Total Individual Control Technology & Your DNA – “A Focused TARGET”








Screen Shot 2017-10-01 at 4.30.30 PM

In September of 2020, while preparing to visit family in another state, the military, COINTELPRO high-tech program targeting me and thousands nationwide and globally made it a point to tell me, “We have your DNA” using the drone beamed harassment communication system.

I then documented the threats “You won’t make it there,” “You’re gone” etc., on social networks as I set-out driving 1100 miles with this threat following me.  Little does the public, that drones can travel thousands of miles while operated from one central location.  Below are examples.

The NATO type 10,000 ft (3,000 m) altitude, up to 50 km range. Tactical 18,000 ft (5,500 m) altitude, about 160 km range. MALE (medium altitude, long endurance) up to 30,000 ft (9,000 m) and range over 200 km. HALE (high altitude, long endurance) over 30,000 ft (9,100 m) and indefinite range.

Although I consider myself a small fry, after seeing the Julian Assange update, I couldn’t help but wonder if this is what the operator meant meaning DNA capturing which could be useful in some type of strategically planted set-up.  One thing is certain, it certainly is a capability.  Below are details on the Julian Assange plot and his DNA use.


London Court Hears Details Of CIA Plot To Poison Julian Assange, Steal DNA From Family Members

Total Individual Control Technology:

Insider Exposes How You & Your DNA

are Being Targeted

Research, testing, and development programs continue related to our DNA as a fractal electromagnetic antenna combined with psychophysical mind control.



NOTE: The information presented below and the originator, Bryan Kofron aka Justin Carter, has come under attack as of October 2017 revealed by his comments on his website link shown below.  However many familiar with the structure and “Standard Operating Procedure” of “The Program” know that what is reported here by him rings true with 100% accuracy.

You may be shocked at the extent of this finely tuned control over individuals through DNA.  It can be difficult to grasp the advanced levels they have taken this experimentation, to include physical, mental, emotional, spiritual aspects of the Human.

It’s far beyond “mind-reading”.  It’s mind control and torture, in some cases. They experiment and manipulate with impunity.  They can go tight for individuals, or zoom out for geo-manipulation of one block, or whatever area they choose.

Ultimately truth always wins.

Time will reveal if there is a secret discrediting effort, of everyone involved, by use of the originator using strategies common to official Psychological Operations (PsyOps) and Psychological Warfare (PsyWar) which cleverly, gradually, mix facts with fallacy.  

The combination continues to be a powerful tactic used by Intel agencies to discredit Targeted Individual’s reported truthful accounts and experiences which cleverly result in the denial of the existence of what thousands and millions globally report as ongoing nonconsensual human experimentation with relentless efforts designed for cover-ups.

Screen Shot 2020-07-16 at 12.52.31 AM

Click to access RL31730.pdf

If you give a man the correct information for seven years, he may believe the incorrect information on the first day of the eighth year when it is necessary, from your point of view, that he should do so.

Your first job is to build the credibility and the authenticity of your propaganda and persuade the enemy to trust you although you are his enemy.

A Psychological Warfare Casebook Operations Research Office Johns Hopkins University Baltimore (1958)


August 28, 2017

Total Individual Control Technology is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs (Targeted Individuals). Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of technology via gangstalking.

What Total Individual Control

Technology is Capable Of?

According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate, and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment with poor, homeless, and weak people who have little or no chance of fighting back.

In interviews or presentations such as this,  Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology, or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.

Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:

“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”

“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”

“This technology can also tap into the optical nerve of the target, and the auditory system of the target so that those monitoring the target can see what the target is seeing and hear what the target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”

“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”

“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”

“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha-beta, and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”

“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moment’s notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”

“This technology can also be used to read the thoughts of the target in real-time … they can read your thoughts verbatim as they occur within your own mind.”

“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be affected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”

Total Individual Control Technology Attacks Specific Individuals Based on DNA Resonance

As I have discussed in previous articles on mind control such as “They” Can’t Read Your Thoughts … Right?   See declassified files link below.

The state of current mind control technology is beyond most’s people’s comprehension and idea of what is possible Yet, we have had enough out-of-the-closet whistleblowers and leaked or to give us a clear idea of the scary extent to which we can be psychically attacked.


90,000 Secret CIA Files on Telepathy, Clairvoyance and MK-ULTRA Public

Whistleblowers such as Dr. Robert Duncan have lectured at length about the capabilities of V2K technology, which is defined as an EM frequency technology that utilizes RF (Radio Frequency) signals to induce sound within the cranial cavity of the target. V2K literally pipes thoughts directly into people’s heads without them knowing it.

Kofron bases his information on his own experience as an insider in this field, and also as a recent victim of V2K himself. He was attacked once he went public. He claims he has been assaulted with a beta version which is especially nasty, piping thoughts into his head such as:

“Everyone’s against you”

“Please be quiet or we’re going to kill you”

“Don’t work again or we’re going to kill you” 

“You’re the lab rat now motherfucker”

Kofron claims the Total Individual Control Technology attacks are attempting to turn him against his former work colleagues, friends, and family. However, since he was trained in this area, he knows that the voices are technological and can defend himself against the manipulations once he hears them.

Kofron echoes exactly what Duncan has warned about: individual-specific attacks. Duncan states that every person has a “unique resonance signature”, and in almost exactly the same words, Kofron states that:

“… the DNA of the individual is used to determine the resonant frequency of the DNA itself, the resonant frequency is then used to fine-tune the technology … to tune it perfectly to the resonant frequency of the targeted individual’s DNA.”

The Drive to Create a Worldwide DNA Database

This leads to another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning. It is no coincidence that Amazon and Google (who are ultimately controlled by the same force as David Icke suggests) are racing each other, along with Microsoft, IBM, and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access to a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.

Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, the part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.

Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!

Social Engineering with Total Individual Control Technology

Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor, and who don’t have much family or many friends) since they make the easiest targets.  He exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.

In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low-level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.

NOTE:  The goal of this program is to create homelessness after the complete destruction of the victim’s life.

The Rising Danger of the Private Security Firm Industry in America

Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I covered in this 2-part series, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top-secret information. These security firms, like the MIC itself, appear to operate above and outside the law.

The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.

The Human Rights Loophole: False Diagnoses

Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses. Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers since his claims and testimonies will be dismissed as the ravings of a madman.

This is a similar tactic to what is used with other victims of mind control. In my interview with Max Spiers, he touched on the use of the Big Pharma “false memory” foundation, which includes bogus therapists and psychiatrists who convince mind control victims that they’re having false memories (when they are actually recalling how they were tortured and programmed).

The Infrastructure Underlying Total Individual Control Technology

The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar, and cell phone towers. Often, the antennae are camouflaged (hidden behind walls). Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.

Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power

In conclusion, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power, and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.

Hopefully, this testimony can serve as a wake-up call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter. The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.

About the Author

Makia Freeman is the editor of The Freedom Articles and senior researcher at, writing on many aspects of truth and freedom, from exposing aspects of the worldwide conspiracy to suggesting solutions for how humanity can create a new system of peace and abundance

**Sources embedded throughout the article.








See  also  details  from  Harvard  Magazine  detailed  in  the  link below regarding a virus-sized electromagnetic transmitter.…/virus-sized-transistors


The U.S. Government “Total Information Awareness Program” allows effortless tracking and monitoring of anyone using your specific personal Biometrics Signature which is just as unique to people as fingerprints. The system uses iris, gait, DNA, Voice and Facial Recognition, etc.

The 2003 initiative ensured uploading everyone’s biometric signature allowing effortless biometric tracking of all U.S. citizens. Those that were missed signatures can and are being uploaded by military drones. The result also is that people can be manipulated and influenced by beamed psychotronic weapons from a considerable distance.


This capability has never been aliens and demons or God sold within the cover-up. God is not a person. The advanced technological systems and devices have destroyed untold numbers of lives, men, women, and children for a long time, as human guinea pigs, and a tragedy played out as the voice of God or voice of the devil, urged them to commit suicide and in some cases take others with them.

This is a program so monstrous most cannot believe it exists but the patents, are very real and are not sitting on a shelf collecting dust.

The last thing these unified intel agencies want is Assange depicted as a hero within the public domain.

Believe it or not!

Julian Assange Is “Hearing Voices” And At “High Risk Of Suicide,” Psychiatrist Says

NOTE:  Assange is likely hearing the voices of official personnel at the helm of patented Synthetic Telepathy, microwave RF technology, aka, the DOD “Voice of God”.

Screen Shot 2017-10-08 at 7.48.06 AM





Screen Shot 2020-07-16 at 12.54.39 AM



Screen Shot 2017-10-01 at 4.34.14 PM






Remember also that specifically, the Active Denial System wave beam, used for beamed subjugation torture revealed in this link and throughout this blog is truck-mounted, portable, handheld, land, sea, drone, cellular tower antenna topped, and space-based.



In mid-2018 my youngest daughter asked me to do a DNA ancestry test out of curiosity. I thought about it and was skeptical. There are many uses for DNA today and some less than honorable.  However, there is a long lost relative, lost at birth, I would love to locate and decided it worth a try.

I recently learned that police can request DNA from 23andMe and other companies. After learning this, of course, I thought, would not it be perfect, in the ongoing hopeful set-up, take-down effort around me, to have my DNA show up at a staged crime scene?  I then do what I do best, research is it possible?  The fact is it is not farfetched and is.

Highly credible targets, as shown in the link below, guarantee that what is happening today is a modernized COINTELPRO targeting machination that is using historic tactics, within a modernized technological paradigm.  And without a doubt, great effort is being made to silence highly credible, effective Human Rights Advocates, whistleblowers, nonconsensual human experimentation victims, and activists.  Many have joined forces across the nation and globally.  The biggest secret is that psychophysical, covert electromagnetic technology, systems, and devices are in full use today on a massive scare.  And you can be targeted by your DNA.   See also the blog “Biometric Surveillance…” revealing  DNA as an antenna for surveillance” blog within this site.



Based on what I learned after submission of my DNA to 23andMe, I realized that this could turn out to be a big mistake, by sending saliva. What is happening around many today exposing high-tech corruption is no joke.  I am already being consistently threatened by official COINTELPRO harassment, and, the fact is your iPhone can be used to access your DNA as well.  See also my “Biometric Surveillance…” blog within this site.



So what’s a Human Rights Advocate, human guinea pig, OR whistleblowers to do?

It is to understand the possibility of DNA entrapment and keep walking the path to exposure.  And, while doing so, understand also that this type of lifelong human experimentation program has been approved under the guise of official investigations which could easily open the door for legal requests for DNA for possible negative use.

I also, personally, would not recommend targets reporting in this program who are being microwaved beam assaulted download the final DNA results, from whatever company you chose, to the actual law enforcement source DNA database named GEDmatch.







Although I specifically requested that my sample is not stored, as shown below, and I also declined my DNA use for research,  DNA from 23andMe is being OR will undoubtedly be used by Big Pharma to create new medications and for continued scientific research.

With 23andMe, now connected to the pharmaceutical giant GlaxoSmithKline who announced its acquisition of a $300 million stake in 23andMe means likely compromise.



RESEARCH: You have revoked consent/declined the Research Consent document.

CONSENT: You have not consented to the Individual Data Sharing Consent.

SAMPLE STORAGE: You have selected to not store your sample.

As bad as I want to locate the family member, naturally, I am wondering is it worth it to compromise my DNA by any means, under the watchful COINTELPRO, 24/7 eye of monitoring of everything I do, and of whom likely, based on their harassment threats, announced that as soon as the sample was mailed, could, legally, request a copy of the sample as soon at it arrived.   Under the circumstances mentioned above, anything is possible.

Of one thing you can be certain, this program wants EVERYONE revealing what is really happening today silenced.  This includes all publications and traditionally strategically.

23andMe Law Enforcement Policy



Remote Neural Monitoring:  How They Spy on Your Thoughts



Mind Brain Decoder – UC Berkley


Believe it or not!





NOTE:  Voice to Skull, Voice of God, Frey Effect, Synthetic and Artificial Telepathy, Neural Decoding,  Remote Neural Monitoring, etc., are just some of the names used to describe the high-tech “Hearing Voices” effect and the technological capability to beam covert harassment to an isolated person in a crowd, or thousands of victims in relentless campaigns by operatives of “The Program” using patented systems and devices as microwave beams directly into the human mind.

The technology originated within the “Military Industrial Complex” and is now available and in full use by, military personnel stationed at US bases and dispatched, using community homes, in combined efforts with Federal, state, and local police departments to include DOD Contractors materializing as deadly, covert, official targeting operations.

The technology is truck-mounted, portable, handheld, land /cellular tower antenna-topped, thousands of drones equipped, and satellite space-based.












Deceived Prologue Cover.jpg





  1. Dominika Justynski – I became a targeted individual of human mind control experimentation/V2K in 2015 when I became homeless and began living in a shelter run by The Salvation Army. I continue to experience radio waves/frequencies that travel through to the left ear and electrical pulses that run mostly through the bottom of my feet. I also experience extreme shock/vibration near by anus/genital region and can describe it as a beeper/pager that aggressively goes off inside the body. I have written to the attorney general, governor general and the prime minister on four occasions asking the agency to put an end to this gross human rights violation/terror program, with no response.

    V2K/Mind Control Surviror – Dominika Justynski

  2. There has to be enough of us TI’s to rally together and fight against these people. My mom thought I had lost my mind until finally she has seen the gangstalkers in action and now they have started in on her. What can we do to fight back! It is a battle every day but I get through each day with my Lord Jesus Christ by my side. I find comfort knowing that we will all be judged one day.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.