscious awareness to the state of a four year old child, then to traumatise you with virtual satanic ritual torture and virtual sexual abuse dreams until the distress reaches the level when a personality splits, which is then conditioned to obey mental suggestion commands from the controller.
6. Mind Reading: This is the transmission of the subject’s sub-vocal thinking to the controllers aided by a scalp implant located behind the left ear. When used in concert with mental suggestion it is possible to interrogate an individual without awareness.
7. Wiping short-term memory: This is affected immediately after the thought or thoughts are made. An implant located at the left temple is used to ‘inject’ EMR (electromagnetic radiation) into a precise location of the brain where thinking memory is processed. The thought feels like it has been ‘hollowed out’. This is extensively used to interfere with the verbal expression of the victim by constantly wiping the thinking process manifesting in paused speech while searching for the right word, and word substitution.
8. Erasing long-term memory: The victim is not aware what is erased until the time comes to recall a name, a place or a word. Erasure is not specific but indiscriminate and imprecise. Here also an implant is used, usually located on the back above the shoulder blade, to generate specific frequency EMR which produces tingling at the back of the head (the cerebellum).
9. Undermining voluntary movement: In order to achieve greater control of the victim, the perpetrators will target the cerebellum (as above) with prolonged pulsing. The reason for this is to manifestly render the victim with yet another mental disorder characteristic by deliberately causing uncoordinated movement. The victim will experience hand and arm movement which cannot be willingly restrained and a change in gait.
10. Creating false memories: This is accomplished by first electro-shocking the brain of the victim (while stunned), and then repeating falsehoods (psychic driving) during a hypnagogic phase of awareness using subliminal mental suggestion to create a memory, which is then made permanent by semi-conscious regurgitation of this information.
11. Simulating mental illness: To affect this it is necessary to position implants at various locations under the scalp on the front and the right side of the head of the victim. The implants receive signals via bone demodulation and emit a pulsing magnetic frequency at predetermined brain locations affecting the brain cell orientation to temporarily manifest anger, loss of reasoning, loss of moral orientation, inability to plan ahead or visual distortion.
All the fabricated symptoms predictably conform to formal descriptions of mental illnesses like psychosis or schizophrenia as described in DSM (Diagnostic and Statistical Manual) which is enough ‘evidence’ to certify the victim.
It will be argued here that the purpose of this system is the creation of a one world communist government. However, the cynical aspect of this is the deliberate discrediting and destruction of the current political systems and social order for the purpose of demonstrating that western culture and life is a failure, and that communism underpinned by global mind-control is a superior alternative. This view is supported by the political conviction that Man cannot rule himself and needs to be guided by the ‘invisible hand’.
The annihilation of the present order is referred to as creative destruction and can be seen in almost every country around the world where:
1. Financial markets are conspired to fail in order to discredit the free market system.
2. Governments are manipulated into inertia, incompetence and humiliation to incite riots and finally removal of current leaders.
3. The manipulation of youth into violence and dissolution as a way to force governments to introduce increasingly strict laws creating a backlash.
4. The systematic and deliberate setting-up of priesthood into sexual abuse –that never happened– for the purpose of removing any vestige of moral authority and guidance in a society.
5. The discrediting of the scientific process so as to eradicate inquisitive minds and pave the way for spirituality as a guiding principle.
6. The validating of God’s presence and power by ersatz miracles and prophecies.
7. The manipulation of climatic conditions on a world scale for the purpose of dividing people, discrediting the United Nations and the scientific process, creating chaos, failing crops and wasting resources.
8. Causing earthquakes to cause misery and chaos, and waste resources, but also to shift global sentiment for a particular purpose.
9. The reformation of the mental institutions to facilitate ‘mental healing’ of the anticipated uncooperative, self-deterministic rugged individual who believes in freedom, and the silencing of those who discover the truth.
10. The humiliation of sports personalities, the self-made individual and exemplary figures in a society so as to eradicate collective pride, honour and dignity that spiritually feeds and drives a nation.
11. The discrediting of judges, heads of mental institutions, police commissioners, and other important institutions in order to replace them with either communist ideologues (called psychopoliticians) or unwitting proxies.
12. Creating celebrity criminals through the media to exemplify the depravity of the society, and to use criminals unwittingly to do the dirty work of murder, rape, bashing, arson and drug dealing.
No one, I repeat, NO ONE is exempt and many lawsuits are dismissed by courts, compliant judges, after strategical legalization for “research activity” or “crowd control” for military and law enforcement personnel. Anyone trying to reveal the truth can also become a target, to include high-level officials.
THIS IS JUST HOW MUCH THEY WANT THIS PROGRAM HIDDEN
The fact is, and one thing is certain, the puppet master, pulling the strings, do not care about us as a whole. The average man or woman, no matter what race, they believe beneath them and are simply considered as pawns in a global ideation. And, apparently they will pay handsomely, and use their hired gun, goon squad puppets, to enforce for them their agenda to ensure silencing and continued mass population control, which criminally includes torture and murder of anyone speaking the harsher truths! And it can be done covertly, through extremely low frequency, electromagnetic radio waves, and without leaving a trace by programming of someone to do a specific the deed and create and manage the perceptions of society as a whole.
We are talking about the efforts of what many recognized as the “Secret Government” in place at the highest echelon, literally. The United States, in decisive, unified efforts has become a prime testing ground using the average man or woman who cannot fight literal evil in high places without finances to go up against these efforts and the high power attorneys or the laws legalizing and condoning criminal activity by those manning this technology.
The end result is a Targeted Individual and the global community’s worse NIGHTMARE!
MILITARY CIVILIAN SECTOR BIOMETRIC PROGRAM
CAPABILITY TO DOWNLOAD FACIAL RECOGNITION BIOMETRICS
TOTAL INFORMATION AWARENESS OFFICE GOAL WHICH DOWNLOADED EVERYONE, IN ONGOING EFFORTS INTO A SUPERCOMPUTER
NOTE: 30,000 drones approved for US Skies by 2020 with biometric upload and the capability to manipulate, influence, and torture via a bio-coded weapon system.
DOCUDRAMA VIDEO AVAILABLE ON AMAZON
LINK TO AMAZON FILM JUST $2.99 TO RENT / FREE TO AMAZON PRIME MEMBERS OR FREE WITH ADS