Etiket arşivi: SURVEILLANCE

SURVEILLANCE /// VİDEO : Obama Defends NSA Surveillance Programs – Charlie Rose 06/17/2013


VİDEO LİNK :

SURVEILLANCE : New Devices that “talk” to Mind Need Debate, Controls


HAMILTON, Ont., Canada — The recent flap over invasive “X-ray” devices at Los Angeles International Airport that can scan the human body more invasively than ever before is just the tip of a technological iceberg which has been growing for half a century and has now yielded devices literally capable of “broadcasting” directly to the human mind.

Yet, in spite of considerable material published over the past half-century, the arrival of a time when any moderately wealthy person can purchase or have devices made to order that can “talk to” the brain and nervous system, has been met with silence. Indeed, in a response to a 1975 request to the National Security Agency (NSA) for information on mind control devices, the NSA said one responsive document obtained from the Russians by the Defense Intelligence Agency could cause “exceptionally grave damage” to national security if released.

The seminal event in the developments that have produced “electronic mind weapons” was the discovery during World War II that radar technicians could hear the buzz of the radar signal in their skulls, no receiver needed, when they worked in close proximity to an energized antenna. Radar signals are a uniform train of short pulses of microwave signal, and the audible effect matches the pulse rate.

This told scientists that by pulsing a radio signal, it is possible to have the signal interact with the brain and nervous system.

Radar hearing was studied on a grant from General Electric in the early 1960s by scientist Dr. Allan Frey, at Cornell University in upstate New York. Dr. Frey’s work has been reported in several scientific journals, including the Journal of Applied Physiology, 17(4): 689-692. 1962.

Dr. Frey found that a wide spectrum of “carrier” frequencies, (that is, the “spot on the radio dial” of the test signals,) when pulsed, and from about 125 megahertz (lower TV channel range) well up into the microwave region, could cause buzzes or clicks to be heard by the test subject. If a steady train of uniform, short, sharp pulses was aimed at a test subject’s head, a buzz was heard. If a single pulse was transmitted, then the subject heard a pop.

In general, unclassified experiments on human beings lay dormant for the next decade, at least according to information dveloped by a Canadian organization, Citizens Against Human Rights Abuses (CAHRA), has been able to unearth. The pulses needed to place a signal power of about three-tenths of a watt per square centimeter on the subject’s skull in order for the signal to be heard.

For ethical scientists, this power level — about the same as when basking under an infrared heat lamp — indicated caution. Further studies at the cellular level have turned up sensitivities to certain signals far, far below that level. Dr. Ross Adey of the University of California at Riverside, a leading experimenter in this area, has recently warned (http://electric-words.com/adey/adeyindex.html) that “there are important biomedical considerations associated with long term exposure to any environmental factor capable of tissue interactions.”

Other scientists studied “microwave hearing” by means of exposing animals to various combinations of carrier frequency, pulse shape, and power level. The animals were tested at the simplest level for “startle” response, by applying a simple pulse or pulse train to a caged or restrained animal.

More invasive unclassified experiments were performed in which electrodes were implanted into the brains of the animals, in areas of the brain where vision, sound, and other perceptive functions were known to reside. These electrodes measured the response of each perception region to different signal types.

These animal studies found that various perception effects are frequency and power dependent. That is logically to be expected, since the size of the animal and its sensory organs and brain region vary in size. Size affects how much of the power from an incoming signal is absorbed, and absorption is necessary to generate effects.

One of the most notable scientists in the animal exper- imental field was Dr. Jose Delgado, Director of Neuropsychiatry at Yale Medical School in the early 1970s. In a segment titled “Special Assignment” on CNN in 1985, Dr. Delgado demonstrated that by mounting a transmitter on an animal, and having received radio signals converted to stimulating pulses fed to implants in the animal’s brain, behavior can be dramatically altered. A bull apparently intent on challenging an experimenter with a radio transmitter stopped moving toward the experimenter when the appropriate button on a small transmitter was pressed.

While this was not direct radio signal-to-brain technology, it did demonstrate clearly that the brain can be controlled by electrical stimulation. It also, significantly, demonstrated intent. Demonstration of intent is crucial to anyone interested in arousing public interest in getting electronic mind weapons exposed, debated, and controlled.

Three other effects were discovered during these animal experiments: Window effect, bio-amplification, and bio-detection.

Window effect means that, just as with drugs, there is both a minimum and maximum signal level which will cause a desired effect. Bio-amplification is the more significant phenomenon, as what it means in practical terms is that at just the right frequency and pulse shape, a given effect can be produced with very small power levels, far below power levels required to produce heating. Under grants from the government, Dr. Adey studied how electromagnetic (i.e. “radio”) signals interacted with cells down to the molecular level.

Bio-amplification also makes possible signals which do not interfere with radio and TV appliances, and which are extremely hard to detect. Hopping these small signals around in a band of effectiveness makes then virtually impossible to detect.

Bio-detection means that a cell is not simply “stimulated” at a certain signal frequency, but can actually behave according to “modulation” applied to that signal. The old crystal set radios are one of the simplest detectors of “modulation”. When voice is superimposed on a steady carrier frequency, that variation in the signal is called the modulation. The crystal set extracts the voice and causes the attached headphones to reproduce the original voice.

Headphones alone cannot respond to frequencies as high as, say, AM broadcast band signals, and the detector, the crystal or diode, converts the radio signal into a voice signal. Cells can do the same thing. This leads to the next stage in radar-hearing human experimentation: The successful transmission of, first, morse code, and then voice, to a human test subject.

That milestone was apparently been achieved a quarter of a century ago. In the Journal of the American Psychological Association in March 1975, Dr. Don R. Justesen wrote: “Communication has in fact been demonstrated. A. Guy (Note 1), a skilled telegrapher, arranged for his father, a retired railroad telegrapher, to operate a key, each closure and opening of which resulted in a pulse of microwave energy. By directing the radiations at his own head, complex mess- ages via the Continental Morse Code were readily received by Guy.

“Sharp and Grove (note 2) found that appropriate modulation of microwave energy can result in “wireless” and “receiverless” communication of speech. The recorded by voice on tape each of the single-syllable words for digits between 1 and 10. The electrical sine-wave analogs of each word were then processed so that each time a sine wave crossed zero reference in the negative direction, a brief pulse of microwave energy was triggered.

“By radiating themselves with these “voice modulated” microwaves, Sharp and Grove were readily able to hear, identify, and distinguish among the 9 words. The sounds heard were not unlike those emitted by persons with artificial larynxes.”

This early ’70s success forms the basis for the powerful mind weapons that are still classified today. This writer makes no judgement here as to the truth of the allegations of CAHRA’s 300 members, who claim to have been targetted by devices based on technology like this. Pain, manipulation of body parts, and hypnotic effects have all been reported, with a high degree of sameness among those reporting such effects.

However, the experimental results above make it plain that the means to communicate electronically with the brain and nervous system have existed for some time, outside the classified realm.

Audible words may be transmitted, as described above. A more recent technology can be coupled to “microwave hearing” to produce a signal which can carry vocal content which is not consciously audible, but is “audible” to the human mind. This is called “SSSS” or “S-QUAD” or “Silent Sound Spread Spectrum” technology.

The first unclassified patent found by CAHRA is U.S. Patent 5,159,703, by Dr. Oliver Lowery, dated October 27, 1992. This technology converts a hypnotist’s voice to non-consciously-audible ultrasound, which can be sent using microwave hearing, or piggybacked on to commercial broadcast sound. This powerful combination of technologies can be used to apply hypnosis, undetectably over months and years.

Britain’s ITV News Service, in March of 1991, reported the use of ultrasound carried via a commercial FM channel (100 MHz) to entrain the brains of Iraqi troops to pulse rates set to produce despair, during the Gulf War. Clearly both means and motive exist to use technologies developed over the past half-century. But has there also been a motive for criminal use of such devices?

Part II: Maturity – To recap, new devices which can “talk to” the human brain and nervous system are a reality. They have, in their classified form, been a reality at least since Dr. Joseph Sharp’s successful transmission of voice using pulsed microwave radio signals in 1973.

In the first part of this article, scientific research was summarized describing the events which led to Dr. Sharp’s success. The chain of events was begun with the World War II discovery that radar signals can be “heard” buzzing within the skull of technicians working in close proximity to energized equipment.

Studies on animals, and Dr. Allan Frey’s human experiments at Cornell University showed that this phenomenon is both frequency and power level dependent. Also discovered were that (a) cells assist in amplifying radio signals at certain frequencies, and (b) cells can not only respond to a radio signal, but can actually “detect,” that is, “decode” any modulation, such as voice, superimposed on the basic carrier signal.

Finally, brief reference was made to a form of sound conversion, “Silent Sound,” in which both mood setting (“brain entrainment”) signals and ultrasound voice facsimile can be used to undetectably communicate with the human brain. The radio signal or “microwave hearing” phenomenon can carry “Silent Sound,” or, “Silent Sound” can be carried on top of an audible radio or TV sound broadcast.

This capability to carry inaudible “voice” or “mood” signals sets the stage for undetectable and repetitive hypnosis. Although the full details remain classified, the British ITV wire service received reports that the U.S. military used Silent Sound, piggybacked on FM broadcasts to Iraqi troops, to set them up for a quick surrender.

To this point, then, we can see that the potential for extremely invasive, undetectable, and unethical use of these technologies exists. Being undetectable and easy to suspend when witnesses are present, the world’s justice systems can offer no remedy should the equipment be used against citizens in their homes and communities.

The question now is: “How likely is it that the unethical, involuntary, aggressive or voyeuristic use of these technologies has happened, is happening, or may be happening, by those who possess these devices?”

To evaluate this likelihood, one must answer this question: “Why would anyone use invasive, silent electronic equipment to both cause pain and discomfort, or, to read the state of mind, including said-to-self vocal thoughts and images, on a non-volunteer subject?”

One word sums the answer up quite thoroughly: “MKULTRA.” MKULTRA was originally a collection of 149 psychological warfare and interrogation experiments commissioned in the 1950s by the CIA. These experiments were spurred into existence by the “brainwashing” tactics used on Korean POWs, which involved torture, sensory deprivation, and drugs.

MKULTRA planners decided that for brainwashing and other types of “mind control” activity, it was essential that involuntary test subjects be used. (No doubt, too, that volunteers for such horrible experiments would be nearly impossible to recruit.)

Among CAHRA members, and a parallel organization named ACHES-MC (Advocacy Committee for Human Experimentation Survivors – Mind Control), are severely and seemingly permanently mentally damaged survivors of the kidnap/institutional/drugging/torture forms of MKULTRA activity.

Most of the survivors’ torment ceased shortly after the exposure of the non-electronic atrocities, by the U.S. Senate Select Committee on Intelligence hearings, chaired first by Senator Frank Church, then by Senator Inouye in the late 1970s. None of the perpetrators of those atrocities were ever brought to trial.

However, even though the perpetrators were not punished, and the neuro-electromagnetic experiments were not brought to light, the MKULTRA experience demonstrates undeniably that a modern, “civilized,” western country which places a high value on freedom, still harbors a motive pool capable of unspeakable cruelty.

Add to the MKULTRA experience the continuing revelations of individuals who prey on children (Jeffrey Dahmer and John Wayne Gacy, for example) and it becomes clear that once invasive electronic devices fall into the hands of society’s “baddest apples,” the devices will be used in the worst possible ways. That is historical certainty, not speculation.

To sum up: We have shown that both the means and the will do exist, and have existed for some time, to carry out what the 300 members of CAHRA and ACHES-MC report.

But there is even more cause for concern: The basic technologies to inject long-term silent hypnosis (which can be used to generate hypnotic body pain) and to read sub-vocalized word-thoughts and even images seen by the target’s eyes, can be bought or had built by the average millionaire. Not all “millionaires” are entirely ethical or altruistic.

Here is a list of technologies and their characteristics which can be had by the wealthy at this point in time:

  • Through-wall, through-clothing, undetectable passive radar scanners from Millivision Corp., Northamptom, Mass. This item also allows perpetrators to see if witnesses or test equipment is set up, and allows the perpetrators to shut down, rather than be detected.
  • Radar-based life detectors, used for rescue and law-enforcement, but also available to stalkers and pedophiles. Can also “illuminate” a dwelling’s indoor areas for the radar scanners above, for better visibility.
  • Simple “brain rhythm entrainment” machines, which are transmitters pulsing at rates which can alter moods without the target realizing a signal is aimed at them. (The first of which was used during the Korean War, the Russian “LIDA” machine.)
  • Involuntary voice-to-skull transmitters, capable of forcing a neighbor to listen to inescapable sounds while trying to sleep.
  • Modified telephone voice converters, making a hypnotist’s voice inaudible to the target’s hearing sense, but still audible to certain parts of the mind. Can be transmitted using the pulsed microwave voice-to-skull transmitters. This “silent sound” equipment can also be transmitted over cable TV to the intended target, or over the target’s favorite radio channel.
  • For the more determined aggressive device owner, a ruse involving less-than-ethical doctors can be set up where the new Applied Digital Solutions Inc. satellite-trackable implants can be surreptitiously placed during surgery for other conditions, resulting in the whereabouts of the targetted individual being known at all times to the perpetrator. This type of atrocity lends itself more to large organizations like government agencies or defense and intelligence contractors; and for such agencies this is not difficult to arrange.

What can be done? What should be done? – CAHRA is a non-profit organization, meaning, by law anyone speaking or writing on behalf of CAHRA may not attempt to influence legislation either directly or indirectly by way of influencing voters. CAHRA’s role is to supply information to others, that others may independently take action they see as appropriate.

Speaking here as Eleanor White, world citizen, and not as an agent of CAHRA, I suggest that the European Parliament’s resolutions passed on January 28, 1999, be also passed by the U.S. Congress and the Canadian Parliament. Excerpts from those resolutions follow: Resolution adopted by the European Parliament, 28.1.99 Environment, security and foreign affairs A4-0005/99.

Calls on the European Union to seek to have the new ‘non-lethal’ weapons technology and the development of new arms strategies also covered and regulated by international conventions.

Calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings.

Impetus for making such resolutions can be derived from a speech by Jean-Pierre Changeux, of the Paris Pasteur Institute, published in the prestigious scinetific journal Nature in January, 1998: “But neuroscience also poses potential risks, he said, arguing that advances in cerebral imaging make the scope for invasion of privacy immense. Although the equipment needed is still highly specialized, it will become commonplace and capable of being used at a distance, he predicted. That will open the way for abuses such as invasion of personal liberty, control of behaviour and brainwashing. These are far from being science-fiction concerns, said Changeux, and constitute “a serious risk to society”.

It is hoped the reader will take away from this article the need to get this matter of weapons-capable electronic devices on to the agendas of those we elect and pay to defend our nations from involuntary experimentation and atrocities.

Eleanor White is an engineer and technical advisor to the Ontario-based Citizens Agaionst Human Rights Abuses. Source: New Devices that “talk” to Mind Need Debate, Controls Written by Eleanor White Vol. 6, No. 1289 – The American Reporter – March 16, 2000

RELATED READING:

* A Practical Survival Guide to OSEH
* Directed-Energy Harassment Defense
* Electronic Harassment
* Electromagnetic fields from non-ionising electromagnetic radiation: discussion
* Electromagnetic fields and public health
* Electronic Surveillance Project
* Microwave Harassment and Mind control Experimentation
* Artificial Telepathy 101
* War at Home by Brian Glick
* David Lawson’s Investigation Into Organized Stalking
* Innocent Texas Citizen Targeted With Deadly Electronic Weapons
* Targeted Individuals [TIs] Direct Energy Weapons, Mind-Control and the CIA Torture Matrix
* Directed Energy Weapons (DEW) and Targeted Individuals (TIs)
* Video: Pain Ray Zaps Through Windows, Fries Sailors
* Scalar Wars
* Beam Me Up Some Power
* Out-of-Synch Satellite and Terminal Programs Cost Pentagon Millions



SURVEILLANCE : Psychological Manipulation


Psychological Manipulation and Induced Psychological Illness

As indicated on the home page, psychological harassment and psychological manipulation "mind control" can induce psychological and physical disorders.

When an individual is targeted, the level of harassment usually begins slowly and increases with time.

Anytime someone interacts with you they can influence your thoughts and also manipulate your thoughts.

Usually, people "tune out" the conversations around them. If you are in a crowded room and someone calls out your name they will probably attract your attention and the same goes for other specific words or sounds.

Individual’s can recall or form images. The expression “I get the visual”. When someone talks about or describes a scene you may form an image even if you have never seen what the other person is talking about or describing.

An individual can come in close proximity to another individual and ask a question, If the individual hears the question, whether he is the target of the question or not, his mind can respond with an answer. The answer response can be in different forms such as an image or sound. For example, if the question is what does the person look like? The individual may form an image of the person in his mind. If the question is what is the person’s name? The individual’s mind may respond with the sound of the person’s name.

If someone says leave and slams a desk drawer or hits an object. This is a form of indirect intimidation, an indirect threat of violence. If these actions are repeated it can become a form of conditioning. The next time a person slams a desk drawer or hits an object the person may associate this as a threat.

Classical conditioning can be used to associate different threats to different things. (Fear Conditioning)

Bookmarks (sections):
Conditioning your mind Negatively or Positively
Dark Sarcasm and Negativity
Condition Your Mind Happy: Act Happy
Constant-State-of-Interrogation: Indirect Communication and Psychological Disorders
Constant-State-of-Interrogation: Unfinished Ambiguities – Frustration and Negative Conditioning
Conditioning Sounds: Hitting Sounds and Fear Conditioning
Conditioning Words: The Identification Word or The Trigger Word
Social Queues: Rejection Hurts and can Lower Your Self-Esteem
Social Queues: Smiling and Acceptance The Opposite of Rejection
Degrading Themes and Indirect Threats: Verbal Maneuvering to Hide Direct Threats
Degrading Themes: Inducing Degrading Images and Intrusive Thoughts
Degrading Themes: The Pedophilia Weapon
Degrading Themes: Attack Pattern to Put the Victim on the Psychological Defensive
Psychological Constructions: Constructions, Barriers, and Restrictions
False Pretenses: Deception to Prevent Exposure, Torture and False Confession Pretense
Subtle Attacks: Hidden, Doubtful, Uncertain, and Psychological Defenses
Verbal Dialogue to Shut Down the Brain
Anger Makes You Powerful or Stronger?
The Funny Quick Brain
Ambiguities: Self Doubt and Uncertainty (A State-of-Limbo)
Ambiguities: Inducing Self-Doubt and Attacks to Self-Confidence
Metaphorical Speech: Hidden Threats and View on Reality Manipulation
Interpretation and View on Reality Manipulation: The Workplace, The Media, Propaganda, Brainwashing
Fear-of-Fear: Attacks to the Honor
Fear-of-Humiliation
Responsibility and Vulnerability
Ideation: To Manipulate Victims
Beneficial Intentions: To Deceive Victims
Beneficial Intentions: The Failure Strategy
Beneficial Intentions: The Never Ending Test
My Space, Your Space, Not Behind Me
Staring Drills: To Provoke and Manipulate
The Domination Game: Who Dominates
Psychological Warfare or Manipulation: In Covert Type Investigations
Psychological Warfare: Three Top Priorities or Objectives
Psychological Warfare: Credibility
Psychological Warfare: Who can Contradict the Qualified Professionals
Psychological Warfare: Bullies and Criminals
Psychological Warfare: Powerful Organizations and Secrets
Psychological Warfare Pattern: Homelessness
Attack Pattern: Brainwashing or Deceiving and Conditioning the Fight-or-Flight Response to Mean Fear
Attack Pattern: Public Places and the Cash Register
Behavior: Anti-Social Behavior Change
A Criminal Harassment Network Routine Example (HSS Hypersonic Sound)
Criminal Harassment Network Routines, Strategies, and Smear Campaigns
The Rundown, Setups and Deception (video)
Disclosure, Psychological Harassment Office Tactics (video)
An Example of the Pedophilia Weapon (video)
Criminal Strategy Examples, Motive Incarceration, No Trial, Personal Hygiene and Degrading Themes, Repression Through Cancer (Powerful Radar Assaults)
Criminal Harassment and Threats (Focused Ultrasound)
Racial Profiling, Discrimination

Conditioning your mind Negatively or Positively (Ivan Pavlov)

Have you ever noticed that when someone is very negative and always complaining they may start to influence you and you may start to see only the negative events or negative side of things as they do?

The way you think can be conditioned and a person can also be psychologically manipulated to have a negative thinking pattern, to always see the negative side of things or expect the worse, or to see the negatives out of a situation or event reflexively instead of being open minded or thinking of the positives first.

A tactic often used is to constantly interpret or expose the victim to negativity. In some cases it’s used to induce or can lead to depression. (linked to self-esteem or self-worth)

The opposite is also true. You can condition your mind to think positively or expect positive outcomes. It’s not easy at first and does require effort but eventually it can change and become almost automatic, reflexive, where you will be thinking positively instead of negatively. You may have heard these expressions "look on the bright side, put a positive spin on it or spin it positively".

Try this exercise: Think of all the positives that you can imagine out of a situation or event and try to think of the possible positive outcomes first.

Dark Sarcasm and Negativity

Obvious corruption and the intentional cause of hardship can lead to dark sarcasm and negativity, which is linked to depression and suicide, it can also be linked to a pattern and steps that lead to homelessness.

– Mobbing and mobbing in modern society are linked to the intentional cause of hardship and obvious corruption.
– Obvious corruption and the intentional cause of hardship can lead to dark sarcasm and negativity.
– Dark sarcasm and negativity are linked to depression and suicide.

The intentional cause of hardship and obvious corruption leading to anger, frustration, negativity, and dark sarcasm, which can lead to depression and suicide.

– Links to a pattern or steps to pushing a person to homelessness and the unintentional or possible intention of pushing a person to suicide.

Condition Your Mind Happy: Act Happy

Act the way you want to feel and soon you will feel the way you act.

This is common in self-confidence building therapies or courses where you are asked to act the part of or like a confident person. You soon develop that skill or behavior which results in the person having more confidence. There is increasing evidence that acting enraged, obsessed, malevolent, or depressed maybe bad for you. Actor Leonard DiCaprio developed obsessive-compulsive disorder while playing Howard Hughes in the block buster The Aviator. This often happens to actors who get "caught up" in the role they play or keep many of the same character traits of the role they played. Heath Ledger who played the Joker in the Batman movie died and was allegedly clinically depressed. If you act having an enraged or angry conversation with someone, you will usually find that your emotions do get engaged even though you are simply acting the part.

When you are acting happy, you are thinking happy thoughts that go with the acting role you are playing, so it’s like conditioning your mind to be happy.

Constant-State-of-Interrogation: Indirect Communication and Psychological Disorders (Ivan Pavlov)

The group can begin by saying the individual’s name, specific words, different sounds, and use other distracting actions to attract the individual’s attention. The targeted individual realizes that the group is using some form of harassment and begins to listen to the group around him.

Using indirect communication the group can insult the target, attack the individual’s dignity, integrity, or self-esteem, threaten the victim, ask questions, and continue to use specific words and sounds to attract the targeted individual’s attention.

The indirect communication is also a form of conditioning and can lead to psychological disorders in which the victim feels that he is in a constant-state-of-interrogation. For example, the individual may go to a different environment and hear sounds, words, and questions. Because of the indirect communication and conditioning, the individual may feel that he is still in a state of interrogation and believe that individuals are trying to interact with him. Normally, people would usually simply “tune out” the sounds and conversations of other people.

This tactic is also used to induce paranoia.

Constant-State-of-Interrogation: Unfinished Ambiguities – Frustration and Negative Conditioning

The constant-state-of-interrogation can also be used or combined with unfinished ambiguities.

The constant-state-of-interrogation tactic involves constant distractions and indirect questions, and this can be combined with unfinished ambiguities. For example “his work is…” ? “he thinks he’s…” ? “he thinks his…” ?. This leaves the victim guessing or wondering “what?” and it can induce frustration or uncertainty.

It can also be used to negatively condition a person as to always assume the worse or negativity from ambiguities, negative conditioning.

Conditioned Sounds: Hitting Sounds and Fear Conditioning (Ivan Pavlov)

Hitting sounds can affect the nervous system and can also cause or increase the fight-or-flight phenomenon.

One tactic is to hit things or drop things randomly, the smoke screen, and then to start hitting things when threats are made towards you or indirectly. This can be an attempt to increase the reaction that you have about the threat and to condition the affect you experience from it, such as feeling threatened or fear, with hitting sounds.

Hitting sounds are linked to physical violence, so if it’s used in combination with hitting sounds the fight-or-flight response can be greater.

Conditioned Words: The Identification Word or Trigger Word (Ivan Pavlov)

A tactic that is sometimes used on a victim is that the group doing the psychological harassment will start using a word, different actions can also be used, that is not commonly used to identify themselves and to identify themselves as being part of this group. Because the word is now associated to a group that is psychologically attacking the victim it can become threatening in the sense that the victim identifies an enemy, can expect a form of attack or threat, or simply identifies and associates the word to the group and the repetitive attacks and their result. The word is conditioned to a threat, the group and a possible coming attack.

Now that the victim has been conditioned to associate a threat, the group and the attacks, to an uncommon word, a more common word is used that is conditioned and associated in the same way to the same threat, an enemy or a possible coming attack. The word itself can also be associated to a threat, an indirect threat of physical violence for example, or a degrading theme that is not recognized by the general public which can increases the victims threat response. This can destabilize the victim further by confusing them and inducing more paranoia where the victim is wondering "who is who" "friend or foe" and can leave them responding more to more possible threats.

The conditioned word can become what some have termed a "trigger" word where the victim explodes in rage or to the threat, and physically attacks an innocent and unaware person, making them a victim of physical violence and making them both victims of this tactic, strategy, and phenomenon.

Social Queues: Rejection Hurts and can Lower Your Self-Esteem

Rejection hurts, registered as pain by the brain as mentioned on the home page, and rejection can be used in attempts to harm and also to lower a person’s self-esteem or self-worth.

A person’s self-esteem can be lowered or increased by conditioning the person to look only for certain social queues, disregard certain social queues, or by changing the meaning of certain social queues.

Smiling and laughter, social queues, are very important and also have very positive effects on the brain. A tactic often used is to try to condition, associate, negativity to the act of smiling and laughter.

Social queues like smiling indicates acceptance towards the person. A person can be conditioned to associate negativity such as a threat or rejection to a smile. If an individual is repetitively threatened or attacked by individuals that use a devilish or fake smile, that is then gradually reduced to a common smile while still engaging in this behavior, and combined with other tactics to induce paranoia such as who-is-who or friend-or-foe, the result can be that the person will associate other peoples smiles to negativity because they are reminded or conditioned by the previous behavior or because they are confused or uncertain as to its intention.

A person can be conditioned to associate negativity such as threats or sarcasm and ridicule using the same tactics as described above to laughter.

The desired emotion that victims are usually manipulated towards or led to is anger because of its negative health effects, instead of laughter.

Laughter is associated to joy and acceptance and is also a great stress and threat reducer.

Social Queues: Smiling and Acceptance The Opposite of Rejection

The simple act of smiling releases endorphins in the brain and both laughter and smiling are contagious. When you smile at someone they usually reciprocate with a smile and this is associated to acceptance and making a connection with someone, it’s the opposite of rejection. Smiling also enhances people’s view of you and gets you noticed.

Some studies show that people who are depressed have weaker smiling muscles and advocate smiling therapy in which the person practices making the smiling facial expression with eyes wide open and reaps the same benefits as a normal smile.

Try this exercise and see what results you get:
Make the smiling expression with eyes wide open for a few seconds and then rub or massage your face and head for several seconds. Do not do this in front of a mirror if you will view yourself negatively and look for flaws. If you do it in front of a mirror while smiling and rubbing or massaging your face, think positive and loving thoughts. It’s a quick relaxing endorphins fix and see how it affects your current thoughts and mood.

Degrading Themes and Indirect Threats: Verbal Maneuvering to Hide Direct Threats

Sometimes a lot of verbal maneuvering and planning is used to hide or reduce the visibility and obviousness of a direct threat.

For example if a group makes subtle hints or insinuations about you being a homosexual for example, even though they probably know you are not, and then one of them says something like all homosexuals should be killed, it’s an indirect threat to you because of the maneuverings or it’s less visible or obvious but it is still a direct threat or threat aimed at you.

As indicated on the home page, degrading themes are often used to prevent victims from coming forward and this is often the way they are used in combination with a threat or threats. The victim may have some reservations about claiming that he felt personally threatened by a threat that is made towards homosexuals. Other degrading themes, ethnics, and religions can also be used.

Degrading Themes: Inducing Degrading Images and Intrusive Thoughts

Degrading themes can be not only disturbing to a person, but also threatening. They are used to attack a persons dignity, self-image, self-esteem, induce stress, and often used in combination with negative conditioning.

A group can try to make a targeted individual form degrading and perverse images by using combinations of words, descriptions, sounds, and actions. When degrading themes are used on individuals, the targeted individual can suffer from a psychological disorder that some psychologists have termed "intrusive thoughts".

Also, as stated on the first page, insinuations, even though they are false, can have different affects on an individual. Insinuations of being a pedophile, a homosexual, a criminal, a liar, etc. Is a form of attack on a person’s self-image, dignity and integrity, self-esteem, and can induce stress. One reaction that the victim can have when targeted is to have the feeling of "feeling guilty of something". Pedophilia is at the top of the list in hated things in our society and being labeled a pedophile has serious consequences, it would therefore explain why it is so often claimed to be used.

When degrading themes or different insinuations are used it can also be a form of "catch 22" if a person’s claims of being psychologically harassed or targeted are dismissed and they are told that it is all in their heads. Why do you have thoughts of being a pedophile, a homosexual, why do you feel threatened by it, etc. Given the fact that psychiatry is often used to discredit the victims of psychological harassment or psychological warfare the psychological construction of a "catch 22" may work on some of the victims.

Another way degrading themes are used is to try to embarrass the victim or to repetitively humiliate the victim, because of the visible signs, such as blushing, or because of the degrading theme involved.

Degrading themes are often used to try to prevent people from coming forward and psychiatry is often used as a threat in the sense of building false profiles.

Degrading Themes

Degrading Themes: The Pedophilia Weapon

Pedophilia is one of the most hated things in our society and because of this it can be used as a weapon.

Being falsely accused or labeled of being a pedophile has very serious consequences for the victims of this phenomenon or use of pedophilia as a weapon. Even when the accusations or label are disproved at a later time the label or smear can stick.

Although the accusations are false the desired effects on the victim are usually high levels of stress, anxiety, and fear which is a part of the pedophilia weapon. Stress, anxiety, and fear being another form of weapon with serious effects on the body.

Degrading Themes: Attack Pattern to Put the Victim on the Psychological Defensive

Degrading themes can be used to put a person or victim on the defensive or psychological defensive. Some example of using degrading themes is to make insinuations that the victim is a criminal or a pedophile.

An example of an attack pattern used in psychological harassment or psychological warfare is:

• Making insinuations that the victim is a criminal or pedophile to put the victim on the defensive.
• Followed by threats to induce the fight-or-flight response or to induce fear.

Psychological Constructions: Constructions, Barriers, Restrictions, and Catch 22’s

Psychological Constructions are when a condition is built into the persons psychology.

• One example is the term "catch 22" and the use of degrading themes or pedophilia to prevent victims from coming forward or to prevent exposure. There is no "catch 22" , it’s a psychological construction or belief that’s been built into the victim to restrict or prevent the victims from exposing the perpetrators of a crime.

• Another example is fear-of-fear. The importance of fear is "built up", a psychological construction, where previously there was no importance in fear. After the "build up" process of inducing a high importance on fear, a normal emotion in people, if the victim experiences fear, his ego or psychology can be devastated to bring them "crashing down".

False Pretenses: Deception to Prevent Exposure, Torture and False Confession Pretense

The psychological manipulation of, the pretense or deception of, wanting a false confession; the threat of wanting false or pretense of wanting false confessions, to prevent exposure.

In other words, wanting or using the deception of wanting a false confession has the opposite or reverse effect, the victims ceases all communication or cooperation.

You would believe or think that torture is used to obtain the truth, but it’s actually used in many cases to do the opposite.

In some cases the confessions involve the psychological construction of “catch 22’s” or degrading themes and psychiatry or law enforcement.

Subtle Attacks: Hidden, Doubtful, Uncertain, and Psychological Defenses

Subtle attacks are usually used to destabilize a person and to get through or bypass the person’s psychological defenses. They can leave the victim unsure or uncertain on how to react or wondering if the subtle attack was intentional.

The use of something personal, sensitive, or private information is usually used to destabilize the victim and to make the person feel vulnerable and insecure.

Degrading themes are also used in subtle attacks.

Verbal Dialogue to Shut Down the Brain

When you are scared, angry, insecure, or uncertain your brain does not function as well.

When opponents engage in verbal dialogue they will sometimes try to intimidate, provoke, or make each other uncertain.

• One example is to try to throw your opponent on the defensive or psychological defensive. (linked to intimidation or manipulation)
• Another example is to use an ambiguity to make the person uncertain.
• Another example is to use subtle attacks to try to provoke anger, intimidate, fear, and uncertainty.

Anger: Anger Makes You Powerful or Stronger?

When psychological warfare is waged on someone, attempts are made to provoke reactions that are harmful to the victim such as anger.

Anger is the preferred reaction of choice because of the negative effects it has on the victims health and body such as increased adrenaline, cortisol levels, and blood pressure; and the victim can be psychologically manipulated or conditioned to react with anger or deceived into believing that this makes them more powerful or stronger.

Laughter is a great stress reliever and very health. It can also diffuse threats or tense situations.

The Funny Quick Brain

When people are calm, relaxed, or in a humorous mode their brains are usually faster and functions better.

Ambiguities: Self-Doubt and Uncertainty (A State-of-Limbo)

Humans do not like ambiguities and uncertainty, we like to have certainty and security, and ambiguities are often used to induce insecurity or uncertainty.

Sometimes ambiguities are used to confuse the victim and to leave them wondering what it is that they are suppose to do or be doing, or what is the intended meaning. This can affect the victim by placing them in doubt or used to induce self-doubt and uncertainty, reducing decision making abilities, and can also have the state-of-limbo affect.

The ambiguities can also be manipulated as to hinting at a certain meaning and then modified to hint or indicate another meaning, and so on, to keep the victim confused or guessing as to what the true meaning of the ambiguities are. This can induce confusion, frustration, and self-doubt.

Ambiguities can also be used for emotional manipulation such as inducing regret for example. One way this is done is by hinting at a certain meaning of what the ambiguities mean, combined with very subtle hints at another and different meaning. After a period of time the meanings can be reversed or what was the subtle meaning can be clarified or made more obvious to the victim to induce regret, self doubt, and also attack or reduce the victim’s self-esteem and self-confidence.

Classical conditioning can also be used with ambiguities. For example the victim can be constantly bombarded with negativity or is lead to the conclusion that past ambiguities also had a negative meaning. Because of the conditioning the person will deduce or assume what is implied follows the same trend or pattern of negativity or theme. Conditioning your mind Negatively or Positively

Song lyrics often use ambiguities so that the listener can apply the lyrics to their own life or view on reality. Ambiguities can also be used to influence a person’s view on reality or in combination with efforts to change a person’s view on reality.

Ambiguities: Inducing Self-Doubt and Attacks to Self-Confidence

A tactic that is often used to attack a person’s self-confidence and to induce self-doubt is to ask a question using an ambiguity, when the person answers with a deduction or guess, a negative wrong or no is indicated and a more accurate re-question is provided with the correct answer. This is done repetitively to induce self-doubt and attack a person’s self-confidence by having them believe that their conclusions or deductions are always false.

Metaphorical Speech: Hidden Threats and View on Reality Manipulation

Sometimes people will use metaphors and metaphorical speech to try to hide different threats or use words that are not obvious in their association to a threatening nature and try to reduce the risk of exposure or criminal evidence.

The meaning of different words can also be changed as with sarcasm. For example if two people that hate each other are using the words "I love you", the intention and meaning of the words used do not have the same meaning or intention as the definition of the words.

Metaphorical speech can also be used to change or manipulate the view on reality of a victim. For example metaphorical speech can be used to describe a certain view on reality or belief that is not the actual reality in an attempt to manipulate the person. Ideation in Suicide Factors

The words "profile", "psychoanalyzed", we are going to "fill you up" in the sense of creating a bad or false psychological profile and using psychiatry as a threat. The victim is psychologically harassed and also bombarded with degrading themes, such as pedophilia for example and combined with attempts to make the victims believe that they will be labeled a pedophile, sexually confused, or a violent, angry, and dangerous person. The truth and reality is that this tactic is used by the perpetrators in an attempt to protect themselves, discredit the victim, and prevent the victim form coming forward and exposing them.

Another example is referring to the victim as an animal such as a dog. The attempts made by the victim to expose the perpetrators are then metaphorically described as trying to "bite", like a dog, or "eat" the perpetrators. Using metaphors that are orally oriented are then re-directed towards or used with degrading themes in attempts to prevent victims from continuing the behavior of trying to expose perpetrators. This example of the victim being metaphorically described as a dog can also imply or insinuate that the person is less than human and can be controlled by a master or as a slave.

A better use of metaphors to describe the situation is that by trying to expose the perpetrators, the victim is using the light (exposure and visibility) and the perpetrators trying to use the darkness (deception and concealment).

When your enemy uses the darkness and tries to hide in the darkness, you have to use the light.

Interpretation and View on Reality Manipulation: The Workplace, The Media, Propaganda, Brainwashing

Event or Action -> Interpretation of Event -> Reinforcement of Interpretation
An event or reality -> interpretation of this event or reality -> reinforcement of interpretation and view on reality

In the workplace, employees who are psychologically harassed or psychologically tortured are often described as having the wrong interpretation of events, or having a "perception problem", a "bad attitude", and the wrong view of reality. They are then asked to consult a medical professional, a psychiatrist, and are then usually subsequently discredited and classified as having a psychological problem or mental illness.

You may have seen this in the media where something will happen, the media will interpret it in a way that is false according to other media groups or to your understanding of events and evidence, and will then proceed to try to reinforce their view and interpretation on reality or events and evidence.

Conflicting countries or organizations will often use what is called propaganda and their media to interpret their view on reality and events. For example the media in the US, Russia, Europe, China, and Asia may all have different interpretations of events and views on reality that they wish to induce in their audience.

Controlling a victim’s source of information and interpreting reality and events for the victim is also part of brainwashing technologies. An example of brainwashing and psychological attacks is Fear of Fear and Attacks to the Honor. A victim will be lead to believe that the fight-or-flight response is fear, they are then threatened which results in the fight-or-flight response, which is interpreted as fear, you were scared (showing fear to your enemy), and the victim’s honor is then attacked. Degrading Themes

Interpretations and evidence are not the same. For example if the interpretation of events is that Julius Caesar throw himself on the knifes of the Senators several times, that would contradict the evidence, so ignorance, intelligence, and the ability to interpret the events and evidence correctly and deduce the right view on reality is key and a factor.

Fear-of-Fear: Attacks to the Honor

Some people may feel that the feeling or emotion of fear attacks their honor. Fear is usually used to attack a person’s honor, ego, and self-confidence..

A tactic that is sometimes used, is to lead the victim to believe that to feel threatened, and the resulting fight-or-flight response, is fear. Therefore the more threatened they feel equals more fear. This tactic deceives the victim and attacks them in two ways. The first is to threaten them, causing the fight-or-flight response, and the second is to simply feel threatened attacks their honor, which results in a chain reaction of an increasing threat. This response results in social withdrawal where the victim tries to avoid threatening situations or public areas.

The way this is usually used is to make the victim believe that to feel threatened, and the fight-or-flight response, is fear. The visible signs of the body having the fight-of-light response, like adrenaline, are therefore signs of fear that show the individuals or the enemy threatening them that they are scared. This belief is used to attack the victim’s honor and the victim can be repetitively humiliated this way.

Movies or Audio that projects fear or the emotion of fear can also affect an individual.

In the circle of warriors, to experience fear and still destroy your enemies makes you even braver and increases your honor.

Fear-of-Humiliation

Fear-of-humiliation is linked or similar to fear-of-fear but different.

• Fear-of-fear is about fearing fear itself because to feel fear results in an attack to the person’s honor, which can result in humiliation.
• Fear-of-humiliation is fearing humiliation or being humiliated.

In both cases the person or victim can become aversive to situations or the possibility of being fearful or humiliated, usually through repetitive psychological attacks in public places. The result is that the victim can become aversive to public places, which can result in isolation.

Responsibility and Vulnerability

A stressful situation and tactic that is sometimes used to induce stress in a person is to give a person full responsibility for a department, for example, but the control to make changes or take action is given to someone else. This can have the effect of making the person insecure or feel vulnerable because they have no control over what they are fully responsible or accountable for, and it also places them at the "mercy" of someone else that can harm their career.

Ideation: To Manipulate Victims

People can be led to believe things that are false in order to manipulate them and even to try to drive them to suicide or to harm others.

For example a person can be led to believe that they are about to be fired or constantly on the verge of being fired to induce stress, paranoia, and insecurity. Another example is to lead the person to believe that they will be sued or going bankrupt, will be falsely accused resulting in prison time, will never be employed again, or lose their spouse.

Used with degrading themes the victim can be led to believe that they will be labeled a pedophile or used as a prostitute. That the perpetrators control the world and that the victim must obey.

Beneficial Intentions: To Deceive Victims

Some victims may not understand why someone would do this to them or how some people can do this to others, what the motives are for doing this to them, and therefore can be deceived into believing the phenomenon is of beneficial intentions.

The phenomenon of psychological harassment or warfare can also leave the victims in doubt or confused as to what is going on or what is the intention or purpose of these psychological manipulations, psychological attacks, and events in question are for. Are the intentions in some way benevolent for training purposes or self improvement. It can also leave the victim unaware that a psychological war is being waged on them and the doubt, confusion, and deception can result in preventing the victims from taking action or fighting back.

• It’s a test.
• It’s training.
• It’s to make you stronger or tougher.
• It’s an initiation or rite of passage.

Beneficial Intentions: The Failure Strategy

When a group with psychological warfare expertise targets a victim and tries to create situations, street theatre, scenarios, or events with the intention of embarrassing, humiliating, threaten, anger, induce fear, or other harmful effects they need a strategy to deal with the failure or failures if the events in question do not produce the desired outcome or result.

A failure of a group who tries to intentionally attack or humiliate a victim builds confidence in the victim for overcoming this challenge or properly dealing with the event in question, so there is a need to have a strategy or tactic to eliminate or reduce the confidence building phenomenon that results as much as possible. One of the ways this is done is by trying to make the victim believe the false view on reality or interpretation that it was a test, a training situation, and that there was or may have been some kind of benevolent intention in this kind of actions or scenario.

Beneficial Intentions: The Never Ending Test

One example for this strategy or tactic is to interpret the events as a test, the result is that the victim feels he is on a never ending test since these situations, events, and attacks are usually repetitive in this kind of on going psychological harassment or psychological war. Many of these tactics can also be considered to be psychological torture or used for psychological torture.

My Space, Your Space, Not Behind Me

A tactic that is sometimes used to make a victim feel vulnerable or more threatened, is to be threatened in some way and have the perpetrator stand directly behind them and out of view. Instinctively you would not want someone that is hostile towards you to stand directly behind you and out of view whether you feel threatened by the threats that were made or not.

You may have also noticed that when a person is hostile towards you and acts aggressively by thrashing or hitting objects it can trigger more of the fight-or-flight response from you. A similar tactic to the first, is for a person that is hostile towards you to motion an object towards you, towards your face, or to be in or come into "your space".

Staring Drills: To Provoke and Manipulate

Staring drills are used to intimidate, provoke, make a person aggressive, and to destabilize victims.

It’s linked to manipulation, credibility, and justification.

One technique is to simply stare at the victim and another is to whisper "you’re scared" and engage in staring contests.

The Domination Game: Who Dominates

Some people may worry or have stress about who they believe they can dominate or dominate and who they may or may not dominate. The word or metaphors "alpha male", as in wolf a pack, is also often used to describe a leader or someone in a leadership position. People in the workplace or in a relationship may continually try to dominate each other causing conflicts and tensions.

Domination can also be used as or in a psychological construction where a lot of importance is placed on who you dominate and this can result in a lot of stress and difficulties for people who think in terms of domination or have the "domination thing" in their head.

To remove this psychological construction or view on reality, you can simply view domination as ‘you do not dominate anyone and no one dominates you’. In the workplace, positions should be clearly defined as having authority or a leadership role. Employees need to fulfill their obligations as employees and when people are in a relation, the relationship is supposed to be based on teamwork and usually does not involve one partner having authority over the other.

Psychological Warfare or Manipulation: In Covert Type Investigations

Individuals can use words, actions, and sounds that will make a target recall memories associated to a specific event. Observers can note different reactions from the target such as fear, surprise, embarrassment (red face), anger, and different emotions. From these reactions the observers can obtain clues to the level of involvement or knowledge that the target may have about a certain event.

A simple example of this is if the targeted individual was involved in an event that has a specific location. The group can say the name of the location, like a street name. If the target does not associate this to anything or any memories, he will disregard the comments of strangers and have no reaction. If, however, the target does associate it to something, he may, or may not, have different reactions.

This scenario maybe repeated several times with different association pointers to get a better view or result. Like taking many measurements and obtaining some kind of average or again, a better view.

This psychological manipulation scenario can also be used to stress, or panic, a target. And a possible motive would be to have them use some kind of telecommunication device, that the target believes to be secure, and to possibly push the target to communicate to a partner, that may also be involved in the event, where he would discuss the strange phenomenon that he believes is happening to him or discuss the events in question. It’s a fact that in the US, Canada, and the UK there are secret organizations that listen to all telecommunications in these countries and that they also share information among themselves. Many people also believe that these organizations share information with other organization indirectly or through indirect channels.

There are many possible psychological manipulation type scenarios that can involve the use of sensitive information or dark secrets. You may have seen a movie where the “bad guy” says something like “get me some dirt on this guy”. The information would be used to intimidate the target or induce fear, stress, and paranoia. This type of scenario can easily fall into the classification of black mail where the target is in a catch 22 situation. The target would have to reveal the sensitive information or dark secrets to law enforcement in order to obtain some kind of help or assistance. His claims could also simply be dismissed as paranoia or delusions. And even if his claims would happen to be believed, there simply would be no proof or evidence.

Psychological warfare or using psychiatry in strong arm tactics is not a new phenomenon and it usually involves discrediting the target or having them declared psychologically ill. These tactics and technologies are usually used by powerful organizations. An example of this can be seen in the movie blue sky, set in the 1950’s, where the army uses psychiatry to hospitalize and medicate the target.

Psychological Warfare: Three Top Priorities or Objectives

• Discredit or destroy the victims credibility.
• Conceal psychological warfare knowledge.
• Eliminate the victim’s means of subsistence or resources.

Psychological Warfare: Some Identified Weapons

• Psychiatry to attack the psychological integrity and credibility of victims.
• The weapon of degrading themes or pedophilia to use as a threat or to prevent exposure.
• The weapon of high levels of stress and sleep deprivation.
• The weapon of homelessness or eliminating a persons means of subsistence and financial resources.

When psychiatry attacks the victim’s psychological integrity and credibility it makes the victim more vulnerable to the phenomenon or crime of criminal harassment or psychological warfare and it also conceals the related knowledge.
High levels of sleep deprivation can lead to macromineral deficiencies and acid-base disorders that can result in serious illnesses and even death.
High levels of sleep deprivation can also be used to overwhelm the victims body and lead to cancer.

Psychological Warfare: Credibility

Psychological warfare is an invisible technology that deals with the mind and destroying the victim’s credibility in order to prevent exposure is a top priority. Destroying the victim’s credibility also results in feelings or the belief of hopelessness.

Advanced technology and psychological manipulation are also used to make the victim’s claims more unbelievable or to make dismissing these claims easier or more justified.

When a group or an organization engages in psychological harassment or warfare they usually use tactics or operate in a way to discredit the victim or have the victim discredited by the medical community, notably psychiatry. Campaigns of disinformation or false information and information restrictions or isolation are usually used as well.

Psychological Warfare: Who can Contradict the Qualified Professionals

If psychiatry and psychologist claim that psychological warfare does not exist, who is qualified to contradict them or to say differently.

Over the years and decades qualified medical professionals, notably psychiatrists, and psychologist have been telling victims that psychological harassment and psychological warfare do not exist, and the victims were subsequently labeled as mentally ill. The phenomenon and its effects on victims was not documented given the fact that it was said not to exist and actually said to be a medical or mental disorder. The phenomenon of psychological harassment and psychological warfare was explained or interpreted in terms of the victim being ill and delusional instead of being a victim of this phenomenon.

With the power of the internet and websites such as this one, the denial of the existence of this phenomenon is probably quickly changing given the fact that it creates a problem or dilemma for the medical community or medical professionals that would continue this practice.

Psychological Warfare: Bullies and Criminals

As powerful as some bullies and criminals may be, just like the common or regular bully and criminal they fear the light and exposure.

Psychological Warfare: Powerful Organizations and Secrets

When powerful organizations are willing to kill you and other people to preserve its secrets and prevent exposure, you need to share that secret with the whole world.

It reduces the value of targeting you or the value of your death.

• Many organizations, including psychiatry, claim that psychological warfare does not exist and some powerful organizations are willing to kill in order to preserve this knowledge and to prevent exposure.
• This knowledge has been used to drive people to homelessness, suicide, and to cause death through high levels of stress and sleep deprivation.

It’s called crimes against humanity and society which is another very good reason to want to prevent exposure.

Psychological Warfare Pattern: Homelessness

Psychological Warfare -> Psychiatry and Credibility -> Homelessness

Victims are subjected to psychological warfare -> discredited by psychiatry -> lose their means of subsistence and become homeless.

Victims may also be coerced into prostitution, crime, or organized crime for survival.

Attack Pattern: Brainwashing or Deceiving and Conditioning the Fight-or-Flight Response to Mean Fear

Action -> Interpretation -> Re-enforce Interpretation : attack or threat -> interpretation of event or reaction -> re-enforce interpretation

• attack: a psychological attack or threat to get the fight-or-flight response.
• interpret reaction: the fight-or-flight response or adrenaline is interpreted as being fear "you’re scared".
• re-enforce interpretation: "you were scared" or "you got scared".

Participants try to deceive or brainwash the victim into believing that to feel threatened, adrenaline, or the fight-or-flight response means fear.
Fear is used to attack the victim’s honor and the victim’s honor is threatened if he shows fear or if his enemy sees fear.

In other words, attempts are made to deceive or brainwash the victim into believing that the fight-or-flight response is fear because it can be easily induced through threats and interpreted as fear, to attack the victims honor and repetitive humiliation, and to use the fear-of-fear tactic.

Fear and the fight-or-flight response are two different things:

• fear is an emotion.
• the fight-or-flight response is a response to a threat.

Attack Pattern: Public Places and the Cash Register

• A network of participants harasses and threatens the victim while the victim is doing his shopping.
• A degrading theme is used to put the victim on the defensive.

This is part of psychological warfare and also done to induce the fight-or-flight response, adrenaline.

• The line up at the cash register is a location where participants try to stand behind victims while they use threats or used threats in the shopping area, or use subtle threats related to degrading themes, to increase the fight-or-flight.
• Fear-of-fear and fear-of-humiliation are used or built up with comments such as "he’s scared" to induce more stress and anxiety.
• Once at the cash register the victim is in a "under a microscope" situation where the reactions and behavior are interpreted as fear.
• Subtle attacks related to degrading themes are used to cause embarrassment or blushing to destabilize or put the victim on the defensive.
• Because of threats, fight-or-flight response, and adrenaline the victim’s behavior or reactions are interpreted as fear to attack the victims honor and in attempts to humiliate the victim.
• Things that are focused on to interpret fear are the victim’s behavior, reactions, gestures, their voices, and their signatures.

• It’s a network that wages psychological warfare and uses threats to induce the fight-or-flight syndrome or cortisol and adrenaline.
• The fight-or-flight response, stress, cortisol, and adrenaline (potassium) deplete the body of macrominerals which leads to different disorders such as macromineral deficiencies and acid-base disorders.

Behavior: Anti-Social Behavior Change

A change in behavior towards being anti-social or withdrawal is a classic sign of psychological harassment or criminal psychological harassment.

A Criminal Harassment Network Routine Example (HSS Hypersonic Sound)

A routine example is that I would go to a grocery store when highly sleep deprived through sound technology (HSS), criminal harassment participants would mix in with other shoppers and use different forms of threats and provocation to induce stress and adrenaline, try to stand directly behind me at the cash register, and interpret the adrenaline and voice fluctuations as fear, which is linked to fear and honor, and attempts at repetitive humiliation.

Criminal Harassment Network Routines, Strategies, and Smear Campaigns

criminal harassment network routines, strategies, and smear campaigns that involves psychological manipulation, technology, and uttering threats.

Workplace Psychological Harassment and Criminal Harassment Network Strategy (Abuse Strategy)*

A workplace psychological harassment strategy, abuse, any retaliation is used to justify termination so the employee is on the defensive when faced with abuse. The same strategy of abuse is used by their criminal harassment network, the "secret police" or mob and police, criminal harassment through technology, focused ultrasound and energy assault weapons, different types of radar assaults from neighboring homes, public places, weaponization of space, over months aimed at inflicting long term serious illness and deadly cancer. The targeted citizen is on the defensive again, any claims of assaults results in incarceration through police psychiatric intervention, any retaliation or violence is used to incarcerate the targeted citizen, any gun violence is used to advocate gun control, a defenseless population to subjugation through organized crime and tyranny.

Criminal Harassment Network Strategy (Marie-France Hirigoyen, Abuse Strategy)

According to Marie-France Hirigoyen psychiatrist the intent of many emotional abusers is to systematically "destabilize" and confuse their victims (with irrational, threatening behavior that preys on the victim’s fears and self-doubts), to isolate and control them and ultimately to destroy their identity, and often emotional abuse builds over a long period of time until it becomes so unbearable that victims lash out in frustration and anger aka hitting back, only to appear unstable and aggressive themselves, which could be linked to or the cause of rage shooting and rampages.

Often, emotional abuse builds over a long period of time until it becomes so unbearable that victims lash out in frustration and anger, only to appear unstable and aggressive themselves. — This, according to Hirigoyen, is the intent of many abusers: to systematically "destabilize" and confuse their victims (with irrational, threatening behavior that preys on the victim’s fears and self-doubts), to isolate and control them and ultimately to destroy their identity. — psychiatrist Marie-France Hirigoyen, author of Le harcèlement moral

Criminal Harassment Network Strategy (Damage, Provocation, Rampage)

Pushing people to violence consist of abuse or inflicting a damage, financial loss, homelessness, smear campaign and criminal record, serious illness and cancer, fear linked to honor and repetitive humiliation, and using provocation to push people to aggressiveness, looking deranged or enraged, or violence. Any resulting violence is used to repress the targeted citizen and any rage shooting is used to advocating gun control, a defenseless population, which makes citizen more vulnerable to abuse, hidden abuse, or subjugation through organized crime.

A Criminal Harassment Network Routine (Repetitive Humiliation)

A routine example is that I would go to a grocery store when highly sleep deprived through sound technology (HSS Hypersonic Sound), criminal harassment participants would mix in with other shoppers and use different forms of threats and provocation to induce stress and adrenaline, try to stand directly behind me at the cash register, and interpret the adrenaline and voice fluctuations as fear "you’re scared", which is linked to fear and honor, and attempts at repetitive humiliation.

A Criminal Harassment Network Routine (Psychiatric Intervention)

Criminal Allegations of uttering threats are combined with powerful radar assaults and assessment orders for non-criminal responsibility before trial. The threat of intervention is linked to behavior that can be used to justify psychiatric intervention that leads to incarceration during the long and delayed criminal proceedings. The behavior linked to taking protective measures against the powerful radar assaults through attenuation materials and a person’s personal and household hygiene that begins to suffers due to attempts to avoid these. The criminal harassment network routine of threats to induce adrenaline and cortisol, trying to standing directly behind the victim at the cash register, and interpret the voice fluctuations as fear is changed to threats of psychiatric intervention that leads to incarceration, participants trying to smell the victim, saying "he smells bad", and criminal harassment participants theater or pretense that they are undercover psychiatrist who wants to intervene and incarcerate the victim of criminal harassment.

Criminal Harassment Network Smear Campaign Strategy ("Run Away or Get Cancer")*

After allegations of uttering threats and an assessment order for non-criminal responsibility before trial the targeted citizen is assaulted with powerful radar with criminal harassment participants saying "run away or get cancer". When the targeted citizen runs away they are recaptured and incarcerated for the assessment order, during long and delayed criminal proceedings, isolated, vulnerable to participating defense lawyers and financial exhaustion or depletion strategies "non-criminal responsibility before trial saves money and the same as being innocent".

Criminal Harassment Network Smear Campaign Strategy (Uttering Threats)

One psychological manipulation that criminal harassment participants try to do is to try to lead the targeted citizen to believe that if they act aggressive the participants will be fearful, which is combined with the criminal harassment networks routine of attempting to induce fear and interpret voice fluctuations as fear, and linked to manipulating the targeted citizen into reacting to this through aggressiveness and their own attempts to induce fear in return. It is a psychological manipulation and attempt at conditioning towards an aggressive response or retaliation from threats, which is supposed to eventually lead to more aggressive behavior and uttering threats, and the crime of uttering threats is linked to the smear campaign strategy.

Criminal Harassment Network Smear Campaign Strategy (Uttering Threats, Neighbors)

Following the allegations of uttering threats that are combined with powerful radar assaults from neighboring homes, provocation is used through sound technology along with the assaults, a cancer causing weapon, and attempts at manipulation the targeted citizen to threaten, retaliate, or utter threats towards neighbors, which can be linked to police surveillance of a "dangerous individual", another charger of uttering threats, and incarceration without release during the proceedings.

Criminal Harassment Network Smear Campaign Strategy (Uttering Threats, Online Activity, Lash Out in Anger, Cyberbullying)

This strategy is similar to the "Uttering Threats, Neighbors" strategy but also includes the threat of civil lawsuits and the new cyberbullying law. After wrong doing citizens want to denounce perpetrators of wrong doing, if they are isolated they will do so online. The strategy is the same as the previous, powerful radar assaults that are combined with provocation through sound technology, which leads to anger, which can lead to lashing out or uttering threats online and defaming those involved, the police and crown prosecutors. For this new online routine to work the freedom of expression needed to be weakened and a new cyberbullying law was needed to give victims the tools to obtain the IP address for a civil lawsuits, or to use these for threats to prevent online denunciation and exposure by the perpetrators, the criminal harassment network organized crime participants. (Marie-France Hirigoyen psychiatrist)

Criminal Harassment Network Smear Campaign Strategy (Uttering Threats, Addressing Constitutional Questions)

The powerful radar assaults prevent civil lawsuits that follow false allegations or a failed smear campaign to recover the financial loss in the costly criminal proceedings, addressing constitutional questions that involve uttering threats and the freedom of expression, and circumventing the right to a trial through non-criminal responsibility before trial.

Repression of Workplace Psychological Harassment Knowledge Linked to Criminal Harassment Networks? – (Repression, Knowledge, Human Right Defenders)

One strategy of workplace psychological harassment is to engage in this behavior and emotional abuse in attempts to destabilize an employee so that they lash-out in anger only to look deranged and aggressive, through violence, uttering threats, sabotage, etc., to get rid of them. The strategy of criminal harassment networks are very similar but instead of an employer being the "workplace police" and getting rid of the employee the city police are the ones who file criminal allegations towards the victim of criminal harassment. These criminal harassment networks use criminal harassment and psychological manipulation in attempts to use the criminal allegation charge of of uttering threats for any targeted citizen that lashes out in this way or is manipulated towards this behavior, similar to the workplace psychological harassment strategy. This strategy may be one of the explanations for why workplace psychological harassment knowledge and human right defenders who document these issues are targeted, repressed, inflicted with cancer, etc.,. Any resulting violence is used to repress the targeted citizen and any rage shooting is used to advocate gun control. (see Rage Shooting Factors)

Criminal Harassment Network Strategy (Eliminate Functionality)

Criminal harassment networks are linked to the city Police, city Court House, "secret police", and regimes. These try to eliminate the means of subsistence of targeted citizens pre-criminal allegations or during criminal proceedings to reduce the targeted citizens ability to defend themselves and their (functionality). They are using sound technology from neighboring homes, LRAD systems and HSS Hypersonic Sound, to highly sleep deprive targeted citizens, incapacitate them, and eliminate their (functionality), and powerful radar assaults from neighboring homes linked to deadly cancers that targeted citizens try to avoid, which reduces or eliminates their (functionality).

Notes: They eliminate a citizens ability to function during criminal proceedings, which can be linked to intentionally delaying and extending the proceedings as long as possible in attempts to win convictions. The powerful radar assaults are linked to other strategies already mentioned "run away or get cancer" to incarcerate a person during the proceedings, police and psychiatric intervention for the resulting behavior linked to radar assaults, to circumvent the right to a trial and make an unlawful seizure of private computers legal through non-criminal responsibility before trial, and to inflict deadly cancers on a long term, which makes targeted citizens vulnerable to coercion similar to homelessness and are hidden homicides. All of these facts are linked to regimes but another link is advocating a defenseless population that makes the population more vulnerable to abuse, helps conceal abuse, repressing human rights defenders that document mobbing, bullying, cyberbullying, and hidden homicides through cancer that are linked to claims of a "low homicide rate".

The Rundown, Setups and Deception (video)

A video clip that illustrates a setup and deception, a psychological manipulation.

http://ireport.cnn.com/docs/DOC-883414

Disclosure, Psychological Harassment Office Tactics (video)

A movie scene that illustrates different office psychological harassment tactics.

a) In the movie scene the targeted employee, the victim of psychological harassment, is given the wrong time for the meeting. The result:
– he is late and looks unprofessional in front of his piers.
– he is not prepared for the meeting, "ambushed", cannot answer questions, and looks incompetent.
– he is given the lowest chair, sitting below the others who look slightly down on him.
– other links, degradation and humiliation.

http://ireport.cnn.com/docs/DOC-763718

An Example of the Pedophilia Weapon (video)

A movie scene of a threat and the pedophilia weapon.

http://ireport.cnn.com/docs/DOC-707776

Criminal Strategy Examples, Motive Incarceration, No Trial, Personal Hygiene and Degrading Themes, Repression Through Cancer (Powerful Radar Assaults)

Criminal allegations are combined with radar assaults along with insinuations the accused is dangerous.

THE FIRST STRATEGY — MENTAL ILLNESS, DISCRIMINATION, ASSESSMENT ORDERS, THE RIGHT TO A FAIR TRIAL

The first strategy uses assessment orders before trial, disability and mental illness, and participating psychiatrists to circumvent the Canadian Charter of Rights and Freedoms.

The strategy is linked to smear campaigns and using assessment orders for non-criminal responsibility of committing a crime due to mental illness before trial when the accused has not committed a crime. It uses ignorance or the claim that being not guilty of committing a crime due to mental illness is the same as simply being not guilty. The accused does not go to trial or get a trial.

THE TWELFTH STRATEGY — POWERFUL RADAR ASSAULTS

Similar to the use of homelessness to repress and circumvent the rights and freedoms of targeted citizens, powerful radar assaults are used to repress targeted citizens through homelessness, different linked strategies such as smear campaigns, and serious illness, cancer.

DISABILITY, INTERVENTION AND VULNERABILITY, Example 8 a) (Personal Hygiene, Motive Incarceration and Degrading Themes)

a) Following a demand that the accused remain incarcerated for psychological evaluation that fails and a conditional release with a demand for an assessment order for non-criminal responsibility that succeeds, the accused is assaulted by powerful radar leading to strange behavior, deteriorating personal hygiene as they try to avoid these and attempts to shield themselves from these through the use of dense materials, the police try to intervene, which leads to incarceration during the proceedings and the "unlawful" assessment order before trial.

Disability, Intervention and Vulnerability Scenario Illustration Example, Motive Incarceration (8 a))

After being released under conditions and an "unlawful" assessment order for non-criminal responsibility before trial, I was assaulted by powerful radar. The Police tried to intervene several times claiming the behavior linked to shielding and attenuation attempts, "microwaves?", was not normal, which would result in my incarceration at the prison psychiatric institute. — I was later found "guilty" without a trial through "non-criminal responsibility", which sanctioned the false allegations, searching my home without a warrant, seizing personal computers and information without a warrant, communication interception and surveillance, ..

Repression Through Smear Campaigns and Serious Illness, Cancer

1. radar assaults
2. criminal allegations (participants and uttering threats)
3. insinuations that accused is dangerous
4. "plead non-criminal responsible before trial, it is the same as not guilty" "you have to turn" "you have to run" run away or get cancer, threats of intervention, incarceration, assessment orders,, cancer, homelessness.
5. preventing lawsuits

Criminal Harassment and Threats (Focused Ultrasound)

A video about Focused Ultrasound that can "hit the brain", cause brain lesions, strokes, and heart attacks.

http://ireport.cnn.com/docs/DOC-747227

Focused Ultrasound for use in the medical field as shown in the video may be in use as a domestic weapon according to some reports to "hit the brain", causing damage and brain lesions to inflict strokes and heart attacks, a weapon that leaves very little evidence similar to another weapon in use, powerful radar assaults, which are linked to leukemia and other deadly cancers like lung cancer.

The 2005 Award Winning sound technology HSS Hypersonic Sound that creates sound at great distances and in specific targeted locations may be linked given the same type of technology involved, focused ultrasound.

Criminal harassment and threats, the mob wanting to remove your brain or "hit your brain" to prevent exposure or linked to repression through serious illness, strokes and heart attacks, similar to how powerful radar assaults are linked to repression through serious illness, cancer.

Racial Profiling, DiscriminationRacial profiling is linked to strategy, manipulation, interpretations, false pretenses, and discrimination has serious effects on a person’s psychological and physical health.

THE THIRTEENTH STRATEGY, RACIAL PROFILING — There has been a lot of talk about racial profiling but it has been rejected by most judicial system courts because of its link to discrimination. — Similar to a strategy to create false profiles by the mob to help in future prosecutions that was previously mentioned, racial profiles and other types of profiles can be fabricated and created simply to justify different actions linked to abuse or circumventing the rights and freedoms of citizens. — Imagine a racial profile that claims a specific ethnic is more likely to be involved in drug trafficking and a racial profile is used to justify a search without a warrant, circumventing the need for a warrant for a lawful search and seizure.

Criminal Allegations, Threats of Intervention, Criminal Harassment Network Strategy

"Intervention and incarceration[2], the criminal harassment network that the defendant has been documenting for several years used the threat of intervention extensively during this period of time. The threat of intervention is linked to behavior, protection measures against the powerful radar assaults, and personal hygiene that begins to suffers due to attempts to avoid these. — (So the public criminal harassment routine of threats to induce adrenaline and cortisol, trying to standing directly behind the victim at the cash register, and interpret the voice fluctuations as fear is changed to threats of intervention, participants trying to smell the victim, saying "he smells bad", .. and every criminal harassment participant is an undercover psychiatrist who wants to intervene and incarcerate the victim of criminal harassment.)"

THE TWELFTH STRATEGY — POWERFUL RADAR ASSAULTS

Thermal imaging (FLIR thermal imaging device, Privacy , R. v. Tessling, 2004 SCC) and radioactive isotopes are used to circumvent the privacy of a home, in a similar way radiation technology or powerful radar assaults linked to deadly cancers, death, on a longer term than other deadly weapons are used to assault a citizen with a weapon in their own home to circumvent the right to security, the right to liberty linked to psychiatric intervention leading to incarceration, and on a long term the right to life.

The twelfth strategy is linked to the first strategy, the use of non-criminal responsibility to circumvent the right to a fair trial, and the seventh strategy, the use of intervention leading to incarceration to circumvent the right to liberty.

MEDICAL NEWS ARTICLES, PHYSICAL AND PSYCHOLOGICAL EFFECTS

The Damaging Effects Of Discrimination – Medical News Today (article link)

Researchers found that adolescents from Latin American and Asian backgrounds experienced more discrimination than their peers from European backgrounds and that the discrimination came not only from other adolescents but from adults as well.

The level of discrimination also impacted these teens’ grade-point averages and their health and was associated with depression, distress and lower levels of self-esteem.

http://mnt.to/f/3JNN

Discrimination Often Leads To Declining Physical Health For Obese Individuals – Medical News Today (article link)

The discrimination that obese people feel, whether it is poor service at a restaurant or being treated differently in the workplace, may have a direct impact on their physical health, according to new research from Purdue University.

"Obesity is a physiological issue, but when people have negative interactions in their social world – including a sense of being discriminated against – it can make matters worse and contribute to a person’s declining physical health,"

"It seems that many people are internalizing the prejudice and stigma they feel, and it contributes to stress, which ultimately affects their health."

http://www.medicalnewstoday.com/articles/218080.php

Social Stressors Like Racism And Discrimination Can Impact Healthy Functioning – Medical News Today (article link)

Just as the constant pressure soldiers face on the battlefield can follow them home in the form of debilitating stress, African Americans who face chronic exposure to racial discrimination may have an increased likelihood of suffering a race-based battle fatigue, according to Penn State researchers.

http://www.medicalnewstoday.com/articles/218209.php

Anti-Gay Rhetoric Causes Psychological Harm and Suicides – CNN iReport (video)

A video that first shows Anti-Gay Rhetoric linked to hate and rejection followed by a video that shows IT GETS BETTER participants discuss how they felt and suicide.

http://ireport.cnn.com/docs/DOC-636548

(see also COERCIVE MIND CONTROL TACTICS, DEPRESSION AND SUICIDE PREVENTION, STRESS AND STRESS MANAGEMENT)

Alphas, Influence of the Mind Illustration, Suicide Factor

http://ireport.cnn.com/docs/DOC-907894

A video that illustrates psychological manipulation or a homicide through suicide method used in Canada by the regimes criminal harassment network. They use misery, hardship, depression, hate and rejection, .. , combined with repetitive suggestions to kill yourself, hang yourself, through participants and focused ultrasound technology. Repealed in Canada in 1999.

YouTube Channel

See the Bullying and Workplace Psychological Harassment playlists for more videos.

http://www.youtube.com/user/BullyingNewsVideos

CNN IREPORT

Psychological Harassment and Psychological Manipulation

http://ireport.cnn.com/docs/DOC-361102

SURVEILLANCE /// Snowden : NSA employees routinely pass around intercepted nude photos


"These are seen as the fringe benefits of surveillance positions," Snowden says.

LOVEINT: On his first day of work, NSA employee spied on ex-girlfriend

New letter from NSA oversight to senator details 12 instances of obvious abuse.

Edward Snowden has revealed that he witnessed “numerous instances” of National Security Agency (NSA) employees passing around nude photos that were intercepted “in the course of their daily work.”

In a 17-minute interview with The Guardian filmed at a Moscow hotel and published on Thursday, the NSA whistleblower addressed numerous points, noting that he could “live with” being sent to the US prison facility at Guantanamo Bay, Cuba. He also again dismissed any notion that he was a Russian spy or agent—calling those allegations “bullshit.”

If Snowden’s allegations of sexual photo distribution are true, they would be consistent with what the NSA has already reported. In September 2013, in a letter from the NSA’s Inspector General Dr. George Ellard to Sen. Chuck Grassley (R-IA), the agency outlined a handful of instances during which NSA agents admitted that they had spied on their former love interests. This even spawned a nickname within the agency, LOVEINT—a riff on HUMINT (human intelligence) or SIGINT (signals intelligence).

“You’ve got young enlisted guys, 18 to 22 years old,” Snowden said. “They’ve suddenly been thrust into a position of extraordinary responsibility where they now have access to all of your private records. In the course of their daily work they stumble across something that is completely unrelated to their work in any sort of necessary sense. For example, an intimate nude photo of someone in a sexually compromising position. But they’re extremely attractive.

“So what do they do? They turn around in their chair and show their co-worker. The co-worker says: ‘Hey that’s great. Send that to Bill down the way.’ And then Bill sends it to George and George sends it to Tom. And sooner or later this person’s whole life has been seen by all of these other people. It’s never reported. Nobody ever knows about it because the auditing of these systems is incredibly weak. The fact that your private images, records of your private lives, records of your intimate moments have been taken from your private communications stream from the intended recipient and given to the government without any specific authorization without any specific need is itself a violation of your rights. Why is that in a government database?”

Then Alan Rusbridger, The Guardian’s editor-in-chief, asked: “You saw instances of that happening?”

“Yeah,” Snowden responded.

“Numerous?”

“It’s routine enough, depending on the company that you keep, it could be more or less frequent. These are seen as the fringe benefits of surveillance positions."

Update 5:27pm CT: In an e-mail sent to Ars, NSA spokeswoman Vanee Vines wrote: "NSA is a professional foreign-intelligence organization with a highly trained workforce, including brave and dedicated men and women from our armed forces. As we have said before, the agency has zero tolerance for willful violations of the agency’s authorities or professional standards, and would respond as appropriate to any credible allegations of misconduct."

However, she declined to respond to direct questions as to the veracity of Snowden’s allegations or if anyone at NSA had ever been terminated or otherwise punished for engaging in such behavior.

SURVEILLANCE /// VİDEO : Deborah Tavares’ Psychotronics 4th of July Special


VİDEO LİNK :

https://www.youtube.com/watch?v=2-2d6Nt9DFI&feature=youtu.be

SURVEILLANCE : 1/3 of All Americans Already Implanted with RFID Chip


In a shocking study it was recently revealed that 1 in 3 individuals tested had an active RFID in them, and they were unaware of it

In a publication from the Wyoming Institute of Technology (WIT) “Analysis of Radio Frequency Identification (RFID) Chip Prevalence in 3 Discrete United States Populations“, it has been reported that doctors tested 2955 Americans from different geographic locations and walks of life.

The test subjects were stripped down and scanned bodily to see if RFID chips could be detected.

From the abstract: (emphasis ours)

“Radio Frequency Identification (RFID) Chips have been used extensively in wildlife ecology and conservation to identify and track individual specimens in a population. It has been unknown, however, how often RFID chips have been implanted in human populations for the tracking and identification of individuals. This study analyzed the prevalence of RFID Chips in 3 geographically discrete populations and found that, on average, 1 in 3 individuals carried an RFID Chip. Interestingly, there was a strong correlation with RFID Chip presence and previous dental work.”

Far from knowingly implanting the RFID chips in their hands as is often reported in the media, the majority detected by the researchers were from dental work – fillings, bridges, crowns, etc. The chips are often inserted during the manufacturing process, and the patient is never aware of its existence.

A report on RFID implants from The Open Dentistry Journal explains:

A general dentist without any special training or assistance from a laboratory technician can easily perform the incorporation of a microchip transponder in a denture and the procedure is extremely economical. Its inclusion offers many benefits in dental prosthetic labeling; allowing not only the storage of patient’s medical records on a searchable database, but also information on the materials used and so providing traceability. Ultimately the chip could play an invaluable forensic role in assisting with human identification.

In the end, the WIT researchers conclude, “Our work has shown that approximately 1 in 3 individuals in the United States is carrying an RFID microchip.”

Being implanted without knowledge or giving permission is not a new phenomenon. For years people have claimed to have inexplicable implants, but are often ridiculed or dismissed. Anthony Gucciardi from Activist Post writes about a man who took legal action against a government hospital for microchip implant:

A Danish man has filed a writ against Alexandra Hospital for secretly implanting a microchip inside of his body during a 1988 operation, which he says later caused him to hear voices.

After being stabbed in the lung, Mr. Mogens Tindhof Honore received surgery at the hospital in his chest and lung. Later, in 1997, X-rays revealed a metal instrument akin to a microchip present in his left lung. At the time of the operation, Alexandra Hospital was a government hospital under the Ministry of Health.

The former seaman said that after being discharged from the hospital in 1988, he kept hearing voices in his head and could not lead a normal life. In addition to feeling unwell and coughing up blood, Mr. Honore said that strange individuals would walk up to him on the street and speak to him about outlandish subject matters.

Honore may have been implanted with an RFID chip

’(Mr Honore) also discovered and experienced that strange people on the streets would approach and speak to (him) about strange subject matters or pass strange irrelevant comments,’ according to the papers filed.

Feeling constantly tracked and plagued by unusual medical problems, Mr. Honore felt a “perpetual state of apprehension and fear for the safety of his life.” Unable to hold his job and live a normal life, Honore returned to Alexandra Hospital in order to investigate his condition. The hospital turned him away, stating that they had no record of his stay.

[…]

In a shocking study it was recently revealed that 1 in 3 individuals tested had an active RFID in them, and they were unaware of it

In a publication from the Wyoming Institute of Technology (WIT) “Analysis of Radio Frequency Identification (RFID) Chip Prevalence in 3 Discrete United States Populations“, it has been reported that doctors tested 2955 Americans from different geographic locations and walks of life.

The test subjects were stripped down and scanned bodily to see if RFID chips could be detected.

From the abstract: (emphasis ours)

“Radio Frequency Identification (RFID) Chips have been used extensively in wildlife ecology and conservation to identify and track individual specimens in a population. It has been unknown, however, how often RFID chips have been implanted in human populations for the tracking and identification of individuals. This study analyzed the prevalence of RFID Chips in 3 geographically discrete populations and found that, on average, 1 in 3 individuals carried an RFID Chip. Interestingly, there was a strong correlation with RFID Chip presence and previous dental work.”

Far from knowingly implanting the RFID chips in their hands as is often reported in the media, the majority detected by the researchers were from dental work – fillings, bridges, crowns, etc. The chips are often inserted during the manufacturing process, and the patient is never aware of its existence.

A report on RFID implants from The Open Dentistry Journal explains:

A general dentist without any special training or assistance from a laboratory technician can easily perform the incorporation of a microchip transponder in a denture and the procedure is extremely economical. Its inclusion offers many benefits in dental prosthetic labeling; allowing not only the storage of patient’s medical records on a searchable database, but also information on the materials used and so providing traceability. Ultimately the chip could play an invaluable forensic role in assisting with human identification.

In the end, the WIT researchers conclude, “Our work has shown that approximately 1 in 3 individuals in the United States is carrying an RFID microchip.”

Being implanted without knowledge or giving permission is not a new phenomenon. For years people have claimed to have inexplicable implants, but are often ridiculed or dismissed. Anthony Gucciardi from Activist Post writes about a man who took legal action against a government hospital for microchip implant:

A Danish man has filed a writ against Alexandra Hospital for secretly implanting a microchip inside of his body during a 1988 operation, which he says later caused him to hear voices.

After being stabbed in the lung, Mr. Mogens Tindhof Honore received surgery at the hospital in his chest and lung. Later, in 1997, X-rays revealed a metal instrument akin to a microchip present in his left lung. At the time of the operation, Alexandra Hospital was a government hospital under the Ministry of Health.

The former seaman said that after being discharged from the hospital in 1988, he kept hearing voices in his head and could not lead a normal life. In addition to feeling unwell and coughing up blood, Mr. Honore said that strange individuals would walk up to him on the street and speak to him about outlandish subject matters.

Honore may have been implanted with an RFID chip

’(Mr Honore) also discovered and experienced that strange people on the streets would approach and speak to (him) about strange subject matters or pass strange irrelevant comments,’ according to the papers filed.

Feeling constantly tracked and plagued by unusual medical problems, Mr. Honore felt a “perpetual state of apprehension and fear for the safety of his life.” Unable to hold his job and live a normal life, Honore returned to Alexandra Hospital in order to investigate his condition. The hospital turned him away, stating that they had no record of his stay.

[…]

In June 2011, Honore underwent an operation at Mount Elizabeth Hospital to remove the fragment.

The numbers of c hipped individuals must surely be on the rise in the U.S. and worldwide, as tracking chips are being used in many various fields, and patients and their families are lining up to receive them.

In June 2011, Honore underwent an operation at Mount Elizabeth Hospital to remove the fragment.

The numbers of c hipped individuals must surely be on the rise in the U.S. and worldwide, as tracking chips are being used in many various fields, and patients and their families are lining up to receive them.

VİDEO LİNK :

http://www.youtube.com/watch?feature=player_embedded&v=d4aBIti2nKU

SURVEILLANCE : Interview with Guardian correspondent Ewen MacAskill


VİDEO LİNK :

%d blogcu bunu beğendi: