RAMOLAD | FEMA HDS WHISTLEBLOWER Celeste Solum | BREAKING NEWS: Havana Syndrome in Public Cognitive Warfare Next? (Newsbreak 143) Feb 21, 2022

Feb 21, 2022: Newsbreak 143 | Celeste Solum | BREAKING NEWS: Havana Syndrome in Public Cognitive Warfare Next?

Explosive information from military sources suggest Havana Syndrome on a large scale may be headed the public’s way, the intention insidious neurodamage as evident in the cases of diplomats and spies apparently caught in a hot war involving many countries, says Celeste Solum.

The Human Target – Directed Energy Weapons and Electronic Warfare [Video] — OUR GREATER DESTINY

The Human Target – Directed Energy Weapons and Electronic Warfare [Video]

Neural rape, assault on people’s bodies and brains developed from classified military technology

By Suzanne Mahar [Targeted individual, Canada]

A subject that is getting more and more attention from people all over the world is deliberate electromagnetic targeting of people.  A neural rape or assault on people’s bodies and brains developed from classified military technology.  More often now, people are valiantly speaking out about being a “Targeted Individual”.

This is a subject that has not surprisingly received little to no attention from the corporate owned media. It is disconcerting enough that the world is now saturated in dangerous elf/ulf/vlf/rf/  and so many other types of frequency waves which permeate our bodily tissues causing serious degradation of our health.  There is also a Military Intelligence Program that is gaining world wide recognition which uses these “smart grid” frequencies to target individuals.

Electronic Warfare and the Targeted Individual

Electronic warfare is defined as any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum to attack the enemy. The Navy calls this “electromagnetic battle management”. Who would  that enemy combatant be; a person or persons that is seen as so seemingly dangerous or threatening to the power structure?

That enemy would be you and I….

For those unfamiliar with the term “TI or Targeted Individuals”, it is important to note there are different methodologies that the functionaries or agents apply to targeted individuals carried out by various government programs or agency initiatives.  This article discusses individuals targeted by; remote neural monitoring, mind control,  brain mapping, gang stalking, implants, voice to skull technology (V2K) which beams frequencies into the head, and nervous system manipulation 24 hours a day.  Targeting can be covert, or overt.

This classified technology has been created by governments and military and used on its own citizens. Helpless citizens which have been victimized by BILLION DOLLAR government funded technology designed for quiet wars, to create harm. What the powers that be are looking for is RESPONSES, which they can track, measure and log.  This in effect, is an omnipresent electromagnetic gulag in the privacy of your own home, workplace, or streets.

Funding for many experiments has been provided by the United States Government, particularly the United States Military, the Central Intelligence Agencies and private corporations involved with military activities. These human research programs have been highly secretive, and in many cases information about them was not released until many years after the studies had been performed. After the incidents are exposed, the standing President is trotted out to issue a counterfeit apology, as if apologies somehow make up for the destruction of lives.

Targeting can be done by radio-frequency weapons, high powered microwave technology and acoustic technology.  These are deliberately orchestrated attacks and TI’s will suffer from these assaults even when exposure to frequencies are reduced. Some TI’s report that the constant barrage of electromagnetic radiation also brings with it multiple chemical sensitivity.

Unethical human experimentation has been conducted on citizen  for decades, and we have seen large swaths of the population being subjected to cruel and inhumane treatment, often the sick and vulnerable and economically depressed.

One example of  this unethical government research was the classified human radiation experiments conducted on over 4,000 innocent American citizens during the Cold War.   These and a number of other clandestine human experiments are discussed in this article by Alan R. Cantwell Jr., M.D.

THE HUMAN RADIATION EXPERIMENTS —  How scientists secretly used U.S. citizens as guinea pigs during the Cold War

http://whale.to/a/cantwell9.html

The elites have their warfare covered,  microwave targeting is one more assault on our individual person hood. Mutagenics, transgenics, epigenetics, endocrine disrupters, free radical and radiation damage. When we now look at our world we see the multi pronged attack of the chemical spraying of our skies, genetically modified food stuffs, vaccines, fluoride and “microwave targeting of peoples”.

Our bodies and brains may be accessed to harass and torment us in  the New World Order and Smart Grid Infrastructure.  We the people are guinea pigs of technology and test subjects for many government experiments.

Project Pandora is an early example of a U.S. Government microwave experiment on animals from 1965 to 1970;

http://www.topsecretwriters.com/2013/09/project-pandora-and-us-government-microwave-experiments-on-animals/

The use of hidden directives such as ‘DOD Directive 5240.1-r – Procedure 13 Human Experimentation for Intelligence Purposes’ allows for the testing and evaluation of any technology on any U.S. Person and those foreigners living on U.S. soil. This ‘directive not law’ has been unethically and inhumanly passed from agency to agency and contractor to contractor resulting in TORTURE TESTING ON HUMAN BEINGS (defined as U.S. Persons).

Anyone who is part of the new media, the truther movement, or a front line activist, will most likely have experienced some kind of targeting.  The general population at large is also subjected to microwave targeting.

We all have been sprayed with micro processors, micro sensors, nano bots, smart dust, etc., from the chemical engineering of our skies and the manipulation of our weather.  Nano is a Greek word which means “Dwarf”.  A nanometer is a billionth of a meter and this tech is so  small it can fit inside a blood vessel, our bodies and brains have no firewall against this nano technology .  It is simply a matter of “activating or turning on” the Program that has been implanted in our bodies with the use of frequencies or DEW’s. We are all vulnerable to this type of attack and some TI’s have had implants show up in various scans and x-rays.  Implants are capable of transmitting voice signals, high voltage pulses, emitting a small tracking beacon signal, or other unspecified uses.

This technology which is networking inside us, is the Program which allows the powers that be to have full scale access to our brains and our bodies to manipulate as they wish. This is the New World Order System of Artificial Intelligence, Smart Grid Infrastructure and The Internet of Things. The engine the world is now running on is derived on the premise of “keeping the Program in tact”.  Attempting to separate us from consciousness and severing our neural network.

With the advent of 5G technology, microwave radiation will be increased exponentially using small millimeter waves small cell deployment. This could mean wireless antennas on every lamp post, utility pole, home and business throughout entire neighborhoods, towns and cities   It does this by using largely untapped bandwidth of the millimeter wave (MMW), which is between 30GHz and 300GHz, as well as some lower and mid-range frequencies. GHz is a unit of frequency equal to one billion hertz.  Humans oscillate at approximately 7.83 hertz otherwise known as the Schumann Resonance.  Since our bodies resonate at a very low hertz, they simply cannot handle the inundation of this microwave technology. A bodily inferno created by an unregulated, unapproved, lay it down everywhere tech. Moreover, with this updated 5G tech,  it will allow the Program now being activated in our bodies to take on a much more aggressive role, because the AI feeds off these frequencies.

Dangers to the human brain and body from electromagnetic radiation are immeasurable, the scale is so large. Dr. Elizabeth Plourde of  emffreedom.com says that; “We can  liken this assault to being machine gunned.  All of our cells are getting holes and leaking, our blood brain barrier is getting holes and leaking and our gut is leaking. “

Electromagnetic and Radiofrequency Fields Effect on Human Health

https://www.aaemonline.org/emf_rf_position.php

Artificial Intelligence and Mind Control

The Artificial Intelligence Program can and will induce anything it wishes. It can be a disease, emotional distress, brain targeting, genital targeting.  Our moods and emotions are being manipulated and controlled through Artificial Intelligence and work in concert with these frequencies.

Ask yourself when you feel lower vibratory emotions of; disgust, fear, anger, violence, sexual thoughts, jealousy, etc., are these my own emotions, or implanted emotions through these frequencies and the AI technology?

The frequency hit will induce a physiological, emotional, physical response, attacking brain waves. Unless people know about Targeted Individuals and the Artificial Intelligence Program, they will not understand these invasions. The Artificial Intelligence is overriding us and our cellular matrix. The program can do virtually anything it wishes.

 

Mind control is a frequent  report from targeted individuals. Torture is also a frequent report from TI’s. Many tactics and means are employed.  There are a number of ways to target individuals; electronic telepathy, microwaves and electromagnetics, holography, lasers, radio frequency energy beams, satellites, and radar to name some. Targeting of people in this manner using directed energy weapons will prompt extreme distress and may lead to get them diagnosed as schizophrenics so they will be marginalized and maligned by friends, family and community.

One well known individual targeted with directed energy weapons is Dr. Katherine Horton;

https://www.youtube.com/watch?v=WB5uhlvYdiI

This is silent, encroaching warfare, dripping like a slow running faucet, and many find it difficult to come to terms with the fact that it actually exists and our governments would be criminal enough to use it against populations. This experimental warfare is done under the cloak of National Security, which is always a cover for plausible deniability.

Elana Freeland, author and researcher of the book “Chemtrails, HAARP and the Full Spectrum Dominance of Planet Earth” has in depth knowledge on the subject of targeted individuals.  She personally knows a number of TI’s and also ghost writes for some.

Freeland discusses in her very detailed essay Directed Energy Weapons For Political Control, in Nexus Magazine, “The Non-Lethal’s” You Don’t Hear About, and says this; “Then there are the EM weapons that are even less public because they are used covertly for political control in quiet war against populations, dissidents and individuals displeasing to various powers that be.  Examples include laser systems (free electron, x-ray, neutral particle beam, chemical oxygen iodine, mid-infrared advanced chemical laser, etc.) delivering blurred vision and holograms, ion-beam plasma and augmented reality mind control delivered by satellites that first track targets via their bio-energetic signatures and then couples plasma with their EM fields; and of course non aural carriers that directly induce silent, subliminal messages into the brain, often known as voice to skull (V2K) or synthetic telepathy.  In line with Cold War secrecy and deceit, thousands of non consensual human subjects have been used for target practice of weaponized electromagnetics.”

Freeland goes on to say; “In homes and walls, offices across the nation millimeter wave scanners are penetrating walls, looking for target brains for microwave transmitters to beam specific mood inducing excitation potentials into. Other people in the room will be oblivious to the fact that an excitation potential for suicide or murder is resetting the brain of their friend or relative for depression or rage.  (This technology may have been behind the “suicides” of political activist Abbie Hoffman, singer Kurt Cobain, journalist Gary Web, etc., etc.,”)

U.S. Patents also attest that the capability is there to target individuals with frequencies;

Nervous system manipulation by electromagnetic fields from monitors
US 6506148 B2

https://www.google.com/patents/US6506148 

“Voice to Skull” Microwave Device – U.S. Patent 4,877,027

Thank you to Clyde Lewis of Ground Zero for this photo depicting how Voice to Skull Microwave is used:

Extremely low frequencies and microwaves can cause agitation in humans and these frequencies have been known to cause serious illness and eventual death. Moreover,  mind control through sound wave technology would be the ultimate non-lethal weapon; stealth warfare. Remember, this experimentation is to log, monitor, track and assess an individual’s response to this electronic harassment.  The Orwellian Nightmare come to fruition.

It’s clear that we have a shadow government that is puppeteering  this psychotronic fantasy. In a book written by Zbigniew Brzezinski (co-founder of the Trilateral Commission), entitled Between Two Ages: America’s Role in the Technotronic Era published in 1970, he writes;  “Speaking of a future at most only decades away, an experimenter in intelligence control asserted, “I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.”

The elites and their minions have been marching to the beat of their “Brave New World” for decades.

Torture: Physical, Mental & Psychological

TI’s suffer enormously and some common health related issues that TI’s deal with are listed on Targeted Individuals Association;

http://targetedindividualsua.weebly.com/ti.html

Direct pain in the body that tends to get worse and more severe, pain the in the spinal cord or back, lethargic and aching pains, pain in the back of the head, pain in the amygdala or the limbic system, pain in the forehead or front lob, cooked brain (slight heating of the brain to induce synthetic emotional states or stress disorders, electroshocks in the brain, involuntary body movements caused by nervous system attacks, pain the the chest, palpitations and adrenal rushes, toothaches, gum bleeding, mild heart attacks, pain in vital organs, electronic sexual “rapes” during sleep or while awake, are just some of the torture tactics TI’s have to endure, notwithstanding the mind control, surveillance, isolation and vilification from society.

 

One individual who has been electronically targeted is Robert Stanson.  Stanson [pictured here] has been targeted for over two years.  The targeting has created havoc and upheaval in his life.  He was targeted neurally and genitally to the point of extreme discomfort wherein he couldn’t stand comfortably in one location.  He would experience sharp jolts to the head, heart palpitations, acute pains to the body, stomach distress and fear of going out in public.  Stanson’s quality of life was sharply declining and he took proactive counter measures to battle the assaults.  TI’s are left to their own devices to find ways to battle this weaponry since the health/police/judicial communities have long since abandoned the people they serve and collude with those harming us.

Stanson developed a Reverse Polarity Helmet and Anti Polarity Cup, in effect, fight frequency with frequency.  Jam the attacks being directed at him.  He states that he has slowly worked up to wearing his helmet daily, and states the targeting has measurably decreased and is able to sleep through the night, thinks more clearly, and negative lower vibratory emotions have ceased.  He can now reach a comfort state with a marked amelioration in symptoms.  The helmet and the cup are very good ideas to protect our DNA and genetic code.

More and more TI’s are standing up against these assaults and finding ways to help mitigate the devastating impacts the targeting has had on their lives. The items Robert has created, corroborate with other researchers and their technologies like Health Researcher Tony Pantalleresco’s  Electromagnetic Frequency Pulser that can also jam the frequency attacks .

Please watch Robert’s you tube videos to make the helmet and the cup.  If you are dexterity challenged, Robert will make the items for you.

How To Make the Reverse Polarity Magnet Helmet:

https://www.youtube.com/watch?v=KabgGmMuVjo

This is “The Bugsweep’s Electrostatic Active Shield System” which protects the targeted individual from directed energy attacks. The transmission panels emit an electrostatic energy that forms a protective field. Any directed energy attack is deflected off this energy field giving the targeted individual the ability to get on-going relief.

 

There are also well written books exposing this targeting, such as; Guinea Pigs Technologies of Control authored by Dr. John Hall,

https://www.amazon.com/Guinea-Pigs-Technologies-John-Hall/dp/163135552X

Well known MK Ultra survivor and CIA Mind Control Slave, Cathy O’Brien in her book “Access Denied For Reasons of National Security” wrote about the agenda that Cheney, Bush, and other global elite ushering in the New World Order totally believe in; the plan mapped out by Artificial Intelligence. They were allowing Technology to dictate global control.  “Life is like a video game,” Bush once told me at the rural multi-million dollar Lampe, Missouri CIA mind control training camp complex designed for Black Ops Special Forces where torture and virtual reality technologies were used. “Since I have access to the technological source of the plans, I dictate the rules of the game.”

These actions are HUMAN AND CIVIL RIGHTS ABUSES, and all equate to HUMAN TORTURE of millions of citizens TODAY.

This experimentation and torture is very real and very painful. We cannot be free while hooked up to a monitor and  surveyed, tracked, monitored and assessed.  We know mind control harassment through covert and overt practices is a program designed to create apathy, distress and ill health, while stifling spiritual evolution.

The Nuremberg Code was created to protect people after World War II from government malfeasance and precisely this type of silent weaponry.  This is a sea of bio energetic torture that we cannot see, taste or smell.  How do we fight an invisible enemy and their acts of war against their citizens? Should these inhumane torturous acts be allowed to continue to genocidal proportions?

We are now knee deep in World War III, although many still cannot see it, the AI program is now overriding cognitive thought and intellectual rationalization. People find more comfort now with their cellular devices than human companionship. Socialization, intimacy and communication have been replaced by the wireless tentacles threatening to subsume our human existence.  This must change so we can evolve and see the “big picture” and what the elites have designed for humanity.  The power structure is silently attempting to disarm us psycho spiritually, cognitively and physically through this electromagnetic warfare.

Sun Tzu a Chinese general, military strategist, and philosopher stated that; “The supreme art of war is to subdue the enemy without fighting”.

It’ s up to us, we the people to step back from this technological prison and become fully aware of the dictates of the NWO game and the secret government operations that are using technology against us.  Once we understand their game we can assume spiritual and physical healing.  Truth and wisdom is our path to reconciliation and peace.

We need to recognize exactly what these frequency attacks are doing to us and look within and apply vigilance and healthy coping mechanisms. We do have the power and the counter measures to reject these attacks and assimilation.  We must bring these crimes to light.

Thank you to all the TI’s and individuals sharing their stories and helping educate others about this subject. 

*********

About Susan Maher: She is the founder of ByeByeBlueSky.com, an anti-geoengineering activist, researcher and blogger. She devotes all her time to educating people on these deadly programs and believes it is everyone’s moral, social and ethical responsibility to awaken others to geoengineering (and programs beyond) and to do something about them. She does many forms of outreach to communicate her message such as; educational social media sites, hosting public events, awareness sessions, interviews, speaking engagements, and has launched over 20 awareness billboards across North America communicating Bye Bye Blue Sky’s mission.

The Liberty Beacon Project is extremely pleased to have Susan as a Contributing Writer.

Visit ByeByeBlueSky.com

Visit ByeByeBlueSky Facebook page

From Doreen

Solutions

Weaponized technology is a silent weapon used to manipulate, control, and assault the human body/mind. Remedy requires action by a critical mass of people to end the war against Infinite Creator; the only Power to restore our lives and home planet.

Silence empowers globalists to do as they please because by Maxim of Law: ‘He who fails to assert his rights has none’.

Pure light of truth is extraordinary Power to end this war by disclosing the root cause of increasing illnesses, perpetual war for profit, engineered chaos, migrant crisis, firestorms, weather wars, etc. and the fact that in law nothing supersedes the will of the majority of the people when it comes to governance.

WORLD
Public Private Partnerships [P3s] are being set up by globalists to ensnare countries under globalism [dictatorship]. Privatization will destroy the structure of governments representing the people and put profits and resources in the hands of private interests.

https://ourgreaterdestiny.wordpress.com/2018/08/24/water-for-life-not-privatization-and-profit/

CANADA
A process to legally and peacefully take back final decision making authority from de facto governments at all levels. https://ourgreaterdestiny.wordpress.com/2018/07/11/the-people-solution-come-to-power/

USA
Military leadership is rightfully subordinate to civilian authority: http://armedforcesjournal.com/limits-to-civilian-authority.

1] A legitimate civil authority in de jure capacity and compliant with the United States Constitution instructs the military to defend the people first and foremost and enforce the law. A legitimate civil authority could be the Mayor of a city or

2] The majority of people [over 50%] demand the United States military defend the people first and foremost and enforce the law.

Sincerely,
Doreen Ann Agostino
[c]
Without Prejudice and Without Recourse
http://freetobewealthy.net

Neural rape, assault on people’s bodies and brains developed from classified military technology By Suzanne Mahar [Targeted individual, Canada] A subject that is getting more and more attention from people all over the world is deliberate electromagnetic targeting of people. A neural rape or assault on people’s bodies and brains developed from classified military technology. […]

via The Human Target – Directed Energy Weapons and Electronic Warfare [Video] — OUR GREATER DESTINY

Banning Hidden Weapons of Mass Coercion & Depopulation: Direct-Energy Weapons for Political Control

dire.png

Courtesy of Elana Freeland

She writes:

“Antipersonnel weapons euphemistically known as “non-lethal” weapons include sonic, phaser… psychotronic scalar wave and infrared weapons—any of which might be wheeled into any neighborhood…”

We have major problems — we’re up against tyrannical olgarthy’s, totaltariun military (US, yes) and UK and the rest of the 5+ nations who will stop at nothing from Chemtrails, Cellphones & deadly Celltowers, biological’s sprayed down on us to military-mm 5G grade and the deadly smartmeters and NSA listening to everyone… who work for TPTB who want all of us gone.– Lissa
Quote from Elana’s blog:
In his “Citizen Smith” blog, researcher Paul Baird described the process this way:
“Human thought operates at 5,000 bits/sec but satellites and various forms of biotelemetry can deliver those thoughts to supercomputers in Maryland,
USA, Israel, etc. which have a speed of 20 billion bits/sec each. These, even today, monitor millions of people simultaneously.
Eventually they will monitor almost everyone…worse than any Orwellian ‘Big Brother’ nightmare you could possibly imagine, only it will be a reality. Yet our world leaders, who know this, do nothing.
“…Usually the targets are aware their brain waves are being monitored because of the accompanying neurophone feedback. In other words, the computer repeats (echoes) your own thoughts and then the human monitors comment or respond verbally.”
“Both are facilitated by the neurophone.”
brain
Excerpt:
Cognitive Warfare
When Senator Church referred to “this agency [the NSA] and all agencies that possess this technology” in 1975, he was not just thinking of the NSA, CIA and FBI but the Defense Intelligence Agency (DIA) as well. The “asymmetric” “Revolution in Military Affairs” has always included cognitive warfare that utilises “strategic personality simulations” (multiple personalities) created by MK-ULTRA for varied covert missions. The
cognotechnology of nanotechnology, biotechnology and information technology has
always been front and centre.
Intel operatives are traumatised and electroshocked to erase memories, US Navy SEAL
assassins are brain-wiped, soldiers are injected with intelligence-manned interface (IMI) biotics so that 20-billion-bit/second NSA supercomputers can track them.
It doesn’t take a rocket science degr ee to see that remote satellite tracking and over-the-horizon technologies are not just about “terrorists”. and see and hear what they experience with a remote monitoring system (RMS).
Now, the line between civilian and military has been erased and we are all living in the battlespace. Private security firms, mobsters and lowlifes contracting with the intelligence community are doing its dirty work so that congressional oversight can be avoided.
————————————————————-
In 2001, HR2977, the US Space Preservation Act of 2001 was introduced into Congress to
ban all directed-energy weapons (DEWs). After several rewrites, it failed to be passed.
• In 2002, the United Nations Institute for Disarmament Research formally listed a new category of weapon of mass destruction: Psychotronic Mind Control and other Electromagnetic Resonance Weapons.
—————————————————————–
As former US Navy engineer Eleanor White writes:
“For the first time in history, one human being, from hiding, at a distance, can control the thoughts and actions of another by way of undetectable hypnosis, using still-classified electronic technology. These devices have totally disabled the world’s justice systems… Zero-evidence weapons make revenge crimes routine and easy.”

Loss of freedom of thought means much more than the loss of a republic. It means the loss of civilisation and what it is to be human .

These costs of sleeping in our chains of comfort and convenience are too much to pay.
———————————————————————-

The 5G Call To Action Community Summit peaceinspace.org, “Banning Hidden Weapons of Mass Coercion & Depopulation.”

5G / Internet of Things (IoT) a DEW system in contravention of the 4th Geneva Convention and International Criminal Court Treaty ratified by 118 nations, excluding the U.S., Israel, Russia, China, and Iran.

Alfred Lambremont Webre, a targeted individual (TI) himself, dedicates the presentation to the Princess Diana (1961-1997) who on January 15, 1997 protested for the 1997 Ottawa Land Mines Treaty by walking onto an Angola active minefield. Diana was assassinated seven months later on August 31, 1997 (sacred to Hekate, goddess of witchcraft).

#NewWorldOrder #Surveillance State: Building The All-Seeing Eye: Project L.U.C.I.D. #NWO

PROJECT L.U.C.I.D.

The Beast 666 Universal Human Control System has been designed and is being implemented in America and throughout the world. We knew it was coming. Now it’s here, and soon, there will be no place left to hide. By the year 2000, Big Brother’s evil, octopus-like tentacles will squeeze every ounce of lifeblood out of the people. A nightmarish, totalitarian police state is at hand.

That is the thoroughly documented message-and momentous warning-sounded in this book. Do not for an instant think that you and your loved ones can escape the monstrous behemoth which lies in our path. Once Project L.U.C.I.D. is fully operational, every man, woman, and child will fall under the power of its hideous, cyber­electronic grasp — PROJECT L.U.C.I.D.
http://www.universe-people.com/english/svetelna_knihovna/htm/en/en_kniha_project_lucid.htm

Quote: “Few symbols have triggered as much controversy in contemporary culture as the “all seeing eye” within the triangle or pyramid. The occult symbolism of this enigmatic emblem has been a great catalyst for philosophical, religious and political debate. Conspiracy theorists (and sometimes religious intolerants) like to point to the “Eye in the Pyramid” in the Great Seal of the United States and on the U. S. Dollar Bill as being evidence of some vast conspiracy. In a world where e-mail monitoring, mass telephone wire-taps and global video surveillance is commonplace, the eye of “big brother” appears to be everywhere and takes on new meaning. Little wonder that conspiracy speculation has moved out of the realm of fringe theory and is fast becoming a main-stream concept.” –– Source: The Eye within the Pyramid
https://www.tekgnostics.com/Eye.htm


pyra-eyeQuote: In modern society where God has been replaced with science and government legislation takes the place of divine law, the all-seeing eye is usually equated with authority and surveillance. This interpretation can be seen in the logos of organizations such as DARPA in the US (Defense Advanced Research Project Agency, founders of the internet) and MI5 (British intelligence) to name just a few. Both of these organizations could be considered the all-seeing eye of their respective governments. 

         from The Fool’s Philosophy

Quote: All your cell phone communication are recorded. Your television not only recognizes you by scanning your facial structure, it can transmit images of your every action in the living room to a remote server. Your coffee maker records all of your kitchen conversation for storage in an off-site database. If this sounds like the vision of a future tyrannical society from a sci-fi movie, it’s not. It is the present. All of this technology exists and is being implemented and is working to truly construct the Illuminati’s Satanic “All-Seeing Eye” of Lucifer. This article will show how through the New World Order, Satan will use technology to help him try to match God’s power and set up the world for the coming Antichrist.

Satan’s aspiration in the Bible is to be just like God. Isaiah 14 details the 5 points of Satan’s original plan to rebel against God:

— Source: https://beginningandend.com/illuminati-surveillance-state-allseeing-eye/

However:

The all-seeing eye is a symbol of divine omniscience or sinister influence depending on how it is used. In this second article tracing the history of this symbol we will delve into its use over the last 200 + years which takes this pristine positive symbol to its increasingly malevolent use and implications.

— Ref. The All-Seeing Eye: Modern Use of a Hijacked Symbol – The Conscious Reporter http://consciousreporter.com/conspiracy-against-consciousness/corruption-sacred-symbols-all-seeing-eye-part-2/

The Magnitude and Dimensions of Project L.U.C.I.D..  

Consider the unbelievable magnitude and dimensions of Project L.U.C.I.D.. First, it mandates that every adult and child-even newborn babies-be issued a universal biometrics I.D. card. A “Smart Card” with an advanced computer microchip, this powerful, reprogrammable I.D. card will store millions of bytes of information about the recipient-his or her photo, fingerprint, footprint, iris (eye) scan, DNA genotype, human leukocyte antigen data, financial status, and personal history.

Oh yes, the I.D. card will also be coded with numbers. One will identify the individual card holder. Another, I believe, will eventually constitute the number 666. The number 666 will signify the hellish master responsible for the devilish invention of this Universal Biometrics Card and its interlocked, computer network.

L.U.C.I.D.. establishes a massive, Big Brother, computer database of unparalleled, invasive power. Millions of bureaucrats employed by a hidden, SS Gestapo estab­lishment will constantly feed this electronic Beast with more and more data. They will hungrily and rapaciously tap into its billions of cyberspace-filed dossiers, searching for information by which they can extend the Beast’s dominion and influence into every nook and cranny of our lives.

L.U.C.I.D..’s cyberspace dossiers will be made instantly available to thousands of probing, faceless, police state agents and bureaucrats around the globe. America’s CIA, IRS, and FBI, the Russian KGB, Europe’s Interpol and Europol, Israel’s Mossad, Britain’s military intelligence­-these are just a few of the planetary-wide law enforcement, military, and intelligence agencies having access to your dossier and to mine.

A Central Gestapo Repository

http://www.universe-people.com/english/svetelna_knihovna/htm/en/en_kniha_project_lucid.htm

The Mysterious All Seeing Eye Symbol Of The Devil’s New World Order!
http://www.jesusisprecious.org/nwo/all_seeing_eye.htm

PROJECT L.U.C.I.D.

 

 

Project Soul Catcher NoTouchTorture #TargetedIndividuals #Gangstalking #Targetedtoo

Project Soul Catcher: http://projectsoulcatcher.blogspot.com/. I’ve taken the liberty of placing this text here, for educational/learning purposes.

By Dr. Robert Duncan

Sunday, March 29, 2015

Summary of no-touch torture techniques

The Executive Summary:

Neuropsychological and Electronic

No-Touch Torture Report

Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

                Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years. Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for

Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states

The idea is to shake up the emotional states of the target because different information can be accessed at each state. Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways. The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.” The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

  1. Memory Erasure

The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation. There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do. Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes. The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

  1. Electricity and Shocks

Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

  1. Fear and Terror

There are many techniques to induce extreme fear in the target. In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used. Remember that many targets of torture die from the physical effects. It is torture to death.

Let us compare the no-touch torture methods used to inflict the same terror and mental anguish. In several of these techniques the target needs to hear their handler’s voice. This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

  1. Imprisonment and Isolation

Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche. Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

  1. Sexually Disturbing Tailored Pornography

The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

  1. Mutilation

Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture mutilation is done by trickery. Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

  1. Personal and Spiritual Defamation

In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?” In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggersactivistsjournalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

  1. Psychological Intimidation

This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

  1. Rape

Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding. In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

  1. Dietary Manipulation, Forced Weakness and Sickness

The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

  1. Repetition

Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

  1. Sensitization of Pain Impulses

While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

  1. Sensory Overload and Deprivation

Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes. Targets of no-touch torture often hear endless tinnitus.

  1. Sexual Humiliation and Lack of Privacy

Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

  1. Maximum Sensory Pain Techniques

Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering. All suffering can be entrained into the minds of no-touch torture subjects.

  1. Sleep Deprivation

This is the number one torture method along with the popularity in the press of water boarding. This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

  1. Stress Positions

Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees. Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target. Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital. Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession. Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation. The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals. Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached. Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors. Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”. It is used in war games to determine how to control your enemies and targets. Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.


Partial Project Summary
History
Project descriptions
Technologies and skills
Signal/Image Processing and
Pattern Recognition
Tank image recognition from satellites
3-D stereoscopic extraction algorithms
Submarine signature recognition from acoustic underwater
phased arrays
Expert Bayesian system, parameter tuning, phased array
signal processing correlogram
Stock market statistical arbitrage
Creating models based on financial fluid flow dynamics and
correlations of stock prices. Forecasting (Tuck).
Credit card fraud pattern recognition.
Spending pattern irregularities alerts
Sound triangulation/sniper system
Asymmetric phased arrays and reflection calibration algorithms
Biometric recognition systems
Face, finger print, retinal, voice and infra-red vascular
recognition
Feature extraction, registration algorithms, noise
removal, large dataset management. Eigenvectors, wavelets, 3-D convolutions,
cluster analysis.
Eye gaze tracker
Real time image processing. Head rotation modeling.
Truth detection systems
Automating polygraph parameter sensors and voice stress.
Emotional context modeling through vocabulary templates.
Gesture recognition
Hand gestures conversion to computer commands
Brain Print Recognition
Utilizing many samples, human brains have a unique MEG/EEG
brain “hum” and cluster analysis can be done to recognize mental illnesses
and uniqueness of individuals. (Lockheed Martin is doing research on
recognition of precognitive signals of objects. Berkley also just released a paper showing
how to discriminate between 1024 visual objects.)
Supercomputing Applications
Various projects including FFT optimization
Vector Pipeline, BBN Butterfly, Hypercube, Viking Boards
Artificial life simulations, gas lattices
Specialized Hardware, genetic and evolutionary algorithms.
Grid computing
BEA and Oracle distributed grid computing
Computer generated holography
3-D spatial FFT on BBN’s connection machine. C-paris
parallel programming language. Fortran 77.
Speech Recognition/Identification
Voice recognition/identification
BBN Hark’s system.Markov modeling, n-grams, context
probability models, speaker independent models
Models of discourse and planning
Studied under world renown Barbara Grosz, graduate school adviser
Harvard
Natural Language parsing and AI knowledge networks
CIA project. Focused on pronoun reference
algorithms.
Biomedical Projects
Soldier 2000 project
Connecting vital sensors to a wireless bodyLan . DARPA.
Robotic Surgery in Medicine for the Army
Haptic feedback, latency time compensation,  tremor filtering, object touch recognition
Virtual Reality in Medicine
Overlays of fMRI scans onto patient for real time surgical
applications
Virtual Reality 3-D Reconstruction Teleconferencing
Carnegie
Mellon University.
3-D reconstruction of objects in the teleconference room.
EEG controlled robots
Relatively simplistic mental state recognition to control
direction of robot. Discriminant function analysis.
Neural network controller for “INFANT” robot
Designing robot controllers to learn to grasp objects that
mimic human babies. Mentor:
Dr. Kuperstein (MIT)
Retraining the brain to interpret tactile feedback as
visual information
Brail interfacing also used by Navy for Sonar feedback on
tongue tactile vision systems.
Research / simulations in cybernetic hive mind work groups
(BBN) Increasing the hypothetical efficiency of integrated
rapid communication technologies.
Neural network control system for leg muscle stimulation
to make paralyzed people walk again
Engineering of extoskeleton. Control systems for
non-linear biological models due to muscle fatigue.
Digital circuit / systems design
Cascadable digital neural network chip
VLSI design, production, testing
Wearable ubiquitous computing systems
Enhanced reality, enhanced cognition. Heads up display
borrowed from NASA for entrepreneurial venture.

 

#Gangstalking? The Sentient World Simulation–Our Digital Clones 4th Generation Warfare Matrix

2019-03-21 15_53_32-synthetic simulation at DuckDuckGo - Comodo IceDragon

Peter warned “Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour…”

‘BREAKTHROUGH IN QUANTUM COMPUTERS’ says Google: Biometrics, Brain-Machine Interface & 2030 Agenda (Lockheed Martin)

A few links to get you started to understand what’s going on regarding #Targeting and #Gangstalking as well as #Experimentation. We are nodes/avatars in a computer generated mirror imaged world at the dept of defense’s Purdue lab, a sentient synthetic simulation, hence synthetic telepathy IE synthetic thoughts played back at us (our own) in cybernetic cyberwarfare gaming, regrettably. — Lissa

Feel strange? Its a mirror of you talking & looking back at yourself thru your eyes… its the synthetics nanotech fiber antennas. When one hits or lands on me… it snaps in my sinus because I’m breathing them in and sprayed on by the SKYNET AI

detox them out — soak your feet hands hair in borax 40 mule team & dawn dish detergent – we have nano in us from the chemtrail spraying.

2019-03-21 16_02_47-matrix at DuckDuckGo - Comodo IceDragon

What you need to know about the SENTIENT WORLD SIMULATION and VIRTUAL REALITY –

The Sentient Worldwide Simulation, Targeted Individuals and the Birth of the Matrix – Will Golightly

How the Government Predicts The Future – Inside the “Sentient World Simulation” : The Corbett Report

This “Sentient World Simulation” will be paired with Quantum AI and will learn to anticipate the best means of controlling the individual and the population. : conspiracy

I researched this for Dr. Karlstrom (TI): “Targets” Are Enrolled In The Pentagon’s 4th-Generation-Warfare – “Sentient World Simulation” – SEAS (Synthetic Environment For Analysis and Simulation)Program – Gang Stalking, Mind Control, and Cults

2019-03-21 16_00_43-purdue sentient world simulation systems at DuckDuckGo - Comodo IceDragon

The SENTIENT WORLD Program: how the agencies model and predict the future [Archive] – The Project Avalon Community Forum

Sentient World Simulation – Sentient_World_Workshop_TUT_18February2014_Chaturvedi__Abstract.pdf

FAQ :: What is Sentient World Simulation? – Rapture Ready

Sentient World Simulation Archives | Take The RedPill!

DOD Creates Sentient World Simulation ~ Singularity…

We’re swimming in an ether of data streams due to all the frequencies 2,3,4,5G

combined with the nanotech/biotech.. its how they’re controlling everyone

2019-03-21 16_02_25-matrix at DuckDuckGo - Comodo IceDragon

DOD Military Simulation Creates A Sentient World | The Ghost Diaries

Tangible Information: Sentient World Simulation GOOGLE CIA nsa facebook

Sentient world: war games on the grandest scale • The Register

Tons of articles on the AI by Alfred Webre

Source — Trends To A New World Order: Techno-Biological Tyranny
https://sagaciousnewsnetwork.com/trends-to-a-new-world-order-techno-biological-tyranny/

(Old Thinker News, By Daniel Taylor) The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values.”

– Zbigniew Brzezinski, Between Two Ages: America’s Role in the Technetronic Era

As the world moves toward world governance in a new globalized era, technologies that enable extended life spans, and technologically augmented abilities are being developed. These upgrades for the human body come at a high cost, and are unattainable for a large number of people, causing additional societal conflict and the rise of new aristocratic classes defined by their level of “enhancement”. Diseases are mostly eradicated among elites, while a large percentage of the population is left still vulnerable. A high tech overlay of sensors and monitoring devices tracks workers activities. Their heart rates, facial expressions, and overall state are monitored to maintain maximum efficiency. Supercomputers run Sentient World Simulation software designed to enable testing of efficient social management and psychological operations against the population in a virtual world. Artificial Intelligence makes health, political and educational decisions that were once made by human beings. Advancing technology offers miraculous cures, while opening doorways to new forms of tyranny and manipulation unimaginable in the past.

The EyeOpener- Sentient World Simulation: Meet Your DoD Clone – YouTube

Its called THE BEAST by insiders… the Beast system

We’re in a simulation

Citation: Trends to a New World Order: Part 2 – Old-Thinker News
https://www.oldthinkernews.com/2008/01/09/trends-to-a-new-world-order-part-2/

Societal control through technology

[1] ] Brzezinski, Zbigniew. Between Two Ages: America’s Role in the Technetronic Era. Penguin books, 1976

[2] “Outlook 2008”. The Futurist. Nov-Dec 2007. Available at

[3] Cupp, John. “USJFCOM teams with Purdue University to add the human factor to war game simulations”. United States Joint Forces Command. February 4, 2004. Available at

[4] Chaturvedi, Alok Dr. “Sentient World Simulation (SWS): A Continuously Running Model of the Real World”. August 22, 2006.

[5] http://www.simulexinc.com/

[6] Baard, Mark. “Sentient world: war games on the grandest scale”. The Register. June 23, 2007. Available at

[7] “Towards a Synthetic Environment for Computational Homeland Security”. Available at (requires flash player)

[8] Microsoft Patent #20070300174. Available here

[9] Ibid 8.

[10] Clark, Robert. “The Panopticon”. The Literary Encyclopedia. Available at

[11] Duke, Lynn. “Uniqueness lost in surveillance society”. Washington Post. December 10, 2007. Available at

[12] Ibid 1.

Future Eugenics and life extension

[1] Kaku, Michio. Visions. New York, New York: Doubleday, 1997. page 257.

[2] Development, Concepts and Doctrine Centre/Ministry of Defense. “The DCDC Global Strategic Trends Programme 2007-2036”. January 2007. page 80.

[3] Campbell, Thomas. “The Moral Imperative of Our Future Evolution“. Available at

[4] Rogers, Lois. “Scientists find way to make us slaves”. Times Online. October 17, 2004. Available at

[5] Ibid 2.

[6] National Intelligence Council/Central Intelligence Agency. “Global Trends 2015: A Dialogue About the Future With Nongovernment Experts”. page 9. Available at

“We should not imagine that people will just dabble in their evolution. Another generation will fan autoevolution into the all-consuming endeavor of the intellectuals, scientists and economists. The resources of the world probably will suddenly be shifted to this enterprise. Remaining “humans” will realize that they have been displaced from their former privileged status as the masters of destiny.” [3]

“…experiments conducted on rhesus monkeys have shown for the first time that animal behaviour can be permanently altered, turning the subjects from aggressive to “compliant” creatures.”The scientists did so by blocking the effects of a gene in the brain called D2, which cut off the link between the monkeys’ motivation and perceived reward. Humans have an identical gene. [4]

[1] ] Brzezinski, Zbigniew. Between Two Ages: America’s Role in the Technetronic Era
Penguin books, 1976

[2] “Outlook 2008″. The Futurist. Nov-Dec 2007.

[3] Cupp, John. “USJFCOM teams with Purdue University to add the human factor to war game simulations” United States Joint Forces Command. February 4, 2004.

[4] Chaturvedi, Alok Dr. “Sentient World Simulation (SWS): A Continuously Running Model of the Real World”. August 22, 2006.

[5] http://www.simulexinc.com/