NSA Mind Control and Psyops
by Will Filer (http://www.apfn.org/apfn/MC.htm)
The following document, sent to me by a Targeted Individual in Virginia, is absolute dynamite! Please read and re-read this explanation of U.S. government-sponsored mind control! The combined usage of secret weapons technologies, religious/Biblical scripts, hypnosis, and drugs, etc. for the purposes of mind controlling politicians, innocent civilians, and many others is beyond unethical and criminal. It is diabolically evil. The “perps,” including innumerable U.S. government agencies and employees (and their paymasters), must (SOON!) be brought to account for these crimes against humanity.
The following was sent to me by Will Filer Esuemail@example.com on July 27, 1999. It offers a new explanation for government mind control. Will
has stated to me that he is a former consultant to the U.S. National Security Agency and asked me to post this information immediately. He
also believes he is in immediate danger because of this information.
“Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.”
1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA’s Behavioral Modification Procedure Outline documented for the non-technical person.
2. TECHNOLOGY TITLE:
1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. “Computer Simulated Subconscious Speech Language”.
1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen’s opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.
1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).
3. Behavior Modification and Accelerated Re-socialization:
1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.
2. The NSA uses this technology to re-socialize (brainwash) the US civilian voting population into “Giving their lives to Christ” (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a “Personal Relationship with Jesus Christ” (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.
4. DEFINITIONS AND ACRONYMS:
1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.
2. Hypno-amnesia: Temporary loss of memory due to a posthypnotic suggestion.
3. NSA: United States National Security Agency, Fort Mead, Maryland.
4. ODO: On-Duty Officer, or officer-on-duty.
5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term “Command” is more commonly used when the hypnosis is forcibly given to the subject and when the subject’s will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the “Suggestion” any longer thereby making it a “Command”.
6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.
7. Posthypnotic Suggestibility Index: An index or rating of a subject’s susceptibility and sensitivity to hypnosis.
8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.
9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;
(1) an identifier (subject’s name, description, or other identifying factor),
(2) trigger activation condition or conditions (when, what or how the suggestion will trigger),
(3) the content (what the trigger will precipitate in the perception of the subject),
(4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to “strengthen” or reinforce the central posthypnotic command.
10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.
11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject’s subconscious mind.
12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject’s site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.
5. TECHNOLOGY OVERVIEW:
1. In addition to the ability to see and hear what is going on inside people’s homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.
2. Thought Labels (Response Labels):
1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or “read minds” so to speak.
2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation “thought labels”.
3. Post-Hypnotic Delivery Method:
1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. “How can hypnosis be used?” you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words “Drink Coca Cola” were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.
2. In the early years of this technology, the NSA originally recorded
a spoken posthypnotic suggestion message into a tape deck and sped it
up by speeding up the tape. This process was labor intensive,
required each officer to have excellent diction and mastery of the
language and dialect required, and was of poor quality due to
background noise and the delay in timing during recording and
processing. It also required extensive training to assure that each
officer spoke at the same rate of speed so that the resulting “sped-
up” script was delivered at the correct speed. Now computers are used
to append digitized samples of optimized, ideal phonemes together to
form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the variety of
languages on the planet, phonetic elements from each language and
distinct dialect are sampled, digitally edited to optimize them, and
appended during delivery to form words and words arranged to make
sentences in the from of scripts that resemble hypnotic suggestions.
The empty space between words is minimized and pitch rise is
compressed and filtered. Repetitive sine waves are also removed from
the phonetic element’s acoustic wave train thus reducing the actual
number of sine waves making up a word by 50% or more. This reduces
the actual length of the time it takes the phoneme to be delivered
prior to accelerating (speeding-up) the delivery (like fast forward).
This helps the message to be played at higher speeds and reduces the
subject’s ability to recognize it as accelerated speech. The
technique of using optimized digitally sampled and edited phonemes
appended together to for words and then sentences structured as
hypnotic suggestions can be termed “computer simulated subconscious
4. The subconscious mind is also very sensitive. It can hear things
that the conscious mind ignores. If you have watched television, you
have probably noticed that there are many “subliminal tapes” on the
market to program your subconscious mind. These tapes have their
“messages” recorded/hidden in the sounds of ocean waves, music, or
other sounds but they are not sped-up to subconscious delivery speeds
and are therefore not very effective. The subconscious mind can hear
and discern the message even when there is background noise like
waves, cars, planes, or even when someone else is speaking to you in
normal conversation. Your conscious mind won’t hear anything unless
it is very quite in the house. If you are very attentive you may hear
what sounds like a low-pitched tape on fast forward, and played at
low volume. This is the sound of the NSA’s high-speed audio
5. This modification of the phonetic elements, played at low volume,
combined with the environmental background noise makes it very
difficult for a subject to record the NSA message. Even if the
subject were to effectively record the message, it is very difficult
to filter (separate) the NSA’s message from background noise. Then,
reconstructing the missing sine waves from the acoustic wave train
and slowing the message down to discern the actual content of the
“posthypnotic” script with the conscious mind would be nearly
impossible for the average citizen. To briefly summarize, the subject
would have no chance in analyzing a NSA message without the following
1. Professional state-of-the-art technology recording equipment.
2. Digital acoustic wave editing equipment.
3. Advanced engineering knowledge of acoustic wave science.
4. Phonetics and linguistics expertise.
5. Hypnosis theory and scripting.
6. Ideal environmental conditions for recording.
7. NSA ignorance of the subject’s intent and ability to capture a
6. This technology is the perfect intelligence tool. It is nearly
impossible to detect or measure, difficult to trace back to the NSA.
The symptoms that the NSA can “program” or inflict into the subject
can cause fear that they might be thought to be insane if they were
to report the NSA activities. The subject does not know the source of
the technology or the technology itself, the subject has no proof or
evidence, only their perception, suffering, and isolation.
Additionally, potential recourses that are available to the subject
can be interrogated out and preventative actions taken by the NSA to
further isolate or disable the subject.
4. Using the Post-Hypnotic Delivery Method with Thought Labels:
1. The NSA technique is simple; they transmit their human programming
message through the audio-visual electronic surveillance equipment
installed in your home, car, or office to you. The subliminal message
delivered to you could be “Mr. Jones, imagine that the IRS were
auditing your taxes. Think back to a time you have cheated on your
taxes and that you are worried that the IRS might find out in an
audit. If you have never cheated on your taxes and have nothing to
fear you will feel an itch on your right-hand ear lobe that will go
away when you scratch it. If you can be caught by an IRS audit, you
will feel an itch in the left nostril of your nose that will
disappear after you itch it twice.” From your perspective, you have
just had a fleeting thought about your past tax returns and had an
innocent itch (thought label). To the NSA Officer On Duty (ODO), you
have just communicated to him whether you have ever:
1) cheated on your taxes, and:
2) If the IRS could catch you in an audit.
2. This is a very oversimplified example of a typical NSA
interrogation. Actual interrogation messages may consist of several
hundred words and be very complex and sophisticated. Most messages
consist of several dozen words. Yes indeed, the NSA has exceeded the
wildest expectations of the book “1984”. As you can imagine, the spy
world has reached a new plateau that directly affects every person in
the USA and abroad. This electronic surveillance system extends down
through Mexico, Central America, and deep into populated regions of
South America. It also has been installed in Australia, Africa, and
the free-world countries in Europe.
3. The NSA’s goal is to have the whole world under its electronic eye
by the year 2000. They are almost there now, but are having
difficulties with high-tech countries that have the
counterintelligence resources to identify the high frequency bursts
of microwave transmission from the transceivers. The system also has
the ability to take a “voice print” from any person and place it on
file. This file can be used to locate the subject later by comparing
it to real-time surveillance audio samples received from the field as
long as the subject is speaking in close proximity to a transceiver.
If the person is aware that the NSA has this capability and remains
silent, the NSA can transmit a periodic worldwide subliminal message
that addresses the person by name and causes them to dream and talk
in their sleep. After the person talks, the voiceprint would be
eventually identified and the person’s location can be identified
nearly anywhere in the world. Yes, it is a small world, and getting
smaller all the time.
4. This technology was originally conceived under CIA studies and
fascination with the power of hypnosis in the late 1950’s and
perfected by very early 1960s and implemented with unlimited
resources to all areas of vital national security interest first.
Originally, after noting the behavioral effects in visual subliminal
effects like the highly publicized event where stating “Drink Coca
Cola” on a single movie frame “delivered a higher rates of speed than
normal movie viewing raised the obvious question, “Does the human
hearing work as good as eyesight accepting subliminal messages?”
Preliminary theory work was transferred to Fort Mead NSA who had
expertise in characterizing language in analog domains where a
sampled phoneme could be edited (shortened by removing excess sine
waveforms from the “acoustic wavetrain”) and electronically
reconstructed back into shortened words of language. Some of the
early experiments included “Remote Viewing at NSA where the Viewer
would relax, open their mind and explain the clarity of images that
were described by the NSA using this technology. These early
experiments allowed the NSA to refine the specifications of the
“Computer Simulated Subconscious Speech Language” and the scripting
formats to maximize the ability to deliver an accurate “vision or
picture” into the subject. Pictures already seen by the subject could
simply be recalled using “Age regression” script variations.
6. OTHER REFERENCE MATERIAL:
1. Please refer to the book “Inside America’s Most Secret Agency, The
Puzzle Palace” by James Bamford, Published by Houghton Mifflin
Company, 1982. This book contains extensive information and
references on the NSA’s history and the NSA’s first surveillance
system that originally only eavesdropped on telephones and is now
expanded to audio-visual.
7. NSA CASE HISTORY EXAMPLE SUMMARIES:
NSA Self-Initiated Execution (Suicide):
1. Bamford’s “The Puzzle Palace” references one of the NSA’s first
self-initiated execution (suicide) with this “Thought Control”
technol ogy they developed. The NSA employee reportedly ran off NSA
property saying demons were in his mind and he killed himself.
2. NSA Initiated Execution to Cover-up in the News:
1. A University of California at Berkley student that went into a bar
on or around November 27, 1990 took hostages and insisted to the
police that the CIA Director talk with him so that he could get
relief from the suffering. The young man had sent letters to the
president and the CIA but the requests had fallen on deaf ears. After
the young man panicked and shot a customer in the bar, a SWAT team
fatally shot him, the San Jose police found copies of the letters
written to the President referring to people that could “read minds”
and that he had learned how they do it. The NSA had been
unsuccessfully brainwashing him and had no alternative but to
terminate him to assure their security. It is interesting that what
was originally broadcast on the news “The gunman was demanding to
talk with the Director of the CIA” etc. disappeared quickly
(suppressed?) from later news accounts.
3. NSA Initiated Execution to Cover-up in Music:
1. Curt Cobain of the musical group “Nirvana” was another victim of
NSA brainwashing and was terminated by NSA. Cobain had started
writing clues to the NSA activities into his music to communicate it
to his music followers. He referred in music to the NSA as the
“Friends inside his head”. Once the NSA puts on the highest level of
brainwashing pain, the subject expires quickly. Cobain used heroin to
numb and otherwise slow the effect of the brainwashing.
4. NSA Initiated Executions in Overseas Defense Project:
1. Some years back several employees of the United Kingdom’s
Government working on a top secret Radar Project committed suicide
with no apparent penetration by a hostile government, drug abuse or
any other commonality other than working in a secured government
project. They were not “Staged” suicides (murders) because some of
them happened behind doors that could not be opened from the outside.
These men were subjected to the same technology and processes that
the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands
of others have experienced.
5. Musical references of NSA Technology:
1. Talking Heads; a music group popular in the eighties, wrote a song
explaining the scientific process of the NSA’s brainwashing
technology in a song called “Wild Wild Life”. The song gave an
example of what the audible transmission sounded like at the end of
the song (like a tape on fast forward). They mentioned in the song
that “They (NSA) talk so fastà” and that the musical group had spent
“All their time and money” unsuccessfully trying to find a place that
the NSA would not be able to harass them. The Talking Heads exposed
the technology, gave an example of what it sounds like, scenarios of
how the NSA might select you or the brainwashing, and the scope of
the electronic surveillance system.
6. NSA Counterintelligence Experiments:
1. Many experiments were performed by the NSA to determine the
conditions and procedures that would be required to turn spies that
were trusted by US enemies into assassins that we could invisibly
manage. In early experiments, the resulting NSA experimental subjects
would get extensive attention in the news because of the horror and
unusual nature of the atrocity.
2. One example that comes to mind happened several years ago and
created much news. A man became obsessed with his son, poured
gasoline on him and ignited it. He had planned to do the same to
himself but his desire for survival overpowered the NSA’s behavioral
conditioning. After he was imprisoned, he spoke about how all of a
sudden his mind became clear and he couldn’t figure out how he could
do this crime. The hypnosis was simply removed and the subject was
allowed to sleep so that experts studying the file would not find out
anything if the subject would have been subjected to traditional
hypnotherapy or other psychoanalytical techniques. Another successful
counterintelligence experiment completed with no liability or
traceability to the NSA.
3. Perhaps ten years ago I read of several elderly people died of
sleep deprivation in Florida. The doctors tried everything they could
do but could not stop the sleep deprivation that resulted in a 100%
effective termination yield. The NSA had developed the right
combination of delivered anxiety scripts combined with muscular
tension and delivery schedules optimized according to decreasing post
hypnotic durability over time as the subject’s health degraded.
4. David Koresh of the Branch Davidians spent many hours talking with
FBI negotiators about God and the Bible and finally waited for “God”
to tell him what to do in the final hours of the siege. The compound
probably had numbers of Personal Journals (required for subjects by
the NSA during brainwashing) that could lead to questions about how
this cult came to this level. Additionally, just like other loose
ends the NSA had to secure, “God spoke to them and said to commit
suicide” and they did securing another one of the NSA’s great
experiments in mind control and social pathology.
5. A friend of mine, David Sautter and I worked at Singer, Kearfott
Division, producing government weapons where we worked under a multi-
tier security system; Company Security, FBI, DIA, and at the top of
the ladder watching the watchers; the NSA. I discussed the NSA’s
technology with Dave and a few months later, I heard he had committed
suicide inside of a locked room. This theme should familiar by now
and the details of the case will be destroyed or rewritten by NSA
influences to preserve national security.
7. The cases of NSA activities go on and on. With access to the FBI’s
Crime Information Center (CIC), we could find several thousand files
having the characteristic patterns where the NSA had experimented on
the individuals with their “Thought Control” technology.
8. Currently, the NSA has many subjects in the field (our society)
that need only a series of “triggers” (carefully constructed
posthypnotic scripts) to send them over the edge and on a mission to
kill. The NSA calls them “Shooters on a Shelf”. A recent example was
Russell Eugene Weston, Jr. that went on a shooting spree at the
Capitol around July 26, 1998. He was diagnosed with schizophrenia,
had delusions that he had an affiliation with the CIA or FBI and
thought a radio-tracking device was planted in his tooth. He was a
product of NSA brainwashing. He did not have the ability to recognize
the advanced technology even though he knew that “someone” (CIA, FBI,
etc.) was communicating with him and that this communication ability
spanned across the USA leading him to believe that he had a tracking
device planted on him. Because of the real effects of the NSA
hypnosis treatments, he therefore reasoned that the schizophrenia
medication would not help and so he quit taking it. This was a man
desperately trying to alleviate the suffering the NSA inflicted on
9. Through the years, I have met thousands of people that have been
brainwashed into Christianity to a level where God tells them what to
do in their minds (described as a gentle voice by victims) and they
mindlessly obey. Yes, they have “Friends inside their heads” also. It
appears the Biblical Anti-Christ in the Book of Revelations has
arrived and is convincing many subjects that Jesus is back on earth
and directing them.
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
1. The following procedural outline documents typical techniques,
processes, explanations, and definitions of the National Security
Agency’s Behavioral Modification Procedure using Subliminal Implanted
Posthypnotic Suggestions through acoustically delivered phonetically
edited language elements combined into scripts without somnambulistic
preparation in the subject.
2. In simpler terms, the subject is unknowingly given hypnosis while
the subject is completely awake and is tortured and punished with
this hypnosis into a predetermined behavior by the National Security
Agency. The behavior is usually extremely religious, is called
“reborn” by the church, with the subject’s life-long goal of “a
personal relationship with Jesus Christ”.
1. ABSTRACT, Behavioral Modification:
1. The NSA’s behavioral modification process starts with
identification and qualification of the subject. The NSA used to
choose subjects based on the subject’s net present value to the
agency in public visibility, financial resources, political clout, or
other intelligence and counter-intelligence reasons. Additional
considerations are given to minimizing security risks of exposure,
the subject’s posthypnotic suggestibility index, the subject’s
intelligence and reasoning ability, moral and superstitious beliefs,
and the subject’s social status and the weakness of the subject’s
primary support groups (family). Now a recent report referenced in
the March 26th Business section of the Orange County Register from
the National Sleep Foundation reports that 40% of Americans are
experiencing sleeping problems. This news could indicate that the NSA
is broadening its influence to the greater public. As explained below
in this document, the NSA always starts its behavioral modification
process with REM Deprivation.
2. After selection, the subject is subjected to long periods of REM
Sleep Deprivation and reinforced torturing posthypnotic suggestions
that will breakdown the subject’s will, confidence, self-reliance,
and moral values. Meanwhile, the subject is increasingly isolated
from their familiar and trusted peer groups causing the subject to
experience depression, apathy, and ultimately social and financial
3. Typical post-hypnotic induced delusions reported by subjects are
tingling in various areas of the body, which are thought to be
resulting from microwave beams. Hearing ticks thumps or cracks from
walls, ceilings, clocks, lights, etc. Beliefs that the subject’s
neighbors are conspiring against them, or that the subject is being
followed. Sometimes subjects believe that the various perceptions,
feelings and experiences are the result of “Implants” in their body.
It is important for the subjects to understand that the NSA controls
this technology from nuclear hardened underground shelters and the
neighbors next door have nothing to do with the subject’s
experiences. Nobody has the time or inclination to follow a subject
around with a microwave gun to tickle various parts of the body. We
are saturated with microwaves all the time from television stations,
communication satellites, etc and yet we do not have any symptoms
because microwaves do not have the ability to trigger localized
synaptic responses in our brains. Furthermore, when the subject is in
a room surrounded by several people, and the subject is the only one
experiencing the “thoughts”, tingling feelings, etc., then obviously
a delivery method is being employed that affects only the subject;
high-speed acoustic delivered hypnosis.
4. After a while, the subject has an emotional breakdown and a new
support group is built around the subject. The new support group is
typically a church with doctrines centered in the Bible but the NSA
also uses cults and other social groups. The NSA prefers Christian
churches because the doctrines allow “God or Jesus to speak directly
to the subject” and the negative reinforcement can be attributed with
Satan and the positive rewards can be considered to be blessings from
God thereby masking the NSA’s technology and processes. When the NSA
uses other relationships without in which the subject experiences a
religious awakening and “Gives their Life to Christ” and the NSA
achieves total control of the subject.
5. The subject is slowly released from the damaging uncomfortable
hypnosis and it is replaced with positive rewarding hypnosis as “God
and Jesus works in their life”. Soon, the subject has complete
loyalty to Jesus (AKA: NSA) and will do anything on command from
6. The subject is required to give daily status reports in the form
of prayers in the privacy of their home, office, or car where the
NSA’s electronic surveillance system captures and sorts the prayers
by “Keywords”. The NSA then delivers additional hypnosis in the form
of punishments or rewards or directs the subject accordingly to
“God’s will”. If the subject resist’s the NSA’s instructions,
additional punishments are inflicted on the subject.
7. The subject is institutionalized in this system where any
nonconformances committed by the subject are watched, critiqued, and
reported on through prayer by other “Christians” to the NSA. Thus,
the new church peer group acts as a behavioral reinforcing mechanism
that will bring any of the subject’s problems to the NSA as they have
been trained themselves (this is similar to the Nazi Gestapo of World
War 2 and other communist approaches).
8. A subject that has successfully completed the NSA’s behavioral
modification program lives out the rest of their mediocre life in
service to Jesus (NSA) and never causes any waves in the church or
news media for fear of reprisal from the NSA. The subject’s lives are
relatively unproductive because their focus is on their “Life after
death” and not what they accomplish while they are alive. They avoid
“worldly activities”, and usually are confused and disjointed in
rational thoughts and concepts. For instance, they don’t believe in
anything that is not in the Bible, i.e. dinosaurs, evolution, space
travel, even though they ride on airplanes and watch television both
of which are not referenced in the Bible.
3. BEHAVIORAL MODIFICATION PROCESS:
1. Triggering Techniques:
1. The NSA minimizes security subject might recognize when the NSA
was not actively watching causing a security concern and it would be
cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when using
negative reinforcement continuously. It is not practical or
economical to watch a subject continuously to apply real time
deliveries. Additionally, using all three script delivery patterns
confuses the subject, causes the subject to believe they are always
being watched, and maximizes behavioral change over time though
2. Real-Time Subconscious Implant Delivery:
1. Real-time means that the NSA ODO is transmitting the posthypnotic
command script to the subject and observing the subject’s response.
This technique is required for subliminal interrogations. All NSA
standard posthypnotic command scripts can be delivered real-time.
This form of delivery can precipitate the perception of a “voice”
heard in the mind of a subject to give them information (true or
false) or orders depending on the purpose of the NSA’s activities.
3. Prescheduled Subconscious Implant Delivery:
The NSA central switching computer can transmit a script to a
specified subject at a pre-specified time. The transmitted script’s
transmission range can be limited to a single building, a city, or a
large geographical area (i.e. North America or Europe). By having
prescheduled scripts, the subject has seemingly randomly occurring
thoughts and feelings that can’t be associated with a commonly
recurring situation like event-triggered scripts precipitate.
4. Event-Triggered (conditional) Implant Delivery:
1. Posthypnotic subconscious implants that are triggered (activated)
with an event, thought, or code word (event-triggered or conditional)
are strongly experienced by the subject and are powerful tools for
reinforcing a predetermined desired behavior and inflicting
2. This type of posthypnotic commands are the ones most commonly used
by hypnotherapists to help people quit smoking, study better, or in
general, change behavior (behavioral modification). There is
extensive information on the Internet and college libraries about
this form of posthypnotic command delivery and how to “script” and
3. The NSA can reinforce a predetermined desired behavior by
associating a subconscious implant (negative or positive
reinforcement) with an event. An example is that when the NSA want’s
to isolate the subject from the company of a specific person place or
thing, the subject will be implanted with a feeling of increased
anxiety, hostility, tension, simple discomfort, or a feeling of a
lack of peace. When the subject leaves the person, place, or thing,
another posthypnotic implant is triggered that rewards the subject’s
behavior with a feeling of relief from the anxiety, hostility,
tension, discomfort, and peace is restored in the subject’s mind.
Example: This script will always cause a girl or boy not to sleep
with the opposite sex: “You will feel very tense and not be able to
relax if you kiss, sleep with, or stay long at your (boy or girl)
friend’s house and you will feel a deep peace when you leave their
house to go back home”. These types of scripts left unmanaged and not
removed can cause great harm as the subject develops and social
conditions and behaviors change over time.
4. It should be noted that the NSA precisely tailors the type of
negative and/or positive reinforcement, the degree of the
reinforcement, the duration of the reinforcing effect and the
conditions of the trigger. This posthypnotic event-triggered
reinforcement can be initiated gradually and can remain so subtle
that the subject believes that the discomfort is naturally occurring
and that it is the subject’s decision uninfluenced by anyone else
that the subject should avoid the person, place or thing.
5. This subconscious implant can be combined with other implants like
a posthypnotic-triggered thought to enhance the subject’s decision
toward the situation. For example the subject can be subconsciously
implanted with a command to be very sensitive to the changes in their
feelings and to feel great about making strong decisions to take
charge of their lives. This can be reinforced with another
posthypnotic suggestion to avoid all the situations that cause the
subject discomfort and that each time the subject commits
himself/herself to removing a situation of this kind in their lives,
they will feel an increasing control over their lives. Note that as
the subject perceives an increasing control over their lives they are
actually losing control to the NSA proportionately. Numerous other
examples exist and it is beyond the scope of this document to
document every possibility.
5. Stage 1 (Prescreen Evaluation):
1. The subject’s Posthypnotic Suggestibility Index is determined by a
series of simple tests. Hypnoamnesia is applied to the subject for
the name of an object or individual and the subject’s speed is timed
to determine how quickly they can overcome or not overcome the
posthypnotic suggestion “You will not be able to remember the name of
“____” no matter how hard you try. Other posthypnotic suggestions can
be used to create fear or discomfort in the subject that can be
remedied by flight or movement. The subject must overcome a
posthypnotic suggestion that they cannot move no matter how hard they
try. In summary, a posthypnotic suggestion is given to the subject
and the subject’s ability to overcome it is evaluated.
2. A full study of the subject’s religious, superstitions, fears, and
insecurities is made through standard subliminal interrogation
techniques and behavioral observation.
3. Interrogation scenarios are presented to the subject using
standard subliminal interrogation techniques and somnambulistic
interrogation techniques. The standard two types of scenarios are
“Open-ended Questions” (similar to multiple choice with response
labels pre-assigned to each choice) or “Reject if Disagreeable”
(negative response label if the subject disagrees). More advanced
techniques of interrogation scenarios are used as required or as
determined by the experience of the ODO.
4. Real-time observation, standard subliminal interrogation
techniques and somnambulistic interrogation techniques are used to
determine the subject’s overall social status, abilities, attitudes,
and communication skills with primary support groups and friends.
5. Scientific understanding and practical applications experience in
the fields of psychology, hypnosis, and problem analysis are
considered risks in the subject that may complicate or inhibit
subsequent behavioral modification processes. Once the subject
identifies the technology used it is nearly impossible to contain the
potential security breach without terminating the subject. Most NSA
initiated executions (suicides) are the result of the subject
identifying the technology used or carelessness on the part of the
ODO managing the file.
6. The NSA technology affords powerful control over the subject, the
subject’s environment, and the subject’s ability to plan and
implement a disclosure to appropriate Government Agencies. When the
subject finally does achieve a disclosure, the subject’s physical and
mental condition is depleted. The subject’s ability to communicate
concisely has been arrested, and the subject has already been set up
and dishonored in the sight of local and federal law enforcement
agencies to assure the subject’s testimony is questionable and
unsubstantiated. Where the NSA feels that these steps cannot be
achieved in medium risk subjects, the NSA will not recruit the
subject into the behavioral modification process.
6. Stage 2 (Standard Process):
1. This stage is where most subjects are behaviorally modified to
serve and follow “God” (AKA NSA management of the subject’s civil
rights). If the subject accepts religion and direction at this stage
the NSA reinforces the subject’s relationship with Jesus and closes
the file. This shortened program receives the maximum return for the
NSA for the least investment and minimizes the security risk. It also
causes the least amount of damage and institutionalization in the
1. Coincidence is used to create the perception in the subject that
supernatural events are beginning in the subject’s life. A
combination of posthypnotic commands and pre-information awarded to
the subject prior to an upcoming experience that the NSA intelligence
system has discovered gives the subject a feeling that “God” or some
other supernatural being is taken interest in their life.
2. The following is one typical technique used by the NSA. NSA
Intelligence gathers information regarding the topic of the sermon in
the subject’s church. This information is gathered through electronic
surveillance equipment installed in the church. The NSA then implants
a posthypnotic command that triggers the subject’s mind into concern
and contemplation about the sermon’s topic prior to going to church.
When the subject hears the sermon, the sermon seems to be speaking
directly to the subject that adds to God’s mysterious and
unexplainable ability to address the innermost concerns of the
subject, especially when the subject has not shared those concerns
with any other human being.
3. Another typical method used by NSA concerns tragic events
occurring to loved ones. NSA Intelligence receives a local broadcast
or preliminary information through electronic surveillance that a
subject’s relative has been injured or killed. The subject is given a
posthypnotic suggestion that a feeling of dread or loss is welling up
inside them and they are directed to think of that particular loved
one. When they are finally notified through official channels, the
subject believes that they have special powers, insights, or
communications from God, aliens, or other entities.
3. REM Sleep Deprivation:
1. The Rapid Eye Movement (REM) stage of sleep is controlled and
usually limited to one to two cycles per night resulting in micro-
sleeps during the day. REM deprivation inhibits short-term memory,
concentration, tactile abilities, verbal articulation, reasoning, and
self will. Protein synthesis is inhibited and thereby reduces the
subject’s ability to heal after physical damage or after periods of
extensive exercise. The result is that the subject’s general health
degrades as does social bonds and work/school performance.
2. The NSA performs control of REM Sleep through various methods.
Posthypnotic implants can be implanted that place a subject in a
light sleep (posthypnotic trance) with various combinations of
muscular tension and computer cycling implant deliveries (to be
3. Subjects typically complain of no sleep, restless sleep, waking up
every hour on the hour, staying awake until the hour they have to get
up, waking up an hour after they retire and not returning to sleep,
and typically cannot recall any dreams. Additionally, they will
complain of repeating torturing thoughts, racing thoughts, and facial
itching and numbness. Daily fatigue, poor recall of names, and
caffeine consumption is typical.
4. Dark rings’ surrounding the eyes is evident and the darkened area
around the eyes can be reported as sore or tender by the subject. The
subtle perceptual impairing effects of REM deprivation make it more
difficult for the subject to identify the REM Deprivation problem.
When the REM depravation onslaught is gradual and accompanied by a
posthypnotic command that the subject “will feel energetic and
rested”, the subject will not recognize the REM Deprivation.
Additional posthypnotic commands can be implanted that will make it
difficult for the subject to “see or perceive” the rings surrounding
their eyes. I have seen many subjects with very dark eye rings and
the subjects could not recognize them at all.
4. Shame Factor Enhancement:
1. Various posthypnotic suggestions are implanted in the subject
after a week or so long period of REM deprivation. The content of the
posthypnotic scripts is constructed to cause the subject to perform
embarrassing and otherwise shameful acts (usually sexual but always
anti-social). These shameful behaviors are used by the NSA later to
shame the person into a lower self esteem, reduced confidence in
their own self discipline, a need for forgiveness from God. These
embarrassments provide a means to Blackmail or discredit the subject
if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement agency to document
the behavioral discrepancy to retain anonymity. The NSA has been
known to help subjects avoid prosecution to gain loyalty or create an
adversarial relationship between the acting agency and the subject
(another intimidation factor) even though the NSA was responsible for
creating the behavioral problem in the subject’s life.
5. Religious Relevance and Convictions:
1. The NSA typically implants posthypnotic suggestions that are
clearly referenced in the Bible. The subject may be punished (through
negative reinforcement) by anything that is referenced in the Bible
to substantiate the validity of the “Word of God”. When the NSA does
not follow the standard Biblical references, most subjects fail to
recognize the contradictions out of ignorance or an inability to
rationalize, or, they find other ways to justify the events to
receive peace from God (NSA). This component of the NSA process is to
provide the subject with an increased sense of fear and intimidation
resulting from God’s presence and force. “Thou shall not disobey
1. Paranoia is a powerful tool used by the NSA. It provides a means
to develop the subject’s distrust of other people including the
subject’s primary group that could provide positive support during
this time of distress in the subject’s life. Paranoia is often
recognized and discounted as a character fault by most peoples in
American society and therefore discredits the subject’s testimony
even further. Uninformed, but well wishing people including friends,
may recommend to the subject to pursue counseling. This negative
feedback can make the subject fear that people will believe the
subject is crazy.
2. When the subject seeks professional counseling, the result will be
a misdiagnosis with an expensive, inappropriate and ineffective
treatment. The observed symptoms result from simply hypnosis, not
biological, chemical, or environmental stresses. A misdiagnosis
strongly motivates the subject not to communicate their experiences
to others to avoid social disgrace of a “schizophrenia” label and
additional financial burden. This isolation of the subject and their
reluctance to communicate their experience to others reduces NSA
security risk. The NSA cannot allow the subject to share information
with other subjects that have already experienced the program and
thereby starting a pool of information that could be compiled and
used to expose the NSA system.
3. The subject is led to believe that the subject’s neighbors, work
associates and/or family are conspiring against the subject through a
number of scripts delivered to the subject by the NSA. The NSA can
further complicate the conspiracy delusion by using the same
technology to have a work associate ask the subject a question or to
make a comment that can be used by the NSA to confirm the subjects
fears. This technique further isolates the subject from trusting
their peer groups, causes additional emotional distress and hostility
toward these people. The subject sometimes resorts to violent
behavior, which is viewed by observers as irrational, unprovoked
behavior that may be treated as criminal behavior by law enforcement
7. Stage 3 (Extreme Process):
1. This method is very severe and usually results in a two to five
year program. Because of the severity of the suffering, the subject
is usually permanently impaired for integration into normal
mainstream life and is essentially institutionalized. The result is
that the subject must reside in a less competitive environment like a
church group. Subjects that receive this program tend to be highly
superstitious, are agitated easily when objective evidence that
contradicts their belief system is presented. They tend to believe in
the spiritual world (demons, ghosts, god, spiritual entities, etc)
and consider the spiritual world to be more powerful and important
than the material or real world. This program basically follows the
following steps; REM deprivation, breakdown of self esteem and
confidence, intense suffering, exaggerated conscience, spiritual
contact, reborn in Jesus Christ, Spiritual battle, release (saved by
the Savior), and recovering (blessed by Jesus Christ). Whenever
possible the NSA will skip or reduce these steps to minimize security
risk and financial cost.
2. Increasing Dependence on Drugs and Alcohol:
1. As the REM Deprivation increases the subject must depend on
Central Nervous System (CNS) Stimulants to compensate for degradation
of productivity at work, school, and in interpersonal relationships.
This serves the NSA in several ways. Use of drugs (especially CNS
stimulants) increases the subject’s index of suggestibility. Or in
other words, the post hypnotic commands are more effective and the
subject has greater difficulty resisting the impulses generated by
the commands. In addition, the increased stress of coping with the
drugs in conjunction with the resisting the newly introduced
posthypnotic commands serves to push the subject closer to an
emotional breakdown. If the subject uses illegal drugs, the NSA tries
to set the subject up for a conviction to get assure that the subject
looses credibility. Who would believe a drug user that claimed that
he/she was being harassed by a government agency that was tormenting
them with hypnosis? It also serves the NSA in the program by
documenting something that the subject will be ashamed of when the
program reaches the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also inhibit REM
Stage sleep and increase irritability over time thereby further
degrading and isolating the subject.
3. In summary, the NSA benefits from the subject responding to the
REM Deprivation assault with self-medication. This response
discredits the subject by labeling them in society as a drug user, it
enhances the effect of the implanted posthypnotic commands and it
gives the subject a reason for shame that will be used against the
subject later to justify the punishment from “God”. It should be
noted that the subject is not really guilty of anything, except being
a victim that was manipulated in a carefully controlled scientific
behavior modification process.
3. Poor Nutrition:
1. The poor nutrition reduces the energy the subject has and serves
later as another justification of God’s punishment. The subject will
be taught later that “the body is the temple” and that to abuse it is
to violate God’s will.
1. After the subject’s self-esteem is broken down and continuing
failure and persistent suffering start to dominate every day, the
individual becomes apathetic as a defense mechanism. At this stage
the subject has committed another sin of “not persevering through
faith” which is later used on the subject later to increase a feeling
1. Depression precipitates as a result of chronic REM Sleep
Deprivation, social isolation and a feeling of helplessness in the
subject. Commonly, when the subject seeks professional counseling,
they are misdiagnosed and treated for depression with medications but
the root cause of the problem (negative reinforcing posthypnotic
suggestions inflicted over long periods of time) is not treated or
1. The subject starts to experience severe insecurity in this stage.
The NSA uses this insecurity against the subject in several ways.
Because of the impaired reasoning ability and emotional isolation,
the subject is susceptible to the approaches of insincere people,
which are used by the NSA to emotionally hurt the subject more. This
allows the NSA to convince the subject that people can’t be trusted
and that only the NSA (Jesus) can be trusted. This serves to isolate
the subject from supportive peer groups and makes the subject
emotionally dependent on the NSA resulting in the NSA gaining more
power in the subject’s life.
7. Journals and Diaries:
1. Most of the subjects are directed to keep a “Journal” or diary by
the NSA so that the subject can record and review feelings, events,
observations, and “God’s directions” that normally would be
unavailable due to short term memory loss during extended periods of
REM Deprivation. The NSA uses the Subject’s Journals in a variety of
8. Degrading Spelling and Grammatical Performance: 1. Subjects in
these prolonged stages of REM deprivation, confusion, and emotional
distress, have very poor grammar, spelling, and short attention
9. Slowed Speech:
1. Subjects experience slower speech and have a greater time
articulating concise points as a result of the REM Deprivation and
other performance degrading posthypnotic commands. Very slight
alcohol consumption can exasperate the damage of REM Deprivation and
precipitate slurred speech.
1. Confusion results from three primary sources; REM Deprivation,
specific posthypnotic commands to reinforce the confusion, and the
emotional damage and stress that is being inflicted. The confusion
allows the NSA to continuously inflict damage to the subject’s life
without real-time observation. A confused person generally is not as
productive as an organized clear thinker is and has a greater
potential to offend people by what they say or do and is less likely
to recognize when they have made mistakes. All of these symptoms
assist the NSA’s objectives in this stage and subsequent stages. In
addition, the confusion restricts the individual from analyzing the
source of their suffering and taking corrective actions, and
therefore reduces the NSA’s security risk.
11. Poor Concentration:
1. Difficulty concentrating impairs the subject’s productivity and
restrains the subject from making self-improvements and corrections
in behavior. It makes it very difficult for the subject to do any
research or reading to evaluate his/her condition. This paves the way
for the NSA to demonstrate that the subject cannot do anything on
their own without “God”, thereby increasing the frustration and
anxiety of the subject (inducing emotional breakdown) and ultimately
making the subject totally dependant on the will of God.
12. Loose Association and Personality Disorders:
1. The subject experiences disjointed thought at this stage (Loose
Association) that appears to observers as a strange sense of humor or
inappropriate responses when engaging in conversations. Ongoing
sarcasm and other negative attitudes and undesirable personality
traits can be present.
1. The way that the subject experiences anger is of profound
importance. If the subject allows the NSA to redirect the increasing
anger and hostilities toward the NSA to another person in the form of
violence (misplaced aggression), the NSA will reinforce the violent
behavior with posthypnotic commands. The result is a person that can
achieve national acclaim as a murderer that heard voices of Satan
directing him/her. Typically, the Subject is encouraged to commit
acts of violence with spouses, friends, or employers resulting in
further social isolation and increased shame. Some examples of NSA
directed victims of misplaced aggression include recent US Postal
Workers whom work within the Postal Service. This is one of the vial
“communication intercept” channels the NSA is directed to monitor.
The routes of suspect mail and the postal worker processing it are
continuously monitored by NSA. Sometimes the NSA ODO takes issue with
a Postal Worker and harasses them or subjects the postal worker to
1. Delusions are used to discredit the witness and also provide an
additional source for fear, intimidation and confusion. Delusions can
be but are not limited to the Subject developing conspiracy theories
of fellow employees and friends, beliefs that Angels or Demons are
communicating or visiting them, tingling sensations from microwave
guns or implants, beliefs in supernatural events, etc.
15. Audio Hallucinations:
1. Subjects often report hearing walls clicking, footsteps in the
house, the sound of someone trying to open the door, drilling at the
2. These audio hallucinations are also used to discredit the witness
and also provide an additional source for paranoia, fear, and
16. Voices in the Subject’s Mind:
1. The voices in the subject’s mind are achieved in a variety of ways
using real-time and pre-scheduled posthypnotic suggestion deliveries,
and Noun Substitution implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion implanted that
changes the form of pronouns in the subject’s internal thinking. The
result is the subject perceives that someone is telling him/her to do
something with nearly every thought. An example is; the subject
thinks, “I should go to church today”. With the noun substitution
posthypnotic suggestion the subject experiences the following
internal thought, “You should go to church today!” Notice that by
implanting the posthypnotic command into the subject’s subconscious
mind to think the pronoun “You” instead of “I” the subject will
perceive that they are being directed by a voice even though the
majority of the internal thought content is their own naturally
occurring thought. This subconscious implant can be used in
combination with other implants to increase the subject’s perception
of threat, fear, and therefore paranoia. It can be used with other
posthypnotic suggestion implants that will give the subject the
perception of either a “good” or “evil” voice or spirit is directing
him/her. This implant is powerful because it gives the subject the
perception that the spirit, angel, God or Holy Spirit knows and
directs the subject’s every thought. It provides a convincing proof
that “God knows every thought of his children”. Subjects that don’t
have a superstitious frame of reference and seek professional help
are usually misdiagnosed as schizophrenic.
17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed by the NSA and
typically has no pharmacological or biochemical basis and is produced
by a posthypnotic suggestion. It is often misdiagnosed as ringing
caused by excessive aspirin use and is actually an audio
hallucination triggered by hypnosis.
18. Complete Quiet Silence:
1. Used by the NSA as a positive reinforcement for two general
reasons; the subject has the tinnitus removed to indicate that the
subject has “The Lord’s Peace Restored”, and secondly, the subject
has achieved a milestone toward being released by God (the NSA).
19. Quiet Wind:
1. The audio hallucination of a quiet wind is used to convince the
subject that the Holy Spirit is visiting him/her. An excellent
example of this hallucination combined with the fear that accompanies
it is contained in Phil Collin’s lyrics of a song that has the chorus
“I can get so scared, Listen to the wind”.
20. Visual Hallucinations:
1. Visual hallucinations are usually implanted in the waking moments
when a subject is coming out of or is in a somnambulatory state
(light sleep) preferably in a darkened room. The hallucinations are
fleeting, usually lasting less than one minute and are not durable.
Typical hallucinations reported by subjects are Angels, large
spiders, and movement of various shadowy objects across the ceiling,
bright spot of light ahead of the subject, etc.
2. The television show “Sightings” has had numerous reports of people
seeing “Aliens” at waking moments. These types of news accounts
create confusion in US society and serve to keep people searching for
the wrong phenomenon thus keeping the NSA’s technology secure
21. Tactile, Olfactory hallucinations and Muscle Spasms:
1. Tactile hallucinations can be more durable and are used to
communicate a desired direction to the subject typically after a real-
time interrogation. Typical behavioral cues issued by the NSA are
manifested in the form of:
1. Temporary sensation of pressure to the tip of the right index
finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the left index
finger (symbolizing no Faith or “deception of Satan”).
3. Temporary sensation of pressure to the center of the right palm
(symbolizing Jesus “Sitting at the right-hand of God”).
4. Temporary sensation of pressure to the ball of the right foot
(symbolizing “Get on the Ball” or “hurry-up”).
5. Temporary sensation of pressure to the tip of the right foot big
toe (symbolizing “Right Direction”).
6. Temporary sensation of pressure to the tip of the right foot
center toe (symbolizing “Fucking-up Direction”).
7. Temporary sensation of pressure to the tip of the left foot big
toe (symbolizing “Wrong Direction”).
8. Temporary sensation of pressure to the buttocks (symbolizing “Bad
Attitude” or “subject is acting like an ass”).
9. Temporary sensation of pressure on tip of penis or clitoris
(symbolizes immoral thoughts like subject is thinking/acting with his
penis or her clitoris).
10. Temporary sensation of pressure to the left ear drum (symbolizing
“do not listen”).
11. Temporary sensation of pressure to the right ear drum
12. An involuntary blink of the right or left eye (symbolizing: right
eye = God’s agreement or left eye = Satan’s agreement).
13. Temporary tingling sensation on the Testicles (symbolizing
insufficient male confidence or “Having no balls or strength”).
14. Temporary tingling on other areas of the body to imply that
something invisible and/or supernatural is touching the subject. May
be perceived as threatening or reassuring to the subject. Can be used
to intimidate and confuse the subject often times combined with
additional posthypnotic implants to inflict delusions like “being
attacked with microwaves” or being caressed by Angels.
15. Muscular spasm or perceived pressures near the jugular vein on
right side of neck (symbolizing Satan having subject by Jugular or
throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe pain on the
subject by causing extreme involuntary contraction of the sphincter
in the anal region or other lower back or leg muscles.
17. Perceived odor sensation of a thick, sweet smell (symbolizing
Satan’s sweet victory over the subject’s soul).
9. This section is written in an attempt to provide interested
individuals with some of the considerations and precautions when
seeking to demonstrate the NSA’s civil rights abuses by demonstrating
the effectiveness and concepts of subliminal access using Subliminal
Implanted Posthypnotic Suggestions and Scripts Using Acoustically
Delivered and Phonetically Accelerated Posthypnotic Commands without
Somnambulistic Preparation in the Subject.
1. Reverse engineering of the NSA’s technology to prove it’s abuses
against the American people is quite difficult. Conside the
2. If the scientists and technicians perform their research in a
facility that the NSA has the standard transceivers installed, and
therefore the NSA can influence the direction of research or the data
by effecting perceptual effects in the researchers. These perceptual
effects can be confusion, lack of attention to important details,
oversights, bad assumptions, incorrect interpretation of the test
data. These same misperceptions will also be incorporated into the
research test subjects. The technology cannot be developed and
optimized if the NSA has any access to the test subjects. The test
scripts given to the test subject delivered from the researcher can
be neutralized by the NSA delivering a canceling script immediately
after the researcher’s script. The NSA’s test script can also include
a hypnoamnesia script at the end to cancel any residual perception in
the subject so that the test subject would report no effects and the
researcher would conclude the test script had no effect.
3. The research must be carried out in a facility secured from all
NSA electronic intrusion. All equipment in the facility must be
TEMPEST protected and electrically isolated from the outside world.
The research personnel and their subjects must never leave the
secured area of the facility so that they cannot be subliminally
interrogated by the NSA. The NSA would take this opportunity to
deliver disinformation scripts to the subject or researcher.
Foodstuffs and supplies would be the logical choice of NSA intrusion
if all other security measures were effective against the NSA.
4. The NSA will exploit all opportunities to introduce microscopic
transceivers into the facility of it’s surrounding grounds. The
minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to capture
response labels during subliminal interrogations. This can be through
normal illumination or infrared to see through window, or millimeter
wave or other technologies that can see through barriers like walls
3. Audible response labels can be used if the NSA has a micro
receiver with a micro speaker inside but cannot get a transmitter in
and operating without detection. Sneezes, coughs, clearing of throat
that can be picked up by laser microphones, audible amplification
microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave technology
that will allow visible intrusion into most facilities. The test
facilities should be deep underground, AKA 1000 feet with no adjacent
access from other facilities, sewer lines, water lines or power
6. Any facilities existing will have to be debugged before habitation
and research begins.
7. Subjects must be able to be subjected to traditional hypnosis
after facility habitation as a test prior to research to assure that
the NSA has minimal scripts already implanted.
8. This technology is the highest level of intelligence gathering for
the USA. The abuses resulting from mismanagement of this area of the
NSA’s intelligence system must force Congress to legislate additional
laws to protect the citizens. The NSA must regulate this system
better. The NSA will take all necessary steps without limit to assure
that this technology is preserved and autonomously under their
10. Conclusion: America’s greatest and highest level intelligence
asset is being mismanaged and the mismanagement must be corrected
before all the Enemies of our great country acquire it. Imagine if
China had this technology to use on their defenseless population?
11. May God help us all in protecting the American public and
preserving and managing this vital technology’s vital potential to
serve America’s National Security.
Mass Mind Control in the Present-Day U.S. — The big picture
There are a number of interlocking systems, technologies and techniques which are currently being deployed against the citizens of the United States of America by certain segments of our national government.
First, there are literally COUNTLESS mind-control projects and sub-projects in operation at this time which target SPECIFIC subjects/victims in a variety of ways; using one or more of a number of technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply of different EM/RF mind control technologies, repetitive conditioning, hypnotic trance induction, and so on and on and on.
Reliable reports from MANY different sources indicate that as many as TEN MILLION individuals many be ACTIVE subjects/victims of these kinds of mind control activities, and huge quantities of hard documentation on a great many of these projects DOES exist.
However, in addition to these kinds of mind control operations, there are ALSO mind control and mind manipulation activities that target MASSES of people in large geographical regions at the same time. Indeed, there is VERY strong evidence that the operators of HAARP, for example, have ever since HAARP’s earliest days intended that it be used for, among many other things, GLOBAL mind control.
There is in FACT much evidence to show that HAARP is NOW being used for just such utterly evil purposes by the United States federal government.
Of course, there are many other EM/RF technologies and systems which are, or may be, applied to mass-scale mind, mood, thought and consciousness control/manipulation operations: such as the nationwide “GWEN” (Ground Wave Emergency Network) system, certain ELF and ULF transmitter systems, and so on (such as your TV set, even IF it’s turned OFF!)
Another way to manipulate and “regulate” the minds and consciousness of a mass of people at a VERY basic, fundamental level is to CONTROL the population’s PRIMARY sources of INFORMATION. This is one of the MOST powerful ways shape the collective consciousness of the public, and it is CLEAR that many mass media outlets in the United States are both willingly and un-wittingly aiding and abetting the manipulation of
our minds by the government, and are assisting the FedGov in carrying out many social-engineering agendas.
The mass media’s treatment of school shooting incidents, for instance, plays DIRECTLY and TOTALLY into the schemes of those who deployed the mind-controlled killers to carry out these shootings, in a grand plan to shut down our Constitution’s 2nd Amendment, among other things.
Moreover, very carefully designed CONDITIONING programs and tactics have been brought to bear against nearly EVERY segment of society; disseminated throughout the nation and the world by mass media and entertainment industries and corporations; and embedded in ALL forms of so-called entertainment at this point, such as movies, TV shows, video and computer games ESPECIALLY, some pop music, and so on.
This condition of constant, relentless bombardment with grotesquely violent imagery, which the general population, ESPECIALLY its younger members, is inundated with by nearly ALL forms of popular contemporary entertainment and sources of “information”, is indeed directly derived from those mind-conditioning programs and systems developed at Fort Detrick (and other similar locations). San Diego shooter Charles Williams’ father worked at the Army’s Fort Detrick facility for THIRTEEN YEARS.
Specifically, indoctrination/conditioning programs were developed at Fort Detrick in which subjects were repeatedly, continually and continuously immersed in virtual reality-type video/computer “games” of extreme and GRAPHIC brutality, for long stretches of time and over an extended time frame.
This kind of psychological assault proved very effective in rapidly obliterating subjects’ ethical and moral values and cultural norms with regard to violence, brutality, killing and so on.
These systems were perfected, applied to the brainwashing and conditioning of members of the U.S. military and also turned over to the intelligence sectors for other applications. The intelligence sector, in turn, DELIBERATELY and successfully undertook to have this same kind of HIGHLY negative, destructive and effective conditioning applied to SOCIETY AS A WHOLE, via mass conditioning of our consciousness through the entertainment and information industries, as noted.
One OTHER method of mass mind control/manipulation/conditioning which is NOW being utilized MORE and MORE — ESPECIALLY against the most vulnerable members of our society, our CHILDREN — is the
highly-reprehensible/questionable and increasingly common MANDATED DRUGGING of ever-growing numbers of children through hugely intrusive, invasive, ill-advised, psychologically unpredictable and often destructive programs mandated, usually for young males, by psychiatrists and social workers. More and more of our children are being dosed on a long-term basis with any of a number of psychotropic/psychiatric drugs like Prozac, Ritalin, Luvox, and so on.
These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT psychotic reactions among a significant percentage of subjects, but ALSO clearly and provably create a stupefied, dumbed-down, zombified mental state in targeted subjects which is a PERFECT “ground state” for the carrying out of yet OTHER mind control/manipulation/conditioning activities on these very same subjects. In general, this kind of psych-drugging makes the job of further mind control programming MUCH easier. And this kind of drugging is being done to ever-increasing numbers of our children, down to toddlers as young as TWO and THREE YEARS OLD!!
Now, there is ANOTHER way in which our present-day society is being literally and effectively mind-controlled en masse.
Most all of the individually-targeted mind control programs we noted above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT PERSONALITY in the victim/subject. In fact, one or more of these deliberately-induced split personalities formed as a result of psycho-sexual abuse or other conditioning are those facets of the subject’s psyche which ARE actually “programmed”; to kill, or whatever else. It’s been shown that forcing victims/subjects to witness, experience or participate in just about any highly-traumatic and shocking events on a repeated basis will induce the kind of psychotic break(down) that is a necessary prerequisite for intensive mind control programming/conditioning.
SO: WHEN our society as a whole is FORCED to confront and WITNESS over and over and over again something as FUNDAMENTALLY shocking as having our young people perpetrating inconceivably horrific mass murders of peers and others on A REGULAR BASIS, as is NOW THE CASE in the present-day United States, then the population as a whole AND on an individual basis to some extent develops an analogous, similar
psychological break, and in FACT to some extent develops split personality/multiple personality disorder conditions… READY FOR FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarily disturbing events which impact society AS A WHOLE, such as these school shootings by young people that have just occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO social controllers who set these terrible mass killings off; and the incidents themselves serve to further condition, manipulate and “mind control” the population of the United States in the year 2001.