#NewWorldOrder #Surveillance State: Building The All-Seeing Eye: Project L.U.C.I.D. #NWO

PROJECT L.U.C.I.D.

The Beast 666 Universal Human Control System has been designed and is being implemented in America and throughout the world. We knew it was coming. Now it’s here, and soon, there will be no place left to hide. By the year 2000, Big Brother’s evil, octopus-like tentacles will squeeze every ounce of lifeblood out of the people. A nightmarish, totalitarian police state is at hand.

That is the thoroughly documented message-and momentous warning-sounded in this book. Do not for an instant think that you and your loved ones can escape the monstrous behemoth which lies in our path. Once Project L.U.C.I.D. is fully operational, every man, woman, and child will fall under the power of its hideous, cyber­electronic grasp — PROJECT L.U.C.I.D.
http://www.universe-people.com/english/svetelna_knihovna/htm/en/en_kniha_project_lucid.htm

Quote: “Few symbols have triggered as much controversy in contemporary culture as the “all seeing eye” within the triangle or pyramid. The occult symbolism of this enigmatic emblem has been a great catalyst for philosophical, religious and political debate. Conspiracy theorists (and sometimes religious intolerants) like to point to the “Eye in the Pyramid” in the Great Seal of the United States and on the U. S. Dollar Bill as being evidence of some vast conspiracy. In a world where e-mail monitoring, mass telephone wire-taps and global video surveillance is commonplace, the eye of “big brother” appears to be everywhere and takes on new meaning. Little wonder that conspiracy speculation has moved out of the realm of fringe theory and is fast becoming a main-stream concept.” –– Source: The Eye within the Pyramid
https://www.tekgnostics.com/Eye.htm


pyra-eyeQuote: In modern society where God has been replaced with science and government legislation takes the place of divine law, the all-seeing eye is usually equated with authority and surveillance. This interpretation can be seen in the logos of organizations such as DARPA in the US (Defense Advanced Research Project Agency, founders of the internet) and MI5 (British intelligence) to name just a few. Both of these organizations could be considered the all-seeing eye of their respective governments. 

         from The Fool’s Philosophy

Quote: All your cell phone communication are recorded. Your television not only recognizes you by scanning your facial structure, it can transmit images of your every action in the living room to a remote server. Your coffee maker records all of your kitchen conversation for storage in an off-site database. If this sounds like the vision of a future tyrannical society from a sci-fi movie, it’s not. It is the present. All of this technology exists and is being implemented and is working to truly construct the Illuminati’s Satanic “All-Seeing Eye” of Lucifer. This article will show how through the New World Order, Satan will use technology to help him try to match God’s power and set up the world for the coming Antichrist.

Satan’s aspiration in the Bible is to be just like God. Isaiah 14 details the 5 points of Satan’s original plan to rebel against God:

— Source: https://beginningandend.com/illuminati-surveillance-state-allseeing-eye/

However:

The all-seeing eye is a symbol of divine omniscience or sinister influence depending on how it is used. In this second article tracing the history of this symbol we will delve into its use over the last 200 + years which takes this pristine positive symbol to its increasingly malevolent use and implications.

— Ref. The All-Seeing Eye: Modern Use of a Hijacked Symbol – The Conscious Reporter http://consciousreporter.com/conspiracy-against-consciousness/corruption-sacred-symbols-all-seeing-eye-part-2/

The Magnitude and Dimensions of Project L.U.C.I.D..  

Consider the unbelievable magnitude and dimensions of Project L.U.C.I.D.. First, it mandates that every adult and child-even newborn babies-be issued a universal biometrics I.D. card. A “Smart Card” with an advanced computer microchip, this powerful, reprogrammable I.D. card will store millions of bytes of information about the recipient-his or her photo, fingerprint, footprint, iris (eye) scan, DNA genotype, human leukocyte antigen data, financial status, and personal history.

Oh yes, the I.D. card will also be coded with numbers. One will identify the individual card holder. Another, I believe, will eventually constitute the number 666. The number 666 will signify the hellish master responsible for the devilish invention of this Universal Biometrics Card and its interlocked, computer network.

L.U.C.I.D.. establishes a massive, Big Brother, computer database of unparalleled, invasive power. Millions of bureaucrats employed by a hidden, SS Gestapo estab­lishment will constantly feed this electronic Beast with more and more data. They will hungrily and rapaciously tap into its billions of cyberspace-filed dossiers, searching for information by which they can extend the Beast’s dominion and influence into every nook and cranny of our lives.

L.U.C.I.D..’s cyberspace dossiers will be made instantly available to thousands of probing, faceless, police state agents and bureaucrats around the globe. America’s CIA, IRS, and FBI, the Russian KGB, Europe’s Interpol and Europol, Israel’s Mossad, Britain’s military intelligence­-these are just a few of the planetary-wide law enforcement, military, and intelligence agencies having access to your dossier and to mine.

A Central Gestapo Repository

http://www.universe-people.com/english/svetelna_knihovna/htm/en/en_kniha_project_lucid.htm

The Mysterious All Seeing Eye Symbol Of The Devil’s New World Order!
http://www.jesusisprecious.org/nwo/all_seeing_eye.htm

PROJECT L.U.C.I.D.

 

 

Technology: Distracting, Disturbing, Deceiving & Deluding Ourselves to Death — Astute News

“What Huxley teaches is that in the age of advanced technology, spiritual devastation is more likely to come from an enemy with a smiling face than from one whose countenance exudes suspicion and hate. In the Huxleyan prophecy, Big Brother does not watch us, by his choice. We watch him, by ours. There is no […]

via Technology: Distracting, Disturbing, Deceiving & Deluding Ourselves to Death — Astute News

The Creepy Line: A New Documentary on the Immense Power of Tech Giants — Astute News

The Creepy Line, a new documentary by director M.A. Taylor, is now streaming at Amazon Prime. It takes a disturbing look at how Google and Facebook influence their users’ view of the world, and how the companies have pioneered new ways of doing business. It’s a business model in which personal data harvested from users […]

via The Creepy Line: A New Documentary on the Immense Power of Tech Giants — Astute News

Project Soul Catcher NoTouchTorture #TargetedIndividuals #Gangstalking #Targetedtoo

Project Soul Catcher: http://projectsoulcatcher.blogspot.com/. I’ve taken the liberty of placing this text here, for educational/learning purposes.

By Dr. Robert Duncan

Sunday, March 29, 2015

Summary of no-touch torture techniques

The Executive Summary:

Neuropsychological and Electronic

No-Touch Torture Report

Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

                Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years. Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for

Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states

The idea is to shake up the emotional states of the target because different information can be accessed at each state. Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways. The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.” The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

  1. Memory Erasure

The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation. There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do. Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes. The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

  1. Electricity and Shocks

Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

  1. Fear and Terror

There are many techniques to induce extreme fear in the target. In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used. Remember that many targets of torture die from the physical effects. It is torture to death.

Let us compare the no-touch torture methods used to inflict the same terror and mental anguish. In several of these techniques the target needs to hear their handler’s voice. This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

  1. Imprisonment and Isolation

Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche. Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

  1. Sexually Disturbing Tailored Pornography

The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

  1. Mutilation

Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture mutilation is done by trickery. Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

  1. Personal and Spiritual Defamation

In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?” In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggersactivistsjournalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

  1. Psychological Intimidation

This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

  1. Rape

Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding. In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

  1. Dietary Manipulation, Forced Weakness and Sickness

The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

  1. Repetition

Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

  1. Sensitization of Pain Impulses

While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

  1. Sensory Overload and Deprivation

Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes. Targets of no-touch torture often hear endless tinnitus.

  1. Sexual Humiliation and Lack of Privacy

Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

  1. Maximum Sensory Pain Techniques

Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering. All suffering can be entrained into the minds of no-touch torture subjects.

  1. Sleep Deprivation

This is the number one torture method along with the popularity in the press of water boarding. This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

  1. Stress Positions

Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees. Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target. Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital. Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession. Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation. The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals. Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached. Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors. Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”. It is used in war games to determine how to control your enemies and targets. Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.


Partial Project Summary
History
Project descriptions
Technologies and skills
Signal/Image Processing and
Pattern Recognition
Tank image recognition from satellites
3-D stereoscopic extraction algorithms
Submarine signature recognition from acoustic underwater
phased arrays
Expert Bayesian system, parameter tuning, phased array
signal processing correlogram
Stock market statistical arbitrage
Creating models based on financial fluid flow dynamics and
correlations of stock prices. Forecasting (Tuck).
Credit card fraud pattern recognition.
Spending pattern irregularities alerts
Sound triangulation/sniper system
Asymmetric phased arrays and reflection calibration algorithms
Biometric recognition systems
Face, finger print, retinal, voice and infra-red vascular
recognition
Feature extraction, registration algorithms, noise
removal, large dataset management. Eigenvectors, wavelets, 3-D convolutions,
cluster analysis.
Eye gaze tracker
Real time image processing. Head rotation modeling.
Truth detection systems
Automating polygraph parameter sensors and voice stress.
Emotional context modeling through vocabulary templates.
Gesture recognition
Hand gestures conversion to computer commands
Brain Print Recognition
Utilizing many samples, human brains have a unique MEG/EEG
brain “hum” and cluster analysis can be done to recognize mental illnesses
and uniqueness of individuals. (Lockheed Martin is doing research on
recognition of precognitive signals of objects. Berkley also just released a paper showing
how to discriminate between 1024 visual objects.)
Supercomputing Applications
Various projects including FFT optimization
Vector Pipeline, BBN Butterfly, Hypercube, Viking Boards
Artificial life simulations, gas lattices
Specialized Hardware, genetic and evolutionary algorithms.
Grid computing
BEA and Oracle distributed grid computing
Computer generated holography
3-D spatial FFT on BBN’s connection machine. C-paris
parallel programming language. Fortran 77.
Speech Recognition/Identification
Voice recognition/identification
BBN Hark’s system.Markov modeling, n-grams, context
probability models, speaker independent models
Models of discourse and planning
Studied under world renown Barbara Grosz, graduate school adviser
Harvard
Natural Language parsing and AI knowledge networks
CIA project. Focused on pronoun reference
algorithms.
Biomedical Projects
Soldier 2000 project
Connecting vital sensors to a wireless bodyLan . DARPA.
Robotic Surgery in Medicine for the Army
Haptic feedback, latency time compensation,  tremor filtering, object touch recognition
Virtual Reality in Medicine
Overlays of fMRI scans onto patient for real time surgical
applications
Virtual Reality 3-D Reconstruction Teleconferencing
Carnegie
Mellon University.
3-D reconstruction of objects in the teleconference room.
EEG controlled robots
Relatively simplistic mental state recognition to control
direction of robot. Discriminant function analysis.
Neural network controller for “INFANT” robot
Designing robot controllers to learn to grasp objects that
mimic human babies. Mentor:
Dr. Kuperstein (MIT)
Retraining the brain to interpret tactile feedback as
visual information
Brail interfacing also used by Navy for Sonar feedback on
tongue tactile vision systems.
Research / simulations in cybernetic hive mind work groups
(BBN) Increasing the hypothetical efficiency of integrated
rapid communication technologies.
Neural network control system for leg muscle stimulation
to make paralyzed people walk again
Engineering of extoskeleton. Control systems for
non-linear biological models due to muscle fatigue.
Digital circuit / systems design
Cascadable digital neural network chip
VLSI design, production, testing
Wearable ubiquitous computing systems
Enhanced reality, enhanced cognition. Heads up display
borrowed from NASA for entrepreneurial venture.

 

#Gangstalking? The Sentient World Simulation–Our Digital Clones 4th Generation Warfare Matrix

2019-03-21 15_53_32-synthetic simulation at DuckDuckGo - Comodo IceDragon

Peter warned “Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour…”

‘BREAKTHROUGH IN QUANTUM COMPUTERS’ says Google: Biometrics, Brain-Machine Interface & 2030 Agenda (Lockheed Martin)

A few links to get you started to understand what’s going on regarding #Targeting and #Gangstalking as well as #Experimentation. We are nodes/avatars in a computer generated mirror imaged world at the dept of defense’s Purdue lab, a sentient synthetic simulation, hence synthetic telepathy IE synthetic thoughts played back at us (our own) in cybernetic cyberwarfare gaming, regrettably. — Lissa

Feel strange? Its a mirror of you talking & looking back at yourself thru your eyes… its the synthetics nanotech fiber antennas. When one hits or lands on me… it snaps in my sinus because I’m breathing them in and sprayed on by the SKYNET AI

detox them out — soak your feet hands hair in borax 40 mule team & dawn dish detergent – we have nano in us from the chemtrail spraying.

2019-03-21 16_02_47-matrix at DuckDuckGo - Comodo IceDragon

What you need to know about the SENTIENT WORLD SIMULATION and VIRTUAL REALITY –

The Sentient Worldwide Simulation, Targeted Individuals and the Birth of the Matrix – Will Golightly

How the Government Predicts The Future – Inside the “Sentient World Simulation” : The Corbett Report

This “Sentient World Simulation” will be paired with Quantum AI and will learn to anticipate the best means of controlling the individual and the population. : conspiracy

I researched this for Dr. Karlstrom (TI): “Targets” Are Enrolled In The Pentagon’s 4th-Generation-Warfare – “Sentient World Simulation” – SEAS (Synthetic Environment For Analysis and Simulation)Program – Gang Stalking, Mind Control, and Cults

2019-03-21 16_00_43-purdue sentient world simulation systems at DuckDuckGo - Comodo IceDragon

The SENTIENT WORLD Program: how the agencies model and predict the future [Archive] – The Project Avalon Community Forum

Sentient World Simulation – Sentient_World_Workshop_TUT_18February2014_Chaturvedi__Abstract.pdf

FAQ :: What is Sentient World Simulation? – Rapture Ready

Sentient World Simulation Archives | Take The RedPill!

DOD Creates Sentient World Simulation ~ Singularity…

We’re swimming in an ether of data streams due to all the frequencies 2,3,4,5G

combined with the nanotech/biotech.. its how they’re controlling everyone

2019-03-21 16_02_25-matrix at DuckDuckGo - Comodo IceDragon

DOD Military Simulation Creates A Sentient World | The Ghost Diaries

Tangible Information: Sentient World Simulation GOOGLE CIA nsa facebook

Sentient world: war games on the grandest scale • The Register

Tons of articles on the AI by Alfred Webre

Source — Trends To A New World Order: Techno-Biological Tyranny
https://sagaciousnewsnetwork.com/trends-to-a-new-world-order-techno-biological-tyranny/

(Old Thinker News, By Daniel Taylor) The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values.”

– Zbigniew Brzezinski, Between Two Ages: America’s Role in the Technetronic Era

As the world moves toward world governance in a new globalized era, technologies that enable extended life spans, and technologically augmented abilities are being developed. These upgrades for the human body come at a high cost, and are unattainable for a large number of people, causing additional societal conflict and the rise of new aristocratic classes defined by their level of “enhancement”. Diseases are mostly eradicated among elites, while a large percentage of the population is left still vulnerable. A high tech overlay of sensors and monitoring devices tracks workers activities. Their heart rates, facial expressions, and overall state are monitored to maintain maximum efficiency. Supercomputers run Sentient World Simulation software designed to enable testing of efficient social management and psychological operations against the population in a virtual world. Artificial Intelligence makes health, political and educational decisions that were once made by human beings. Advancing technology offers miraculous cures, while opening doorways to new forms of tyranny and manipulation unimaginable in the past.

The EyeOpener- Sentient World Simulation: Meet Your DoD Clone – YouTube

Its called THE BEAST by insiders… the Beast system

We’re in a simulation

Citation: Trends to a New World Order: Part 2 – Old-Thinker News
https://www.oldthinkernews.com/2008/01/09/trends-to-a-new-world-order-part-2/

Societal control through technology

[1] ] Brzezinski, Zbigniew. Between Two Ages: America’s Role in the Technetronic Era. Penguin books, 1976

[2] “Outlook 2008”. The Futurist. Nov-Dec 2007. Available at

[3] Cupp, John. “USJFCOM teams with Purdue University to add the human factor to war game simulations”. United States Joint Forces Command. February 4, 2004. Available at

[4] Chaturvedi, Alok Dr. “Sentient World Simulation (SWS): A Continuously Running Model of the Real World”. August 22, 2006.

[5] http://www.simulexinc.com/

[6] Baard, Mark. “Sentient world: war games on the grandest scale”. The Register. June 23, 2007. Available at

[7] “Towards a Synthetic Environment for Computational Homeland Security”. Available at (requires flash player)

[8] Microsoft Patent #20070300174. Available here

[9] Ibid 8.

[10] Clark, Robert. “The Panopticon”. The Literary Encyclopedia. Available at

[11] Duke, Lynn. “Uniqueness lost in surveillance society”. Washington Post. December 10, 2007. Available at

[12] Ibid 1.

Future Eugenics and life extension

[1] Kaku, Michio. Visions. New York, New York: Doubleday, 1997. page 257.

[2] Development, Concepts and Doctrine Centre/Ministry of Defense. “The DCDC Global Strategic Trends Programme 2007-2036”. January 2007. page 80.

[3] Campbell, Thomas. “The Moral Imperative of Our Future Evolution“. Available at

[4] Rogers, Lois. “Scientists find way to make us slaves”. Times Online. October 17, 2004. Available at

[5] Ibid 2.

[6] National Intelligence Council/Central Intelligence Agency. “Global Trends 2015: A Dialogue About the Future With Nongovernment Experts”. page 9. Available at

“We should not imagine that people will just dabble in their evolution. Another generation will fan autoevolution into the all-consuming endeavor of the intellectuals, scientists and economists. The resources of the world probably will suddenly be shifted to this enterprise. Remaining “humans” will realize that they have been displaced from their former privileged status as the masters of destiny.” [3]

“…experiments conducted on rhesus monkeys have shown for the first time that animal behaviour can be permanently altered, turning the subjects from aggressive to “compliant” creatures.”The scientists did so by blocking the effects of a gene in the brain called D2, which cut off the link between the monkeys’ motivation and perceived reward. Humans have an identical gene. [4]

[1] ] Brzezinski, Zbigniew. Between Two Ages: America’s Role in the Technetronic Era
Penguin books, 1976

[2] “Outlook 2008″. The Futurist. Nov-Dec 2007.

[3] Cupp, John. “USJFCOM teams with Purdue University to add the human factor to war game simulations” United States Joint Forces Command. February 4, 2004.

[4] Chaturvedi, Alok Dr. “Sentient World Simulation (SWS): A Continuously Running Model of the Real World”. August 22, 2006.

[5] http://www.simulexinc.com/

Project: Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed – Dr John Hall & Dr Robert Duncan #Gangstalking #TargetedIndividual #Targetedtoo

Volume 2 details the CIA’s practices of interrogation and cybernetic mind control in their pursuit to weaponize neuropsychology. It covers the art of bio-communication war. Human beings are complex machines but their inner workings have been deciphered. Mind control and brainwashing have been perfected in the last 60 years. Hacking computers and hacking into individual minds are similar.

The 21st century will be known as the age of spiritual machines and soulless men.

About the Author

The Mind Hacking Strategy Group is a consortium of conscientious scientists who report the abuses of science. ROBERT DUNCAN holds multiple degrees from Harvard University and Dartmouth College in Applied Sciences and Business. He has worked on projects for the Department of Defense, CIA and Justice Department in his career. — SOURCE

Dr John Hall and Robert Duncan – Mind Security and Cybernetic Warfare PART1

Dr John Hall and Robert Duncan – Mind Security and Cybernetic Warfare PART2

The darkest places in hell are reserved for those who maintain their neutrality in times of moral crisis.   Dante

 

The Bigger Picture: Elites Plan to get rid of 2/3rd Worlds Population: Gangstalking Mind Control Non Lethal Weapons- Dr. Eric Karlstrom

The Bigger Picture: by Dr. Eric Karlstrom, PhD of https://www.gangstalkingmindcontrolcults.com/

2019-03-21 16_11_06-new world order at DuckDuckGo - Comodo IceDragon

I regard the late Dr. Rauni Kilde, former chief medical officer of Northern Finland, political insider, and author of “Bright Light on Black Shadows,” as perhaps the world’s leading expert on organized stalking and mind control. These essential insights of Dr. Kilde provide the much-needed context to help explain GISTAPWO-666 operations:

 

a) The elite have plans to get rid of 2/3 of the world’s population with electromagnetic warfare, chemical warfare, and psychological warfare.

b) The nations, and by extension, the secret services, militaries, etc., are the “plaything” of the (ETK: Judeo-Masonic-satanic) elite.

c) Mind control, MK, is listed as a “non-lethal weapon” by the military. This technology links the brains of people via implanted microchips to satellites controlled by ground-based super-computers.

d) All the US military branches are involved in developing this technology, in cooperation with civil institutions like the Department of Health, in what is known as the NEURAL NETWORK ASSOCIATION. At their 1991 conference, it was revealed that they submitted and endorsed over 1000 projects in brain-computer technology at 350 medical centers, universities, etc.

e) Cybernetics, full neurological control and communication, has been in use since the 1940s without the knowledge of the public. The objectives are behavior modification and influencing mental and bodily functions, processes, and emotions remotely through computer-satellite links.

f) Directed Energy (DE) weapons, mostly EMF (electromagentic frequency) and acoustic weapons, act on the psyche and the body of human beings and all living creatures. They have been called by many names: Psycho-physical weapons, weapons of information warfare, psychotronic weapons, cognitive weapons, neurological weapons, mind-invasive weapons, mind control and electronic harassment weapons, remote neural monitoring, active denial systems, weapons of electronic warfare, means of neuro-linguistic programming, means for behavior modification, means of influence technology, computerized brainwashing machines, devices to zombify people, means to induce mental and physical illness, means for hostile surveillance, people zappers, and weapons of mass destruction.

g) On July 21, 1994, the U.S. Department of Defense (DOD) proposed that “non-lethal” weapons be used against anyone engaged in activities that DOD opposed. That could include almost anyone.

h) The secret services and their sabotage and terror “departments” are the biggest “terrorists” in the world and work together with the mafia. That was the case even in World War II.

i) More crimes against humanity have been committed under the shield of “national security” than people can ever know…. possibly even more than the mafia.

j) Mass remote mind control of the population is achieved via the mobile phone network.

k) This is the main policy of the United States government.

Implications

The implications of the above statements, all all of which are documented on this website, are profound and staggering. They include:

1) The American corporate-military-intelligence complex’s fraudulent “War on Terrorism” and “National Security Enterprise” system comprises a multi-trillion dollar business. Its perpetuation requires the perpetual destabilization of domestic and foreign populations and continual creation and/or invention of foreign and domestic “enemies,” “adversaries,” “threats,” and “targets.”

2) The duly-constituted US government has effectively been overthrown. Criminals controlling the US government have scrapped the US Constitution and are waging war on the American people.

3) Through the use of incessant, fear-inducing propaganda and the GISTAPWO-666-organized stalking-electro-terrorism system, government leaders have successfully manipulated millions of American citizens into becoming “perpetrators” who stalk and terrorize their fellow citizens, thus effectively stage-managing a civil war.

4) America today is a fascist corporate-civil-military-intelligence-police state,

5) The US government is more or less indistinguishable from the international criminal syndicate that controls it. Veterans Today contributor, Dr. Preston James, Ph.D., identifies this group as the International Zionist Criminal Syndicate (IZCS). Thus, the U.S., like Russia and many Third World nations, is a “mafia state,”

6) The international criminal syndicate controlling America appears to be behind or at least co-extensive with the Illuminati-New World Order-UN-one-world-government antichrist system.

7) The leaders of this international criminal cabal have a long-term plan to genocide the majority of the population and to reduce the rest of us to mind-controlled slaves.

8) As noted, the late Dr. Rauni Kilde concludes: “Mass remote mind control of the population is (to be) achieved via the mobile phone network.”

9) Thus, among other things, “TCs” could be ‘beta tests’ for the remote, electronic torture, mind and behavioral manipulation, and possibly extermination of the population through the 5G-AI-IoT-internet-cyber warfare system. In 1979, Israel created Operation Talpiot to achieve wireless control over humanity through their control of these technologies.

Terminology Issues

The term “gang stalking” is an inadequate descriptor for this monstrously evil system. “Counter-intelligence stalking” better identifies its predatory inventors and primary perpetrators. Here, I often use the more comprehensive term, “GISTAPWO-666,” an abbreviation for “Global Intelligence-Syndicate, Secret, Satanic, Space-based, Surveillance, Stalking, Tracking, Targeting, Torture, Terrorism, Termination, Transhumanism And Psycho-Political, Policing-for-Profit, Psychotronic, and Psychological Warfare Operations.”

The terms “Targeted Individual” (TI) and “dissident” are also inadequate and misleading. Rather, we “Targeted Citizens” (TCs) are generally more accurately characterized as “truth-tellers,” “whistleblowers,” “peace activists,” “human rights activists,” “veterans,” retirees,” “Christians,” “patriots,” “constitutionalists,” “critics of government policy,” “individuals thought to represent a particular demographic group, ” i.e., just about anyone.

The Following Quotes Help Explain The Logic, Dynamics, and Perpetrators of the “Global Gestapo” (GISTAPWO-666):

1) “If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.”

-Joseph Goebbels, Reich Minister of Propaganda of Nazi Germany

Webmaster (ETK) Comment: Thus, if, for example, a full professor of Geography such as myself (the webmaster) proves in his websites that 9/11 was a false-flag, state-sponsored, synthetic terror event contrived by the U.S.A. and Israel; or that the “War on Terrorism” and “Man-Caused Global Warming” are fraudulent cover stories which mask totalitarian New World Order agendas, that person might be secretly placed on the “Terrorism Watch List” and become a “targeted citizen” (TC).

“I can pay one half of the working class to kill the other half.” 19th-century robber baron, Jay Gould

4) “Neuroscience captures $175 billion dollars annual market space…. The brain is the next battlespace…. We are targeting the brain…. We need to recon (the) target area (i.e., the domestic population) in order to: 1) acquire viable targets and 2) avoid collateral damage. Like (in) any race, the morbidity and mortality, going at this speed… is real.

We are tracking neurological or brain signatures of key targeted individuals that are thought to represent whole groups. If I understand how his or her brain works and do this on a broad enough scale, I can develop patterns and I can use this in ways that informs my intelligence; this force multiplies and synergizes my human intelligence (HUMINT), my signals intelligence (SIGINT), and my communications intelligence (COMINT). NEURINT (Neuro intelligence) coupled with assessment and access gives me these capabilities…. I can utilize neuro-pharmacologics and various forms of brain stimulation to extract information from key intelligence targets.”

-Dr. James Giordano, Professor of Neuroscience, Georgetown University, DARPA/U.S. Army Consultant Confessions of a High-Level Perp: Dr. James Giordano – Battlespace/Organized Stalking Applications of Neuroscience and Neuroweapons (2017 youtube lecture, my transcription and notes, and pdf)

5) “As a Targeted Individual, you are attacked by many forces from all sides. You are an enemy of the state. This is called Joint Targeting. This military strategy is described in these military documents. You are a MILITARY TARGET.

Joint Publication 3-60: Joint Targeting (Joint Chiefs of Staff, 2007) (pdf)
Joint Publication 3-60: Joint Targeting (2013) (pdf)
JP-3-60 Joint Targeting and US Targeted Killings (Joint Chiefs of Staff, 2013)

These documents describe how and why you are chosen as a Target. They even describe why your immediate and extended family is attacked as well:

“Target development always approaches adversary capabilities from a systems perspective. While a single target may be significant because of its own characteristics, the target’s real importance lies in its relationship to other targets within an operational system. A target system is most often considered as a collection of assets directed to perform a specific function or series of functions. While target systems are intra-dependent to perform a specific function, they are also interdependent in support of adversary capabilities (e.g., the electric power system may provide energy to run the adversary’s railroads that are a key component of their military logistic system). Target development links these multiple target systems and their components (targets) to reflect both their intra- and interdependency that, in aggregate, contribute to the adversary capabilities.”

Citizens Against Harmful Technology (CAHT)

Webmaster (ETK) comment: While the term, JOINT, here evidently refers to “Joint Chiefs of Staff,” Kay Griggs (M.A. in history, political insider, descendant of James Madison, Christian, and TI) offers a different definition worth considering in US Army is a Mind-Control Operation Run by Sexual Deviants:

Vietnam was really important because a lot of (mind control) experiments were done on boys (young soldiers) who went over there.

Joint mob-military partnership operations were conducted in Korea and Vietnam. At the highest levels of the Marine Corps and the Army in the Special Operations Forces, the individuals are all actually in the (Jewish) Brooklyn-New Jersey mob. My husband, General Al Gray, General Sheehan, Henry Kissinger, Caspar Weinberger… are part of a group of Zionists who came over from Germany. They do a lot of money laundering in the banks, cash transactions in the banks for the drugs they are bringing over. The military (personnel) are all involved once they retire. They go into drug and secondary weapons sales. It’s all about the “funny money.”

It’s Training and Doctrine Command, it’s NATO, it’s SHAPE (Supreme Headquarters Allied Powers Europe), started by President Eisenhower (a Jew). It’s a totally independent corporation. It’s main function is to sell weapons and launder money. It’s all being done by Army people who are now JOINT. The word JOINT is used to describe the people (Jews) who came over illegally to escape Nazi Germany… They are cowards and bullies….

You see the organized crime, the Meyer Lansky, the Jewish Kabalist group, who don’t believe in God, believe they have to get rid of all the good people… and they get brownie points in their little cult for doing that. They really do this. They are killing good people on purpose… All (American) Jews are automatically in the Israeli military.”

6) “Immediately after his public address to a shaken nation (after the staged, false-flag, state-sponsored terror attack of) Sept. 11, 2001, President George Bush (ETK: Yale, Skull and Bones, class of 1968) turned to his White House staff and gave them secret orders to allow torture saying: “I don’t care what the international lawyers say, we are going to kick some ass.” In the months that followed, administration attorneys translated the president’s unlawful orders into US policy by adopting three controversial neoconservative (Jewish neo-Trotskyite) doctrines (ETK: aka lies):

1) The President is above the law.
2) Torture is legally acceptable.
3) The U.S. Navy Base at Guantanamo Bay is not U.S. territory.

… (Then) the Bush administration began building a global gulag for torture at Abu Ghraib, Baghram, Guantanamo and half a dozen additional sites worldwide. In February, 2002, the White House assured the CIA that the administration’s public pressure to abide by the Geneva Conventions did not apply to its operatives and the White House also allowed the agency 10 enhanced interrogation (torture) methods designed by agency psychologists, including waterboarding.

…Through this total three phase attack on sensory receptors, cultural identity and individual psyche, Guantanamo perfected the CIA’s psychological torture paradigm. After regular inspections of Guantanamo from 2002 to 2004, the International Red Cross reported: “The construction of such a system cannot be considered other than a form of cruel, unusual, and degrading treatment, and a form of torture.”

Dr. Alfred McCoy: The History of Mental Torture in the U.S.A.

7) “The Vietnam war was the formative experience for a generation of CIA and military intelligence personnel involved in the Phoenix program. They viewed the military defeat in Vietnam as a betrayal on the home front, a loss of will by domestic political enemies, not a military failure against a nationalistic revolution fought as a guerilla war.

The Phoenix program, assassinating suspected VC (Viet Cong) sympathizers in a systematic manner, worked well and is the blueprint for the current black operation (aka gang stalking) targeting thousands of loyal Americans using state of the art microwave and radio frequency radiation weapons. The motivation to suppress domestic dissidents and to assassinate loyal American opposition stems from the perception of dissent against the war as treason. This philosophy is stated very clearly in the “Mind War” (1980) paper written by Michael Aquino.

The Department of Defense has a huge stake in futuristic technology that kills by ionizing and non-ionizing radiation, leaving little or no trace. The indiscriminate killing of the Phoenix program continues on American soil. The terms “soft kill,” “slow kill,” and “silent kill” refer to the new way of killing the enemy in conflicts short of war and in small wars of the future. The counterinsurgency doctrine has now been applied to the home front so that the perceived betrayal of the military in Vietnam will not be repeated.

The generation of CIA and military intelligence led by Ted Shackley, Richard Helms, (CIA Director) William Casey, Maj. John Singlaub, Richard Secord, Maj. John B. Alexander, Col. Michael Aquino, Paul Vallilee and others have built the perfect beast, using selective assassination that leaves no trace. The ability to cull the human herd with “silent kill” technology allows a few personalities to remake the entire society in their own image.

Extremely low frequency (ELF) technology slowly drives the target crazy with silent sound, similar to the CIA MKULTRA psychiatrist, Dr. Ewen Cameron’s, “psychic driving” technique, used to break down the target’s personality. The new buzzwords at the Pentagon are “synthetic telepathy” and “psychotronics.” Another means of attack on targets is the Smirnoff patent, that uses subliminal suggestion to manipulate human behavior. This patent was purchased by the remote viewing company, Psi Tech Corporation.

Military intelligence officers involved in developing these “non-lethal weapons” also control Psi Tech. Emotional manipulation is accomplished using Dr. Michael Persinger’s work to remotely project emotional states that the brain entrains or locks onto and emulates. One can broadcast rage or fear at an individual target to manipulate and control them. As if these methods were not enough to torture and murder people, add to this nightmarish toolbox, active gang stalking. CIA-created cults and other cause-oriented groups are used by actively harassing them in public in neutralization techniques described in counterintelligence operations manuals that are aimed at enemy agents.

In the race to develop a new weapon it has always been necessary to test it on human beings. Perfecting the latest weapons designed to kill slowly and silently as well as perfecting the process of controlling the human mind are no different. Once the weaponry has been perfected on these few thousand people, the same techniques will be applied en mass to the general population and then to humanity as a whole.”

https://www.gangstalkingmindcontrolcults.com/

TI Dr. Eric T. Karlstrom (ETK), Emeritus Professor of Geography, California State University, Stanislaus

Webmaster: Dr. Eric T. Karlstrom (ETK), Emeritus Professor of Geography, California State University, Stanislaus

Other websites maintained by webmaster include:

naturalclimatechange.org
911nwo.com
sanluisvalleywaterwatch.com
erickarlstrom.com

Gang Stalking, Mind Control, and Cults – Exposing and Defeating Organized Gang Stalking, Mind Control, and Cults – Webmaster: Dr. Eric T. Karlstrom, Emeritus Professor of Geography, California State University, Stanislaus
https://www.gangstalkingmindcontrolcults.com/

By Dr. Eric T. Karlstrom

Excerpts — a Must See site. Please, visit. — Lissa

The “big lies” of: 1) 9/11, 2) “Global War on Terrorism” – “National Security Enterprise,” and 3) catastrophic man-caused global warming/climate change are propaganda and coercive psychological (worldview) warfare deceptions designed to justify global military-police conquest and to impose totalitarian, world government (UN Agenda 2030). To achieve their long-sought Luciferic empire, Judeo-Masonic-Illuminati-satanists controlling the major nations plan to wage unconventional-electronic-psychotronic-cyber-netcentric-civil-military warfare against civilian populations. This “Fourth Generation” warfare deploys special operations forces and psychological operations groups of all military branches, all intelligence agencies, FBI, police, private security contractors, first responders, and civilian (“citizens on patrol”) and cult groups along with “total surveillance/big data,” Global Information Grid (GIG), A.I. supercomputers, psyops, satellites, directed energy/”nonlethal” and neuro weapons, Global Neural Network (hive mind), no-touch torture, and “man-machine integrations.” This system identifies, tracks, targets, and eliminates innocent civilians, whistle-blowers, critics of government policy, etc. who are secretly and extra-judicially classified as “threats”/”adversaries”/”enemies”/”terrorists,” etc. By 2030, elite planners expect this A.I. (Artificial Intelligence) warfare system to be fully automated and combine the above elements with 5G, the Internet of Things (IoT), SmartCities, Smart devices and the one-world brain; the internet.

Short Definitions of Gang Stalking, Mind Control, Cults, and GISTAPWO-666:

Gang Stalking:

Gang Stalking is the common term for military-intelligence protocols used by the US government, cooperating States, private security firms, and other groups to incrementally and systematically destroy persons secretly designated as “internal enemies.” Most “enemies” are invented to justify and perpetuate the phony, multi-trillion dollar “War on Terrorism”/”National Security Enterprise” system. Many are human trafficked and used as non-consensual human experimentees in military neuroweapons and nonlethal weapons testing programs. Synonyms for gang stalking include “Zersetzung” (German scientific term for “decomposition,” “disintegration,” “corrosion”), “counter-intelligence stalking,” “organized stalking,” “workplace mobbing,” etc. This system has been developed and deployed over the past century by “security services;” including the Soviet Cheka and KGB, the East German Stasi police, MI6/CIA/NATO’s Operation Gladio and “Stay Behind Armies” in post-WWII Western Europe, and in the FBI and CIA’s COINTELPRO (“counter-intelligence program”), MKULTRA, MHCHAOS and Phoenix Programs, among others.

Gang stalking protocols incorporate covert “soft torture” psyop techniques with electromagnetic (psychotronic) weapons that harass, torture, manipulate, and eliminate “targets”/”adversaries.” This global operation is here termed GISTAPWO-666; for “Global Intelligence-Syndicate, Secret, Satanic, Space-based, Surveillance, Stalking, Tracking, Targeting, Torture, Terrorism, Termination, Transhumanism And Psycho-Political, Policing-for-Profit, Psychotronic, and Psychological Warfare Operations.” Today, GISTAPWO-666 is a key component of the totalitarian, UN Agenda 21 (Agenda for the Twenty-First Century) and the U.S. military’s “New (“Unconventional”) World War” cum “full-spectrum dominance” of planet earth.

Global Gang Stalking operations (GISTAPWO-666) deploy essentially the same personnel, technologies and objectives as JADE HELM and UWEX, the massive multi-state US military drills for “dissident extraction” carried out in 2015 and 2016. These “assymetrical,” “unconventional,” network-centric warfare” “civil-military operations”/”Military Operations Other Than War” are carried out by 1) all military branches and their Special Operations Forces and psychological operations groups, 2) CIA, FBI, DHS, NSA, FEMA, etc. 3) local, federal and state police, 4) private security contracting firms, and 5) many sectors of the civilian population. Each operation also deploys: 1) GIG (Geographic Information Grid) satellite system, 2) AI-supercomputers, 3) “big data” derived by NSA surveillance, 4) the wireless smart phone-cell tower communication system, and 5) psychological operations (psyops), and 6) use of plainclothes military and civilian actors, “surveillance role players,” “crisis actors,” etc.

And each of these operations involve secret targeting of citizens who have been extra-judicially designated as “enemies of the state”/”enemy combatants”/”domestic terrorists.” These citizens are secretly placed on black lists such as the “Terrorism Watch List,” “Main Core,” and FEMA Detainment Lists. Like Operation 9/11, which provided the pretext for these treasonous activities, these black, “wet” operations are unconstitutional and illegal. We may speculate that these operations are prelude to: 1) imposition of martial law and a totalitarian police state in America and perhaps worldwide, and possibly 2) mass genocide, as called for by UN Agenda 21 documents.

Mind Control:

Since WWII, scores of top-secret mind control experiments and programs, including Projects MKULTRA, Bluebird, Artichoke, Chatter, MKOften, MKDelta, and MKSearch, have (and are still being) conducted by the CIA and the US military in conjunction with psychologists, psychiatrists and cognitive/neuro-scientists at universities, medical facilities and military bases across America. These programs build upon prior research done at the Tavistock Institute in England, in Nazi and pre-Nazi Germany, and elsewhere. They commonly involve the use of non-consenting and unwitting civilians in “terminal experiments.” The principle goal has always been twofold: 1) to “get control of an individual to the point where he will do our bidding against his will and even against such fundamental laws of nature such as self-preservation” (wording from original 1953 MKULTRA documents), i.e., creation of programmed multiple personality “Manchurian Candidates”-mind-controlled assassins, and 2) to create a “pscyho-civilized” (aka “mind-controlled,” bio-robotized) society. To achieve these ends, all manner of chemicals, biologicals, drugs, electro-shock, sleep and sensory deprivation, brain implants, electromagnetic frequencies, and torture techniques have been tested on human subjects.

Cults:

In recent centuries, intelligence services have created innumerable cults, including the Rosicrucians, Freemasons, Illuminati, Theosophy, Mormonism, and a host of UFO, New Age, Christian, and Satanic cults, including Scientology, Jonestown, Children of God, Heaven’s Gate, Church of Satan, Temple of Set, Branch Dividians, etc. These cults are mini-totalitarian systems that provide cover for controllers to advance various secret agendas, including subjugation of cult members through coercion, mind control, traumatic abuse, forced and slave labor, etc. A look at “deep politics” reveals that the “master cult” is the Judeo-Masonic-Illuminati, a satanic cult based on the black magic system of the Jewish Kabbalah. The long-term plan of the “slave masters,” as spelled out in the Old Testament, Talmud, Kabbalah, “Protocols of Zion,” and the Communist Manifesto” among other documents, is global dominion. The phrase, “Tikkun Olam,” Hebrew for “reinvention or repair of the world,” refers to the coming Jewish world empire- the Jewish Utopia. Under Noahide Law (Jewish law for gentiles), all non-Jews (goyim) would be robbed, robotized, enslaved, and/or genocided.

GISTAPWO-666:

The following 13-minute video by DJ Welsh of Level 9 News explains GISTAPWO-666’s larger context. The US government/Pentagon is implementating a computer-driven “autonomous warfare system” designed to achieve “full spectrum dominance of the human terrain.” This system regards civilians as “combatants” and “human inventory items,” identifies desirable and undesirable groups and individuals, and deploys “electronic warfare” (EW) and “man-machine integrations” to target and remove “undesirables” in order to “master the human domain.” TCs (“targeted citizens”) are being targeted by this system.

In “YOU Are THE ENEMY” (2014), Preston James, Ph.D., of “Veterans Today” identifies America’s rulers as the International Zionist Criminal Syndicate (IZCS). In Revelation 2:9 and 3:9, Jesus Christ refers to this system as the “Synagogue of Satan.” Their goal, in my opinion, is to implement fascist, one-world government/UN Agenda 2030 under the transhumanist, antichrist-BEAST system. The interests of the American people, the American constitutional republic, and humanity itself may be best served by filing a class action lawsuit against the U.S. government. For further information, insights, and clarifications please refer to the nearly 900 posts on this website:

Introductory Statement to “TCs” (Targeted Citizens) and Others:

If you are a “Targeted Citizen” (TC) (aka “Targeted Individual” (TI)), you have been secretly and extra-legally designated by unknown and unaccountable persons as an “enemy of the state.” The full resources of the State, including the civilian sector, are coordinated by the Department of Homeland Security (DHS) and the FBI to slowly, silently, and secretly torture, terrorize, and kill you. In other words, the Federal-State bureaucracy collectively termed the “Interagency,” which includes the military, intelligence, paramilitary (police, private security and intelligence firms), academic, legal, and civilian sectors, is waging psychological, chemical, and electronic warfare against you. (See: “New World War; Revolutionary Methods for Political Control” by Mark M. Rich, 2011).

As “enemy of the state,” you are a non-person, very much like the “detainees” at Guantanamo Bay and the Palestinians. Your constitutionally-guaranteed civil liberties and due process of law have been (illegally) stripped. You have been secretly enrolled in a highly covert program that intelligence services have developed over the past century to terrorize and eliminate political enemies, foreign spies, heads of state, journalists, “dissidents,” critics of government, activists, etc. Unbeknownst to you, your name probably appeared on a classified, secret blacklist, such as the “Terrorism Watch List,” before your targeting/torture began. Bottom line: Officially, you are now an “it,” a “target,” and no longer a legal person.

Rather, you are an (illegal) “covert operation” to be executed by military, intelligence, civilian, and any number of non-governmental agencies on behalf of the State. You are a potential “contract” for thousands of private security firms such as the FBI-spinoff, InfraGard, and the Israeli Mossad-spinoff, Black Cube. These and other mercenary and organized crime groups partner with the U.S. government, FBI, DHS, CIA, police agencies and others to wage the phony “war on terrorism” against you and millions of other innocent civilians worldwide. You may also be a non-consensual human guinea pig in one or several of the innumerable DARPA-Pentagon-funded weapons-testing and mind control programs and experiments now being carried out secretly and globally which involve hundreds to thousands of neuroscience-psychology-biology-computer science departments at universities and medical facilities.