Anda di halaman 1dari 20

freedomofthoughts,beliefs,opinionsandexpressions

TargetedIndividualsCanada
TheCanadianCharterofRightsandFreedomsispartofCanadianConstitutionthatprotectsitscitizens fromhumanrightsviolations. Home heroes ti cases vids links dwnload read bks pics pod archive Home>articles,blogpost,news>AllenBarkersMentalFirewalls
T pete ttosearchhere...

AllenBarkersMentalFirewalls
August20,2011HRC

Thisisthethirdofathreepartseriesofessaysonmindcontrol.Astheearlieressaysexplained,mind control is the term commonly and historically used to describe clandestine operations to alter human behaviorandthought.Theseriesfocusesmainlyonhightechnologytechniquesinvolving,forexample, surveillance devices and electromagnetic weapons though victims of all sorts of mind control techniques have common experiences and sequelae. The first essay of the series, Motives for Mind Control,dealtwithsomeofthereasonsthatmindcontrolharassment,torture,andexploitationhappens andwhyitcontinues.Thesecondpart,ResistingtheMindControlState,dealtwithwaystoprotest andresistmindcontrolabusesinasupposedlyfreesociety.Inthisfinalpart,Iexploresomeofthe methods and techniques that victims have developed to help them resist these ongoing human rights atrocitiescommittedeverydayagainsttheirbodiesandminds.Inasensewearegoingtohavealookat mindcontroltorturefromthetorturevictimspointofview,frominsidethemindofthevictim. This essay is written from the point of view of someone experiencing real torture from externally inducedmindcontrolphenomena,includinginducedvoicesinthehead,surveillance,harassmentfrom varioussources,andnonlethalaversivejolts.WhileImakenosecretofthefactthatIhavepersonally beensubjectedtoasimilarsortofmindcontroltorture,thisisnotmystory.Ofcourseitisinfluencedby eventsIhaveexperienced,buttheessayisacompositefrommyinteractionswithmanymindcontrol victims(andprovocateurs)overthepastfewyears.Iwillsavetheactualdetailsofmyownexperiences formylawyersorforprosecutorswhenthattimecomes,orperhapsforotherwritingsImightchooseto makepublic.Thus,inkeepingwiththeearlierpartsoftheseries,youdonotevenhavetobelieveme aboutmyhavingbeentorturedthoughitallhappened.Therearemanypeopleintheworld,including manyAmericancitizens,whohaveexperiencedverysimilarthings.Youcaneventhinkthatallofthose people made it all up, and still have to be concerned despite your Holocaust denial. The technology undoubtedlyexistsrightnowtocarryoutthesortsoftortureoperationsdescribedinthisessay,andwill onlybecomemoreadvancedwithtime. Icoveralotofdifferenttechniquesandpossibilitiesinthisessay,butkeepinmindthatthetruthisbad enough.Whatwealreadyknowandcandocumentisbadenough,andisonlythetipoftheiceberg.In thespiritofmentioningallthepossibilities,though,letmebrieflydiscussmentalillnesshere.Theretruly aresomepeoplewithmentalillnesseswhichoccurnaturally.Therearealsopeoplewithmentalillnesses which were externally and purposely inflicted, for example by harassment operations. And there are mind control victims who are completely normal except that they have undergone years and years of someofthemosthideoustortureimaginableinalying,despicablesocietythatdeniesit,ignoresit, and further tortures the victims. We know this from documented sources what the government has admittedisbadenough.Ihopethisessaywillprovehelpfuleventovictimswhosufferfromtruemental illness.IcallthemvictimsalsobecausethecowardlyU.S.governmenthashiddenbehindtheskirtsof the mentally ill to commit some of the worst atrocities imaginable, and the truly mentally ill are victimizedbythisaswell.Thementallyillarealsoknowntohavebeenusedasguineapigsinmind control experiments precisely because they would tend to be disbelieved and are relatively powerless victimsfortorturerstoexperimenton.Somevictimsmayhavebeenpoisonedbydrugsengineeredto cause them psychological problems and I do not mean ordinary street drugs. Others have had psychosurgery, microwave harassment, etc., which can cause organic problems in addition to psychologicalproblems.Andofcourse,themindisreallynotseparatefromthebodyandpsychological tortureisjustasbadasdirectphysicaltorture. Mostpeoplearestillfreetothinkwhattheywanttotheextentthatthatstillmeansanythingand some will try to second guess the victims and provide armchair diagnoses of the victims problems. People who try to dismiss true torture victims as just mentally ill will receive and deserve the utmost contemptfromthevictimsandfromthosedecentpeoplewhoknowwhatisreallygoingon.Andwe will remember. For the reasons described in Part II, the psychiatric and psychological communities cannotbetrusted,exceptforafewactualhealershereandthere.

Much of this essay contains a sort of analysis that it is fashionable among the pseudointelligentsia to dismiss as just blackandwhite thinking. These people have their sixthgrade epiphany that not everything is blackandwhite, and for the rest of their lives go around justifying anything convenient with this amoral relativism. They never realize (or it just does not suit their lies) that while nothing is blackandwhite,somethingsarecloseenoughthattheymightaswellbe.IwillbewritingaboutNazi pigs, and I mean this in the sense of Mengele the Nazi pig, not any other cultural pig association. Those who dismiss this sort of thinking perhaps would think differently if they had ever experienced realtortureorwerecapableoftheslightestbitofempathy.Thereisnodoubtthatthissortofthinking has been misused and misapplied at various times, but I cannot worry about how every moron might misunderstandormisapplywhatIwrite.PeoplemaywellmisapplythingsIhavewrittenhere,oruse themtocreatesomepropagandadistractionfromwhatIamactuallywritingabout,butIamdescribingit thewayitis.IfyoudontcallaNaziaNaziyouendupwithNazismbysomeothername. Everyvictimhashadtodevelophisorherownmethodofcopingwiththetorture.Iamnottryingto imposemymethodsonanyone.Areligiouspersonundertorturefindsstrengthinhisorherreligion,so someZenBuddhistphilosophymaynecessarilybeapparentinmywriting.IntheignorantU.S.there arestillpeoplewhowillblameavictimforbeingBuddhist,amajorworldreligion.OfcourseMengele thepigtriestojustifyandrationalizehisactsoftortureinanyandallwayspossible.Therearetheusual myriadwaysofblamingandsmearingthevictimsandrationalizingawaytheactsofthetorturer. Ihopethatthisessaywillhelpsomevictims.IknowthatIhavebenefitedfromtheworkofothervictims who had the courage to speak out about their experiences. Much of this essay deals with the mental gameofmindcontrol,whichisofcoursenotagameatalltothetorturevictims.Youcancompareit to having to face mock executions each day. There is also the physical intimidation many victims experience.Asavictimmightputit,ifitisallinmyheadthenwhoharassedmeonthehighway?Why didmymailallarriveopened?Whydidmyphoneregularlyringtwiceadaywithhangupcalls?Why didmanyofmyinternetpostsstoppropagatinganywhere?Whydidapolicecarpullupbesidemine every time I talked about China, on the drive to my honeymoon? The unfortunate reality is that the victimshavetodeveloptheirownmethodstodealwiththeconstant,crediblephysicalthreatsofdeath orworse.IwishIcouldhelpthere,butIdowhatIcan.Thisisabarbaricandsavagenation. WhatisaFirewall?Forthepurposesofthisessay,letmedigressabithereanddescribetheconcept of a firewall. A firewall, in the historical sense, is a wall built between connected buildings and specificallyconstructedsothatafireinoneunitofthestructurewillnotspreadtotheotherunits.Ina more recent sense, a firewall is a device on a computer network that keeps nodes of the network separated,forinstancesothatahackerattackononenodeofthenetworkcannotspreadtoconnected nodesofthenetwork. For our purposes, we can consider all the computers on a network to be like houses on a street. (Network engineers, please bear withme.) Eachhouse hasseveral doors into it,which correspondto what are called ports on a networked computer. A computer actually has thousands of ports, but the principle is illustrated by considering a house with several doors. All the houses have inhabitants in them, who send out messengers to the other houses: But some houses send out the equivalent of burglarsalso.Whentheinhabitantsofonehousewanttocommunicatewiththeinhabitantsofanother, theysendamessengertoaparticulardoorofthehousetheywanttocommunicatewith.Themessenger knocksonthedoor. Now,theinhabitantsofthehousecaneitheropenthedoorandletthemessengerinorignoretheknock. Iftheyletthemessengerin,theycanrestrictwhatheisallowedtodowhileinthehouse.Themessenger may,forexample,pickupapieceofpaperandcarryitbacktohishouse.Thiswouldcorrespondtoa file transfer over a network. If the inhabitants of the house accidentally leave a door open, though, a

messenger may be able to come in the house without permission and do whatever they like, again withoutpermission.(Therearemanydoorsbecauseamessengeroccupiesaparticulardoorthewhole timeheisinthehouse.) Afirewall,inthisanalogy,wouldcorrespondtoacompletefacadebuiltaroundahouse(orgroupof houses,tobepicky).Theactualhouseisnotevenvisiblefromthestreet.Thedoorsoftheoriginalhouse areonlyvisibletomessengersiftheinhabitantsofthehousebuildcorrespondingdoorsinthefacade.To enter the house in this scenario, a messenger would have to first knock at some visible door of the facade,beallowedin,andthenknockatandbeallowedintotheactualdoorofthehouse.Inthisway thesecurityofthehouseisgreatlyincreasedfromunwantedintrusions.(Andyoucanhaveacollection oftrustedhousesinsidethefortwhicharelessprotectedfromeachother.) The title of this essay, Mental Firewalls, comes from an article by Timothy L. Thomas which appearedintheArmyWarCollegejournalParametersinSpring1998.ItwastitledTheMindHasNo Firewalls. The Army has an often honorable tradition going back to the Revolutionary War, the minutemen, and so forth. But it also has had and still has some treason in its ranks. This is just the ground truth, the facts on the ground. An army that tortures the domestic population is an occupationarmy.TreasonousNazipigs,inthisrealsenseratherthansomespinmachinecraporsome pathologicalliarsbullshit,mustbedealtwithaccordingly.Thisholdsforallbranchesofthemilitary. Thisholdsforlawenforcementaswell.Itholdsforallintelligenceagenciesalso.Itholdsevenwhen theypretendthetorturedevicesdontexist.Evenifthevictimdoesnotrealizewhatishappeningto himorher,itisstilltorture.Informedconsentmustbetrulyinformed.TorturinganAmericancitizenis atleastastreasonousassellingthenationstopsecretstoaforeignpower. Thomas article was in fact entered into evidence as part of a lawsuit by Harlan Girard of the International Committee for the Convention Against Offensive Microwave Weapons. The articles centralmetaphoristhathumanbeingsarelikethecomputersonanetwork,exceptthattheydonothave theabilitytocontroltheinformationtrafficenteringandleavingthem.Theirports,ordoors,arewide open.Thissortofanalogywasprevalentduringthemilitaryinformationwarfarebuzzwordphase,and illustratesthesortofthinkingthatwasgoingonatthetime.[Onanoteofcaution,notallofThomas' articleshouldbetakenliterallywhetherpurposefullyornotthereissomelikelydisinfothere.] Deception Operations Against the Human Biocomputer What is it that corresponds to your reality?Whatdoyouperceive,andhowdoyoumakeyourdecisions?Youreceiveinformationthrough youreyes,ears,andothersenses.Youreadtheinformationfromthewritersyouchoosetoread,and listentothespeakersyouhaveaccesstoveryoftenthesedaysfromTV,radio,ortheinternet.You thinktoyourself,inyourprivateinnervoice.Youvisualizeandimagine.Ininformationwarfareagainst individualsallofthesearethoughtofasnothingbutinformationchannelsthatcanbeblocked,censored, coopted,faked,forged,impersonated,orotherwisecontrolledtomanipulateanindividual.Ifyoucan controlalltheinformationanindividualreceivesthenyoucancontroltheirwholeperceivedreality.Like thehypnotizedsubjectwhodoessomethingwhichviolateshisethicswhilebeingpersuadedtoimagine heisdoingsomethingelseentirely,theinformationwarfaresubjectisactinginafantasyworldcreated preciselytomanipulatehimtodowhathiscontrollerswant.Thisisknownasadeceptionoperation. Such complete control, as far as I know, is not yet possible, but the principles still hold for whatever approximationcanbeachieved.Andtheprincipleshavebeenputintopractice.Ofcourseinformation warfareisabuzzwordandmostofitisjustatakeontheagesoldpracticesofpropaganda,lying,and manipulation.Butanewbuzzwordgeneratesfunding,andperhapsmoreimportantlyservestomorally distancethenewcleanpracticesfromthedirty,filthybusinessofamorallymanipulatinghumanbeings like pawns, with complete disregard for unalienable human rights. What was new at the time of informationwarfarewas1)theinternetasawidespreadsocietalforce,and2)thewiderdevelopmentof

neuroinfluencingandsocallednonlethalweaponsthatcandirectlyinfluencepeoplesbrains. Asmedicineandtechnologydevelopevermoreadvancedprostheticdevices,peoplewillincreasingly becomecyborgsasisalreadyhappening.Becauseofthistrendtheseissueswillbecomeincreasingly clear with time. That is, it will become increasingly common to have computer devices implanted in onesbody.Ifsomeonehacksintoyourhomecomputerandstealsormanipulatesyourdatathenacrime has been committed and you should rightly be angry. But if someone hacks into your physical body, brain,andmindtheviolationisincomparablygreater. TheBasicModernMindControlTortureOperationInthissectionIwilldescribethebasictorture setupusedagainstourhypothetical,compositemindcontroltorturevictim.Thefocusisontheeffects thatthevictimexperiences,notnecessarilytheparticulartechnologythatisusedtoinflictit.Remember in all of this that the torture any individual receives can vary. It will vary according to the torturers motivesandtechnology,butwillalsobetailoredtothepsychologyofthevictim.Whatmightbotherone personwouldnotbotheranother.Theprofessionaltorturerswillstartaccordingtohowtheirtorture manuals say to go about torturing someone with your profile, but almost all torturers will refine the torturetotheindividualiftheycan.Astheylearnwhatbothersyoutheycanfocusonthatmoreand moreintheirtorture.Asyoureadthis,keepthatinmind.Thesetorturersarenotanydifferentfromthe sortyoumightreadaboutinRedCrossliterature,whoshockthegenitalsofvictims,etc.,exceptthat they have access to abuse the most advanced technology and hide behind an evil U.S. government whichsinkstothelowestcommondenominatorofthetorturersitprotects. Firstofall,thevictimisunderconstantsurveillance.Thevictimisharassedovertlyandcovertly,onthe street,oninternet,etc.Allformsoftauntingandgoadingtendtooccur.Forexample,thereisaMarco Polotypeofcanyoucatchmetaunting.Anyandallsortsofhightechandlowtechharassmentare used.(Justbecauseitissophomoricorpatheticdoesnotmeantheywillnotdoit.Infact,thisincreases thelikelihoodthatthevictimswillberidiculediftheycomplain.Remembertheshoepowdertomake Castrosbeardfallout?)Thevictimsoonhastowonderabouteverythingthatbreaksorgoeswrongin theirlives.Theharassersusetheirsurveillancetoseewhattroublesthevictimishavingandthentryto takecreditforcausingthem.Thetorturersareoftenarrogantandevenincompetentattheirviletorture jobsdespiteusingthemostadvancedtechnologytocommittreason. Thevictimispurposelyisolated.Peopleclosetothemarethreatenedordeceptionsarecreatedtomake thevictimsuspectthoseclosesttohimorher.Deceptionsarelaunchedsovictimswillblameinnocent neighbors for the harassment. (Unfortunately, in the despicable circles of mind control torture, it sometimesisaneighbororevenaclosefamilymemberthattrulyisresponsible.Theremightbeanout ofcontrolsafehousenextdoor,forexample.) Thevictimiszappedinsidehisorherhome(oradeceptionoperationislaunchedsothevictimthinks thisiswhatishappening).Heartrhythmpalpitationsinducedbyremotetechnologycancauseterrorto anindividualinsidehisorherhome. Thevictimsmindisunderassaultwithvoiceprojection,voicecloning.TheVillageVoice,inanarticle from July 2001 titled Psycho Warfare, described an Air Force report uncovered by Nick Begich. Quotingfromthearticlethetechnologymaybeabletocreatehighfidelityspeechinhumans,raising thepossibilityofcovertsuggestionandpsychologicaldirection.Itmaybepossibletotalktoselected adversariesinafashionthatwouldbemostdisturbingtothem.Thisisexactlywhattheydo,andthere are several different technologies documented in the open literature which can achieve this. Some victimsmaybetestcasesforsuchpsychologicalharassmenttechniques,orthemethodmayalreadybe perfected and in covert operational use. [They don't mention this in psych textbooks or in movies about"schizophrenics,"dothey?]

Twentyfourhoursaday,thevictimissubjectedtocommands,ridicule,anddistractionsinsidehisorher privatemind.Howwoulditfeelifyouheardavoiceinyourheadasking,Canyouhearthis?asif someone were calibrating a torture device? The brain wants to respond it was never meant to be violatedintheseways.Interrogation.Whatmightbotheryou?Anysecrets,etc.,thepigsmightteaseout andharassyouwith?Anythingthatwouldinsultyoutheycouldfocuson?Anythingthatmightdistract youtheycouldkeepyoudistractedwith? Finally, the victims supposedly private, subvocalized thoughts are somehow read, or inferred and analyzed.Therearevariouslevelsatwhichthiscanoccur,fromremoteheartbeatandeyegazeanalysis all the way up to brain implants telemetering EEG signals. Not all victims report this level of surveillance, and certainly just the other harassment techniques mentioned above result in a grotesque human rights abuse. But many victims discover that even their supposedly private thoughts are being violatedandmanipulated. Living with Constant Harassment How do you deal with ordinary social interactions with the pigsharassingyouconstantlyinyourmind?Doyouactethicallyandwarneveryoneyouinteractwith thattheirprivacyisalsobeinginvaded,bywayofyou,againstyourconsent?Peopleyouinteractwith either believe you or they dont, but either way the social dynamic is completely changed. The pigs invadetheprivacyofeveryonearoundyou,byusingyou,eventhatofyourspouseandchildren.They may also impersonate anyone you see, in your mind, to make it seem as if that person is the one contactingyou.Theytrytomakeitseemlikeeveryonecanhearyourprivatethoughts,thatyouare broadcastingtoeveryone.(Ofcoursesomevictimsmightactuallybedoingthatiftheycanreadyour thoughtstheycouldthenbroadcastthemwidefieldorlocalfield) Whatsortofcareerareyouallowedtohaveinasystemwhereyourintellectualpropertyisstolenthe minute you think it up and where you have to cope with both regular harassment as well as harassmentinyourmind?Allthisisinadditiontotheordinarystressesofthejobandnottomention thatsomejobsrequireactualmentalconcentration.Howsociablearelongtermharassmentvictimswith serious cases of Ongoing Traumatic Stress Disorder? In American society there are also plenty of viciousjerkswho,whilenotNazisortorturers,arequicktosenseperceivedweaknessesinpeopleand homeinonthem.TheNaziscanoftenjustwoundapersonandthenthrowhimorhertothesharks, bleeding. Itisnaturalforhumanstothinkaboutotherpeople.Itisevennaturaltorunamentalsimulacrumprocess toimagineandempathizewithotherpeople.Monkeysee,monkeydo,airguitar,Iwasjustthinkingof youetc.Therapistpigstrytoturnthisagainstthehumanbeingstheytorture.Sexisalsoanatural process, as is farting, masturbation, defecation, burping, spats with people, fantasy, and so forth. The rapist torturers try to turn this against their victims. They constantly attempt to demean their victims. Worrying and anxiety are also normal human emotions. The torturers, though, try to turn all of these humanpropertiesagainsttheirvictims. OnetechniquetheNazipigsuseistotrytoreinforceanythingyoumightworryaboutorfeelanxious about.Itisliketakingadynamicalsystemanddrivingitatitsnaturalfrequencyinordertopurposely destroyit.Ofcoursethisisnottosaytheidiotsknowanythingaboutdynamicalsystems.Ifyouever readLordoftheFliesinjuniorhighschoolyouknowaboutthelevelthatthesepigidiotsoperateat,but whentheyrapeyourbraintoinflictsuchridiculeandhatefulnessitsetsuppositivefeedbackprocesses in the brain that constitute torture. (If I am teaching these idiots anything by this, then you had better watchoutbecausetheyhavealreadytorturedme.)Theywillpurposelyinjureyouandthenpickatyour scabsifyoustarttoheal. Thisprocessalsohappensbecauseyouknowdamnwellyouareundersurveillanceandthepigridicule

squadistheretotauntyou.Trynotthinkingaboutsomethingyouareconditionedwithcattleprods intoknowingwillresultinharassment.Youknowthetorturerswillzapyouthatiswhytheygoad youwithtriggersattimesbutitislikenotthinkingofapinkelephantoncommand.Yinsproduce yangs,sotospeak.Transcendingtheyinsandyangsishardenoughwithoutthetorture. Thetorturerstreatyourpersonal,private,internalspeechasifitwereyourpublicspeech.Theytryto subjectyoutoalltheignoranceandpoliticalcorrectnessandeverythingelsethatsomeoneatapodium inapublicplacemightbesubjectedto.Thesadistnannystateisnotjustconcernedwithwhatyousayin yourownhome,theywanttoregulatewhatyouthinkinsideyourheadalso.Thatcanreallycauseyour moronanticipatorthoughtpatterntodistractfromyournormalprivatethinking,becauseyoucannot eventhinkyourprivatethoughtswithoutknowingtheywillbereviewedforyoubyrapistmorons. The Possibility of MagicianLike Illusions to Deceive Victims The technology for thought inference does exist, but it is important to keep in mind the ways in which magicianlike deception operationscanbeappliedtoapersontomakeitseemtothemthattheirmindisbeingread.Whilesome victimsthoughtsareread,allofthesetechniqueshavelikelybeentestedonnonconsentingAmerican citizens.Theclassicexampleiswherethemagicianfirstsubliminallyinsertsathoughtintoavictims brain and then later the magician reveals what the person was thinking. By waving his hands and stronglysuggestingtothevictimthathisthoughtsarebeingread,thevictimseesthephonyevidence andtendstobelievethatiswhatishappening.Theoutrage,indignation,andterrorresponsesthevictim is feeling will also tend to interfere with his or her reasoning processes. Advanced profiling and prediction,basedonstandardsurveillancetechniques,isanotherpossiblemeansfordeceivingaperson into thinking their mind is being read. While some victims have undoubtedly had such deceptions inflictedonthem,theblackbudgettorturersbeforetheywilladmitthetrueextentoftechnological advancementwilllikelytrytoclaimthisiswhatwasdoneinallcases.Purposefullysettingupthe illusionofmindreadingonavictim,though,iseverybitasdespicableandcriminalasactuallydoingit. The setup for the elementary example above can be carried out with only a basic voicetoskull projectiondevicewiththevictiminrangeforsomeperiodoftime.Supposeyouwantedthevictimto think about blue violets, for example. You could beam at the victim very quiet suggestions of blue violet.Youcouldsendthemasongthattheythoughtjustgotstuckintheirheads.Youcouldusevoice cloningtechnologyandtrytofaketheirownvoiceintheirhead.Anothertechniqueistotransmitaword or phrase that is closely associated with what you want the victim to think about or do, and let their brainsassociativememorydotherest.Now,afterthesubliminalsend,thetensionanddramabuilduntil thesadistmagicianculminatesthisparticulardeceptionoperationagainstthemark(a.k.a.humanbeing). Themagiciansendsanemailto,say,apublicmailinglistthevictimisknowntoread.Inthetextofthe messagethemagicianworksinthephrasebluevioletperhapscombinedwithasubtlethreat. MultipleVictims,MultiplePerpetratorsTheaboveexampleisonlythemostelementary,ofcourse. Whatiftwovictimswereinteracting,howcouldapairofthembemanipulated?Thevariationsinclude two nonconsensual victims, or a consensual harasser messing with a nonconsensual victim. There are alsowittingandunwittingvictimssomehavefiguredoutpartsofwhatisgoingon(intendedornot) whileothershavenot.Somehavebeenpurposelydupedintomisinterpretingwhatisgoingonthey maythinktheyarepsychic,forexample.Whataboutwidefieldprojectiondevices?Iftwointeracting peoplearegiventhesamesubliminalstimuli,howmighttheyinterpretit?Ifyouwerentpayingclose attention, would you know if you were the sender or the receiver? Especially if the manipulation continued for a long period without your awareness, perhaps even from childhood. When PTSD is purposely induced, the victim is that much more susceptible. Then you can consider the case where therearefarmorethantwovictimsinteracting:asocietyofwouldbeslavemastersandthosetheywould holdasslaves.Thegeneralsituationinvolvesmultiplevictimsandmultipleperpetrators,allinteracting.

There are many, many different scenarios. I even considered writing an academic paper on the topic, something like Mind Control Games People Play. Suppose you assume a particular set of technologies is available. What logically follows from that? It is like science fiction except that the reality these days is beyond science fiction. The military might call it wargaming. It is amazing the hideoussortsofoperationsthatarepossiblewithonlyyourbasicsecretvideo/audiosurveillanceofan individual. Now assume that a targetable voice projection device exists. What could the people controlling it do in the worst case? What sorts of deceptions could they carry out? What countermeasurescouldbeadopted?Whenitreallydoesexistandtheconsequencesaresofarreaching, isnt it unconscionable to leave the public in the dark about it? Could a politician resist abusing this secretpower? For the purposes of the rest of this essay I will assume our composite victim has been injected or implantedsomehowwithabrainbugthattransmitstrackinginformationaswellasaudioandvideoof thesights,sounds,andinternalsubvocalizedthoughtsthenonconsentingvictimexperiences.Thisis somethinglikeanadvancedformoftheCIAsAcousticKittyprojectfromthe1960s,whereacatwas wiredupasamotorcontrolledlisteningdevicetobeusedinspying.Thedifferenceismanyyearsof technologicalrefinementintegratedcircuitswerenotevenavailablethen,letalonenanoscaledevices andtheobviousdifferencethatahumanbeingisbeingtortured.Iassumethatthisdevicecanalso injectsoundswhichthevictimperceivesasifheorsheheardorthoughtthemininternalspeech. Thisissomewhatlesscontrolthanwhatsomevictimsreportexperiencing,butnonethelessissufficient to illustrate most of the methods. Even if such devices are not available to some particular group, variations of most of the techniques can be created by lowertech methods like standard surveillance devicesandexternalzappingorvoiceprojectiondeviceswhicharepubliclyknowntoexist.Thepoint isnottheparticulartechnologicalimplementation,butwhatthevictimexperiences. TheRealtimeIdiotandtheAutopigThetermIuseforanexternalvoiceprojectedintoavictims mindistherealtimeidiot.Foranillustrationofwhattherealtimeidiotsseemlike,considerasecret studiolikeataradiostation.TheDJsinthiscasearetherapistsmonitorswhositandlistentothe violatedthoughtsofthevictim.Thesetorturersalsohavemicrophoneswheretheycanconversewith theunfortunatevictiminrealtime.Thevictimhearsthesetransmittedvoicesinhisorherhead.Perhaps therapistsalsohaveavirtualrealitycomputerdisplayofeverythingthevictimisdoingatthetime,or evenadisplayofexactlywhatthevictimseesthroughhisorhereyes.Anythoughtsthevictimhas, the realtime idiots try to pretend it is like a conversation with them. You could not think a rhetorical questiontoyourselfinyourownprivatethoughtswithouttherealtimeidiotscomments.Youcouldnot pauseforamomentofsilentmentalreflection.Theycommentonthings,theyharass,theygoad,they distract,theytrytoissuecommands,theyattempttodemeanthevictims(Gobrushyourteeth).This allwhilethevictimtriestolivehisorherregular,ordinarylifeandinteractinthephonysociety. AtthispointIhavedescribedthetechniquewherebyNazipigsbeamwordsandvoicesintothemindof the victims in order to harass and torture them. This requires too many lowlevel Auschwitz guards, though.Thesedumbsadistsmaygetdrunkandstarttalking,ortheymaygetreligionandtrytoexpose theirformeractivities.Theneedforpersonnelalsolimitsthenumberofvictims,orsubscribers,who canbecontrolledbythesystem.TheAmericananswer,ofcourse,istousetechnologytoautomatethe processandincreaseproductivity.ThisresultsinadeviceIcalltheautopig(ortheCameron/Delgado memorialautopig). Theautopigatitssimplestisjustadigitalrecorderthatsendsfixedmessagestothevictimsatrandom times.ThisisverysimilartoCameronspsychicdrivingtorturethatheinflictedonpeoplecominginfor psychiatrichealthcare.IsometimescalltheserandompulsesBergeronpulsesafterVonnegutsshort storyHarrisonBergeron(notthemovie,whichisgoodbutdifferentfromtheshortstory).Inthestory all people were forced to be equal by handicapping those with exceptional abilities, and strong

thinkershadtowearadevicewhichwouldperiodicallyemitaloudtonedesignedtodisruptthetheir thoughtstream. Of course an autopig could also be used as a computeraided torture device so that a single human torturercouldswitchbetweenvictims,secureinknowingthatnoneofthemwasbeingleftaloneintheir privateminds.TheDelgadopartcomesinwhenthedevicegetsfeedbackfromthevictimsbrainand sends an appropriate message. That is, the sensor system analyzes the brain rape data, an AIlike algorithm decides what sort of response to send to the victim, and then the digital voice simulator constructs it and sends it. Thus each victim has his or her own electric fence or something like the invisiblefencingtheyuseondogsbutmoretechnologicallysophisticated.(Youcanconsiderthingslike statefulautopigsandstateless,ormemoryless,autopigs,andsoforth.Itisbasicengineering.) Besidesrealtimeidiotsandautopigs,thereissomethingIcallaDelgadobutton.ADelgadobuttonisa buttontheharasserscanpressandwhichstimulatessomepartofthebrain.TheremaybemanyDelgado buttons,forexample,andtheharasserslearnwhateachonedoesempiricallybyobservingthevictims. TothevictimaDelgadobuttonwouldjustfeellikesomesensation,experience,oremotioncameover themallofasudden.Itmightoccurataparticularlyinappropriatetime,forexample.Itmightalsoserve asadistractionwhenthepigswantedtostopsomeparticularthoughttrainyouwerehaving.Itmightbe difficulttonoticesomesubjectsinpublishedresearchwouldrationalizesuchinducedbehaviorsandsay that they just decided to do whatever behavior the buttons evoked. A Delgado button also need not literally be a button and a brain electrode, it could also be something like a microwave beam at a particularfrequencyandwithaparticularmodulationaimedataperson.Metaphoricallytherecanalso beconditionedsoftwareDelgadobuttonsinadditiontothehardwarewiredinelectrodebuttons. DataAnalysisUnderTortureNowthatIhavedescribedthebasicmindcontroloperation,inthis sectionIconsidertheproblemofdataanalysisforavictimofsuchcrimes.Dontblamethevictimstry to understand the hideous position they were thrown into and which they in no way got to choose. Naive sciencedude has probably not spent 5 minutes considering what victims are forced to agonize over for years. The situation is closer to game theory with a malicious opponent rather than to the usual study of natural science, where natural phenomena are considered to be repeatable (or at least indifferent). Thevictimsmustrelymostlyontheirownsensationsandintrospectionthatisjustthenatureofthissort ofadvanced,secrettorture.Thisisnottosaythatevidenceoftheordinarysortsofharassmentshould notbecollected,orthatabreakthroughwillnotoccurandsomeonewilllearnhowtodetectwhatever signalsordevicesareusedtoinflictthemindcontroltortureandmakeitavailabletothevictims.The first challenge for the victim, though, is just to figure out what is really going on. Many do not even have the language to describe what is happening to them. They have to see beyond the stagecraft (tradecraft) of the Nazi technical illusionists. The victims need to live their lives each day with whatevermentalfirewallcountermeasurestheycanadoptintheirminds.Beyondthistheycangather evidencetoconvinceotherpeopleorforalawsuit.Theywilldiscover,though,thatforthetimebeing thecourtsystem,likethepsychiatricsystem,ispartoftheproblem. Howmanytimesdoessomeonehavetobeamaclearlyexternalvoiceintoyourheadbeforeyouhaveto question all your thoughts? Not too many times, once really. Some victims of this oneshot voice projection mind control may still suffer for years. When will you believe they are not reading your thoughtsorthattheyarenottryingtomanipulateyou?Whenthetruthcommissionrevealsthecrimes? No,youwillneverbelievethemagainonceyouknowhowthepigsoperate.Mostvictimssufferfrom farmorethanjustonevoiceprojectionexperience,though. InternalandExternalThoughtsandSensoryInputsInsidethemind,thetorturevictimsreallyare

human beings just like everyone else (even though they are treated worse than anyone would treat a dog). They see with their eyes, hear with their ears, etc., have internal dialogs thinking about things, sparks of intuition, and all the usual features of the human mind. As mentioned earlier, these are the processesthemindcontrollersattempttohijack.Forthevictimswecanconsiderthattheirthoughtsfall intothreecategories:internals,conditionedinternals,andexternals. Aninternalisanormal,naturalthoughtgroundedinexternalsensoryinputthatthepersonconsensually engagesin.Theusualthoughtmodelthatmostpeoplehavetheluxuryofbelievingisthatalloftheir interactions are consensual and that their private thoughts are actually private and not tampered with. Thatis,theyonlyexperienceinternals. Anexternalisanonconsensualinput,likeCameronspsychicdrivingwhereapersonisstrappeddown andforcedtolistentomanipulativerecordingloops.Inthemodernsense,theexternalsarethevoices projected into a persons mind from an external source. (You can theoretically have consensual externals,evenofthissort,butthevictimscertainlyneversawaconsentformandyoudbeafoolto consenttohavingthepigsthevictimsarefamiliarwithhaveanythingtodowithyourmind.)Thesignal fromaprogrammedautopigchipintheheadwouldalsocountasanexternal.Anexternalcouldalsobe anemailfromaNazithatisbasedonmindrapeddata.Anynormallyconsensualinteractionbecomesan externalwhenmindrapeddataorpsychologicaltriggersarepurposelyembeddedthere. Aconditionedinternal,inthesensebeingdiscussedhere,isaninternalthoughtprocessthatisadirect resultofthetorturebyexternals.Thementalfruitofthepoisonedtree,sotospeak.Afteraweekorso ofhavingyouareagoodmarinedrilledintoyourheadfromnonconsensualexternals,thenwhenthe machineisturnedofftherewilllikelystillbethetendencytohearthephrase.(Besideswhateverother damagesuchharassmentcauses.)Thisisespeciallytrueiftheconditioningwasspecificallyfocusedon certain stimuli though random stimuli also become conditioned in the same way that a bell ring is associatedtothebowloffoodbythesalivatingdog.Asimilarsoundingphrase,forexample,canserve as a trigger for a conditioned internal. Conditioning during trauma is also strong and longlasting and canbringbackvividfeelingsoftheoriginaltortureexperience. The manipulators can probably get some unwitting victims to march around their own homes like controlled robots. Peoples sensitivity to what is internal or external in their head would vary accordingtotheperson.Age,lengthofabuse,andtheparticulartechnologyandtechniquesusedwould also influence who becomes witting nonconsensual. Perhaps this is a part of what determines who theyharassandtrytobreakandwhotheysecretlycontrol.Thosesusceptibletohypnosismightbe especiallyvulnerable,andsomevictimsmaybeinfluencedonlywhiletheysleep.(Isitterrorismtocall forblowingupaNazitorturecenterthatdoesntexist?) The Protocol A way to verify that a signal is purely external is via the protocol. This protocol assumes you have a cooperative person on the other end of the external channel you wish to authenticate.Inpractice,whatyoulearnisthatifthereissuchanexternalchannelyoudonothavea friendly witting on the other end. (And victims know from long experience that there is such an externalchannel.)Thatis,theprotocolisawaythatafriendlywittingcouldauthenticatetoyouthe existenceofaninformationchannelthatsupposedlydoesntexist. If you have visual, auditory, or tactile contact with a person the protocol is easy. (It is better if they cannotseeorhearyou,sincethatconstitutesanother,uncontrolleddatapath.)Supposeyoucanheara persontalking.Thentheprotocolistothinktoyourselfsomethinglike,say4533.Youmaywishto choosesomethingelsetheycouldsaywithoutattractingattention,ifthatisaproblem,butbesureitis somethingwhichisveryunlikelywithoutamentalsend.Count,say,fivesecondsforaresponse.Either theyhearyourthoughtsornot,andtheyeitherrespondornot.Inthiscasethechannelisspecifictoa

person and may not exist or the person may not be a friendly. For visual contact the situation is similar,youcanthinksomethinglike,holdupthreefingers.Noticethatthisprotocolalsoworksfor something like listening to a realtime broadcast such as radio. A similar protocol works for written media, think write the number 6423 and email it to me or put it in your newspaper column. Note, though,thatinallcasestheremaystillbeahiddenmaninthemiddle. Youcanactuallyverifyapureexternalsendandreceivewithoutvisual,auditory,ortactilecontact.Just the mental contact. This applies to anyone and everyone who can hear your thoughts and send a reply.Itrequiresthatyouhaveacalculator,andacooperativepersonwithacalculatorontheotherend ofthechannel.Theprotocolis,Whatisthecosineof1999?Thefirstfourdigitsafterthedecimal,in radians, one at a time. If the pigs cannot send that data they are either retarded or engaging in a conspiracy.Thereareacoupleofotherpossibilities,includingpureinternals,butthepointistohavea cryptographicauthenticationchallengetoverifyapureexternalsendandreceive.Anyonecanpunchthe buttons1,9,9,9,cosonacalculator.Idonotknowtheanswer,butIcancheckiteasily.[Youshould changethenumber1999tosomethingelseforyourownprotocol,sinceyouwanttobeabletoconclude apureexternalreadandsend.Thenumberissomethingyouonlythink"toyourself,"andchooseanew challengenumbereachtimeyoucheckaresponsewithacalculator.] They never send valid fourdigit numeric data, let alone the correct answer. They do send numerics, though,andcouldpresumablyprogramtheanswerintotheautopig.Andtheygetsloppysometimesand you get a good strong piece of data that indicates external reads and sends, even though they do not sendtheprotocol.Thisisonereasonsuchaprotocolisuseful:Itillustrateswhattheidealdatawould looklikeforaremotereadandsend,andcanhelpclarifymoreambiguoussituations.Butkeepinmind possiblemagicianlikedeceptionsaswerementionedearlier. TheCalibrationProblemInevaluatinguncertaindataintherealworld,includingthatfromhostile sources,itisimportanttocalibratetheexpectedlevelofbackgroundnoise.Ifyouarereadingthetorture betweenthelines,youalsoneedtokeepyourheadandnotgooffontoomuchunconnectedsymbolism. Keepthisinmindwhenreadingitemsthattrulycouldnotpossiblyrelatetoyouoryoursituation.This gives you an idea of the basic background level for symbols, etc., to appear. Keep a threshold and discardanyquestionabledata.Thegooddatapointstendtobefrequentenough,andatsomepointeven theydonottellyoumuchyoudonotalreadyknow. Asanexample,supposeyoucursedthepigs,justinyourhead,sometimes.Ifyougetthemangrythey sometimesscrewup.Sayyouweretauntingthembyaskingthemwhethertheypickedupyourthoughts inNiger(asanrandomexampleofafaroffplace).Bytheway,youcantauntthemallyouwantinyour head,sinceitisonlyyouandtheNazisthere.Likewise,cursethepigsthatbugyourhouseallyouwant. Theyjustdonotseemtounderstandthatiftheyrevealanythingtheyknowaboutyourprivatementation orprivateconversationsinyourhometheycannotcallyoucrazy.ItwouldbelikeenteringtheFBItapes ofMartinLutherKingsayingtheFBIwasouttogethimasevidencethathewasparanoid.Thevoice inmyheadsaidIwascrazy.BacktotheNigerexample,supposeyouthengetemailfromsomeone claimingtobeavictim,whohasanameverysimilartoyours,andwhoclaimsthathewenttoNigerand couldnotescapetheharassment.Thatseemsprettyunlikelyforacoincidence.Thenthequestionis,is thepersonawittingorunwittingharassmentagent,i.e.,isitanothervictimmanipulatedintoharassing youorisitacointelproagent?HowmanypeoplehavebeentoNiger?Manyvictimsareunderstandably afraidtotalkaboutsuchexperiences,though. ReasoningUnderUncertainty One thing that the mind controllers do and which manipulators andpropagandistshavedoneforalltimeistoexploitweaknessesinhumanreasoning.Thebrainisa fantastic,beautifulorganofthehumanbodynohumanbeingontheearthshouldeverbetortured.But humans also tend to have some weaknesses in evaluating data compared to, say, a mathematical

algorithm. One difficulty lies in dealing with uncertainty. The mind control victim is literally overwhelmed with uncertainty and must sort things out as best as he or she can. The victim has to considereveryweirdthingthathaseverhappenedtohimorher,whetheritisrelated,andknowingthat themindrapistswillseethisthoughtprocessandtrytoreinforceanymisconceptions.Anotherdifficulty is dealing with distractions, especially when they come in on a hostile channel that the brain was nevermeanttobeaccessedon.Proportionalityandscaleareanotherdifficulty,andpeopletendtothink binaryratherthancontinuous,andonedimensionalratherthanmultidimensional.Peopleoftenhavea tendencytowardsuperstitiousthinking.Finally,inasocialsense,peopleareverybadatdealingwithbig lies,i.e.,conspiraciesofliars. Understandaggregatestatistics.Youcansometimesreasonbetterwiththem.Asanexample,youknow thattherearesomepeopleintheworldyoucantrustyoujustdontknowexactlywhichonestheyare. Youcanoftenestimateaggregatestatisticsbetter,sinceifyougetonewronghereorthereitallaverages out.Supposeyouestimate,basedonagreatdealofdata,thatpostersonsomemailinglistare,say,40% agents and provocateurs, 35% real victims and activists, 15% who probably consider themselves scientific,nonsuperstitiousthinkerslookingforthetruth,andanother10%whoareunclassifiable.There aresomewhoyouaresureenoughabouttonotworrywithpercentages,butingeneralanyparticular persononthatlistissuspect.Nonetheless,thelistcanstillfunctionasawaytoreachandconnectthe 35%ofmindcontrolvictimsandactivists.Itmayalsoserveasawaytoconvinceandeducatesomeof the actual openminded decent people who are not mind control victims. Another use of aggregate statisticsistoreasonfromhistoricalrecords.Weknowthattherearethousandsofmindcontrolvictims inthepopulation,attheleast.Wejustdonotknowwhichparticularpeopleclaimingtobevictimsare theactualvictims(orwhichstillunwittingpeoplewere/arevictims).Neverforgetthehumanityofthe realhumanbeingsinvolvedinthestatistics,though. The Asymmetry of Dignity You are a human being with unalienable human rights. Unalienable means that they cannot be taken away. They can be violated, infringed, ignored, and even legislated away,buttheactsofatyrantdonotchangethefactthatyouareahumanbeingwithunalienablehuman rights.Thismeansthatthetyrantisalwaysatyrant,andremainsatyrant,tomeetthefateoftyrants.The sameholdsforthelackeysandcollaboratorsoftyrants.Thisisafundamentalasymmetrybetweenthe citizenandthetyrant. Torturedemeansthetorturer.Thedignityofthetorturevictimcannotbetakenawaybythetorturer,but theactoftorturedestroysthedignityofthetorturer.Thisisnotenoughpunishmentforsuchhideous crimes,butgivescausetopitythetorturerevenasyouworktohangthepig.Letmeexplainaboutwhat ImeanaboutjusticeforthevictimsofthesetreasonousNazis,whocommitcrimesagainsttheirfellow Americancitizensinpeacetimewhichwouldbewarcrimesevenagainstanenemyinwarfare.Undera legitimategovernmentsuchpeoplewouldreceivelifesentencesinahumaneprisonsystem.Thatwould bemypreference,buttheUnitedStatescurrentlyhasneither.SowhenItalkabouthangingthepigsI amreferringtowhateverjusticetypeprocessescanbesetintomotion.ThatwasthesubjectofPartII. Gettherightones.Wewillnotforget,andwhenthesepigsare75yearsoldtheyarestillNazipigsand still serve the rest of their worthless lives in a humane prison cell if such exists. The legitimate government treats mind control torture like the true crime it is, even when government agents are involvedincommittingthecrimes. Youhaveabsolutefreementationinyourbrainandmind.Yourfreedomofthoughtisunalienable. TheNaziPigTheoremTheadjective,Auschwitzlevel,todescribethesecrimes,isnothyperbole. If you do not feel like you need to vomit, you probably do not really understand the full sickness of mindcontrolcrimes.GordonThomaswroteintheintroductiontohisbookJourneyIntoMadness:The TrueStoryofCIAMindControlandMedicalAbuse:InworkingonthisbookIhavehadtocometo

termswithmyownemotionsdisbelief,bewilderment,disgust,andangerand,morethanonceinthe earlystages,afeelingthatthesubjectwassimplytooeviltocopewith.NothingIhadresearchedbefore could have prepared me for the dark reality of doctors who set out to deliberately destroy minds and bodiestheyweretrainedtoheal.Torturerscanneverblametheirvictims,thoughtheyinvariablytry. Thesetorturersarethesortsofpeoplewhowillrepeatedlyhitaboundandgaggedvictimwithastick andthentrytoclaimthevictimcausedit.Theyllstealfromyouandthencomplainabouttheproperty theystoletheyllrapeyouandsneeratthequalityofthesex. ThisbringsmetowhatIrefertoastheNaziPigTheorem(NPT).Strictlyspeakingitisametaphorical axiom,butitcanbeveryusefultothetorturevictim.ItbasicallyassertsthatifyouactlikeMengelethen youareaNazipig.Thenthereareafewobviousconclusionsthatarealsopartofthetheorem. TheNaziPigTheorem(NPT): Anyonewhononconsensuallyviolatesyourbrain/mind/mentationusingMengelelikemethodsis aNazipig. YoudonotcarewhataNazipigthinks.YoudonotcareaboutaNazipigsopinions.Youdonot respondtoaNazipigridiculingyou,threateningyou,tryingtodistractyou,orotherwisetryingto manipulateyou. YouworktogetaNazipighanged.

Isntthatobvious?Dontyoubelieveit?Thenrememberitandactlikeyouknowit.NPTisassharpas arazor. ThecontrapositiveofNPTisalsouseful:IftheyarenotNazipigsthentheyarenotrapingyourbrain.

SoyoucanthinkanythingaboutanyoneitsjustyouandtheNazisinyourmind,andtheiropinionsdo notmatteratall.IfyouhaveapassingthoughtaboutsomeoneandtheNazistrytoharassyouwithitor make you feel guilty about it, it does not matter. The Nazi pigs opinions do not matter (unless they somehowhelptogetthepigshanged).Ifyouthinksomethoughtaboutsomeonewhoreallyisraping yourbrain,thenyouhavesomeworsethingstothinkaboutthatNazipieceofhumangarbagethanwhat floatedthroughyourbrainoriginally. OneuseoftheNaziPigTheoremistotrytogoonwithordinarylifeevenasyouarebeingtorturedand youknowthetrue,evilnatureofthesocietyyouarelivingin.Spendsometimeeachdayworkingfor justiceinthephysicalworld,andtherestofthetimetrytoignoretheNazipigsandgetonwithyourlife asbestasyoucan.Myphilosophyisbasicallytowishpeoplewell,andanydifferencesIhavehadwith peopleareallwaterunderthebridgeafternottoolong.Butatrocitiesnever,everpassunderthebridge. Thevictimsneverforget,andnevershouldforget.Ofcourseanyvictimisfreetochoosetoforgivehis or her torturers, but for torturers to lecture their victims about forgiveness is the Christianity of the oppressor.Forgivenessalsodoesnotprecludejustice. Theunfortunaterealityisthatwhendealingwithanyone,theyareeitheraNazioranonNazi.Torture makesitthatclear.Thisisthetopnodeofthedecisiontreeforthetorturevictim,anditisastarksplit. Thefollowingdiagramillustratesthesplit:

Thatisclearenough.OfcoursethedifficultpartisthatyoudonotknowexactlywhoisaNazipigand whoisnot.Soyoumightstartoffwithareasonablebenefitofthedoubtandcollectevidencefromthere toupdateyourcurrentassumptions.Buthowdoyoudealwithsomeoneyouthinkhasa10%chanceof beingaNazipig?Howdoyoudealwithsomeoneyouthinkhasan80%chanceofbeingaNazipig? Thatisyourownutility/decisionfunctionanditisnoteasy.Peoplehavetomakedecisionsbasedon imperfectinformationallthetime,butthispurposefullyinflictedtorturepushesitpastwhatpeopleare

accustomedtohavetodealwithinordinarysituations.Nonetheless,thegovernmentisaccountablefor theaggregatesituationwheretortureoccursregularlyandsystematicallyinAmericansociety. TheNPTisyourfirewall.Asacorollary,theexternalfirewalltheoremstatesthatyoudonotcare intheslightestbitwhatMengelethinks.Analyzetheexternalincomingsfornatureandsource,as wellasforotherevidenceifyouchooseto,andthensendthemstraighttoyourmental/dev/null. Thenworkeachdaytogetthepigshangedintherealworld,inthebestwayyoucanfiguretodo it (see Part II). There is also an internal firewall theorem: Your brain is your own to think whateveryouwantwith.SimplyinvokeIFTandthinkaboutsomethingentirelydifferentifyou arethinkingsomethingthatyoudontwanttobethinkingabout.Trainyourselftowardthat,at anyrate. Some Suggestions for Thinking about the Harassment The way to think of a nonconsensual external is as an advanced cattle prod that can be modulated in various ways to cause you pain. The modulation happens to be with words or clicks, but that is secondary. It is a modulated cattle prod. Noticeitandtrytogetafeelforthenatureandsourceofthesignal.Wheredoesitseemtobecoming from?Whatisthequalityofthesignal?Lateryoucananalyzethepsyopsentencethepigsmodulated onto the cattle prod signal if you feel like it. (This may reveal more about them than about you the modulationisbasedonyoureflectedoffoftheirfilthyNazidistortingmirrorwiththeirintention being to cause you harm.) You might keep a rough histogram count on the autopig phrases, for example. Does the signal ever have a foreign accent or speak a foreign language? Probably not. But basicallyunderstandthat the Nazi pigs arecomplete, pathologicalliars. Ifthey flatteryou onesecond theyllkickyouintheheadthreebeatslater,youcanalmostcountonit.Pathologicalliarsonlytellthe nominaltruthaspartofalargerlie,andthepurposeistodestroyyourmentalwellbeingandyourlife. Sourcebeforesemantics(signalbeforesemantics).Thesourceiswherethesignalcomesfrom,boththe personsendingitandthesensoryinputmethodbywhichyoureceiveit.Thesemanticsisthemeaning of the signal: it is the interpretation of the signal and its modulation. For example, the semantics of a signalwilloftenbeitsinterpretationasanEnglishsentence.Ifthesignalcomesinonarapechannel,do notevengiveitasemanticsexceptperhapsaspartofanevidencegatheringprocess.Itisjustasensation youfeelfromtheexternalcattleprod.Thepresenceofthenonconsensualexternalsignalitselfistorture andistheonlyrealinformation,sincethemodulationisbypathologicalliarswhoseintentionistocause youharm. Dontdebatetheautopig(ortherealtimeidiot).Evenifitseasy.(Unlessyoufeellikeit.)Theyhateit whenyouignorethem.Goonwithyourordinarylife,meetingpeople,etc.,andespeciallyspeakingout and working for justice in the real world. You can only really ignore them when you know what is going on, though. Some of the people who they march around their own homes like robots probably think they are just ignoring it. There is a big difference between an experienced victim deciding to ignore future signals and some wellmeaning advicegiver who has never been tortured telling you to justignoreit. If it is indistinguishable from an autopig, treat it as if it were an autopig. With some basic voice recognitiontypesoftwareappliedtorapedsubvocalizedthoughts,IcouldwriteanAIlikeprogramthat soundedjustliketherepetitive,simplepatternedNazipigsIamfamiliarwith.Inthissense,therealtime idiotsdonotevenpasstheTuringtest.Actualpeople(whoarenottorturers)havenames,theydonot repeatthingsendlessly,theythinkthingsotherthanharassingyouandcommentingonyourthoughts, andtheycanpushafewcalculatorbuttons.Forinstance,whydoyouneverhearsomeonedrivingtheir cardownthestreetthinkinguseaturnsignal,youasshole? DontexplainyourthinkingtotheNazipigs,itisbetteriftheymisunderstandwhattheyrapefromyou.

By default you are only ever thinking to yourself. Work toward the rapid extinction of the Nazi conditioningimposedonyou,atleastasrapidlyasyoucanmanage.Trytoextinguishyourconditioned responsesandreplacethemwithonlyanawarenessofthetriggeringsensation.Somearerandomevents actingastriggers,whileothersarepurposelyinflicted. It may help to write about what you experience or keep a journal. There are pros and cons to this, though,sincethepigswillhaveaccesstowhatyouwritealso.Itmightprovidethemwithfeedbackto helpthemtortureyouorothers.Ifyoucomplainaboutsomethingtheywillalmostsurelystartdoingitto you more. You have to weigh whether writing about it helps you to deal with it, like when you can shareitwithotherpeopleorwhenyouseehowstupiditreallylookswhenwrittenout.Stupidityisno barriertothetorturers,infactitispartofthetorture.Forexample,ifyoumakeaselfdeprecatingjokeit willnotbelongbeforethepigsaregoadingyouwiththesubjectofthatjokeforreal.Ofcoursemuchof thetortureisneveranythingcleverthetorturersdo,butyourownknowledgethatthesepeoplewhodo not even know you nonetheless hate you enough to violate your mind and then go to a great deal of efforttotrytoinflictseriousharmonyouoftenseeminglyfortheirownentertainment. Trytuningoutthepigslikeyoumightcureyourselfofhiccups.Itmightwork,oratleasthelpyoutrain yourselftoignorethepigs.Noticethenatureandsourceofthesignals,thementalgnatsmeanttoannoy you.Parasiticmindfleas.Ifyouthinklikethemonkey,youllbeasdumbasthemonkey.Ifyouwatch thatTVtoomuchyoullbeasdumbasthemoronsonit.Theywillentertainyourightintodiggingyour owngrave. HowCanaSocietyIDetestDefileMe?Howdoyoudealwithasecrecybredsocietyofdumbas cowsinnocentpeople,Nazipigs,andvictims?Orthecollaborators,apologists,andprofiteers?What about the people who idiotically ask, Why are you ongoing torture victims so obsessed with your torture (and human rights, etc.)? The social system where no one can talk about the elephant in the livingroom,eventhoughmanypeopleknowatleastthatsomethingisthere.Didpeoplenotgetborn withtonguestospeakwith?Oristhisaconspiracyofidiotsandcowards?Whatthehelliswrongwith these people? What kind of people complacently live in a society where torture regularly and systematicallyoccurs,pretendingitdoesnt?Isitstillthatoldpigslavermentality,ortheabilitytolook awayfromsuchabominationsasaneverydaything?Forcenturiesitwasforbiddentoteachslavesbasic skillslikereading.Isitbetterifyoucanreadbutonlyhaveaccesstolies? Everydayforthemindcontrolvictims,itisliketherapevictimwhohastogooutandinteractinthe societywhereherrapistisstillatlarge.Thedifferenceisthatthereisawholeconspiracyofrapistsand theyrapethevictimseachandeveryday.Soperhapsitisclosertowhatwereeuphemisticallycalled comfort girls. How do you think it feels to wake up with a pig in your head? Is that the only alternativetobeingdumbasacowandwearingagaginthissociety?Theconsensusrealityofthe averagecitizenisfar,farfromtherealtruthontheground. Americansarethebestliarsandbiggesthypocritesontheplanet.Theywillprobablyevenbeflattered bythatdescription.Theylovebeingnumberone,afterall.Hypocrisyislikelies,inthesensethatthere isordinaryhypocrisyandthereisbighypocrisy.IfyoucrediblycallanAmericanabigsensehypocrite they will often start spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling someonetheirnewhaircutlooksbad.Americanswanttobebothpeepersandprudes,theywanttorig thegameandcallitfreeenterprise,andtheywanttobeknownforfreedomandlibertyregardlessofany domesticatrocitiestheycommit.Youcanneveruntorturesomeone. If people are capable of outrage there will be far fewer outrages. How dare those pigs do that to anybody.

Forvictims Ifitsnotusefulorenjoyableornecessary,itsaworthlessthought. ZapitoutofexistencewithIFTandthinksomethingelse. Trulyinternal,selfmindcontrolisagoodthing externalnonconsensualmindcontrolisMengeleliketorture. Nonensfollowfromnonconsensualexternals, exceptperhapsonetoputitinthetrashcan orafewtoanalyzeitforevidence,natureandsource. Butthinkanythingyouwant.IcursethepigshitNazissometimes. Focusyouranger. Ah,howsaditis,Auschwitzinthespringtime Onespringtime afteranother Youwillfeelstrongersomedays,fatiguedothers Ifthisessayhelpsyou,readitagainwhenyouneedareminder. TheNaziharassmentneverreflectsonyou. Source:www.JBHFile.comPartIII:MentalFirewallsByAllenBarkerFeb17,2002
Sha e hi : Like hi : Share Liked Youandoneotherbloggerlikethispost.

Categories:articles,blogpost,newsTags:AllenBarker,audiorecording,bodilyharm,Canada, canadianhumanrights,crimeagainsthumanity,CriminalCodeofCanada,CriminalHarassments, CriminalNegligence,CSISAct,directenergyweapons,electronicharassments,genocide,hatecrime, humanrightrsviolations,Illegal,law,legislations,MentalFirewalls,MentalFirewallsByAllenBarker, organizedstalking,perpetrator,physicalassault,Privacy,PrivacyAct,sociopath,targetedindividuals, torture,utteringthreats,videotaping,voicetoskull,voyager radiationandhumanradiationexperimentsAllenBarkersResistingtheMindControlState RSSfeed

Twitter

ABOUTTISCANADA

Thisisasiteforactivism,advocacyandnetworkingforpeoplewhoaretargetedbyorganizedstalking and electronic harassment as well as people who supports the TI community and who believe these criminalactivitiesareaviolationofhumanrightslegislationsinCanadaandaroundtheglobe.

TI Targeted Individual is a person being targeted with OSEH by a group of individuals called "perps"forthepurposeofhumanexperimentations. *** OSEHOrganizedStalkingElectronicHarassmentaremethodsusebyperpsintargetingaspecific personforthepurposeofinducingharmandpossiblydeath. *** DEWDirectEnergyWeapon are device used for OSEH purposes, weapons can be microwave withpulpfrequencies,v2korotherelectronicandhearingdevices. *** V2K voice to skull device is a weapon use for transmitting voices with low or high frequencies. VoicescanbeforcommandsorharassmentsattacksthatmaylookliketheTI'sownvoice. V2K can alsousetoinduceormanipulatedreamsortodeprivedTIsleeps.

FAIRUSENOTICE
Thissitecontainscopyrightedmaterialstheuseofwhichhasnotalwaysbeenspecificallyauthorizedby thecopyrightowner.Wearemakingsuchmaterialavailableinoureffortstoadvanceunderstandingof criminal justice, political, human rights, economic, democracy, scientific, & social justice issues. We believe this is not an infringement of any such copyrighted materialsas in accordance to the the fair dealingclausesoftheCanadianCopyrightAct,thatallowuserstoengageincertainactivitiesrelatingto research,privatestudy,criticism,review,ornewsreporting.Wearemakinganexertedefforttomention thesourceofthematerial,alongwiththenameoftheauthor,performer,maker,orbroadcasterforthe dealing to be fair again in accordance with the allowable clause. For more info visit: Wikipedia: Fair DealingCanada

EVIDENCEOFOSEH

TwitterUpdates
McVeigh:TheManchurianCandidatebyDavidHoffmanhttp://t.co/g1whXdIB5hoursago TimothyMcVeighTheMilitiaMilitaryConnectionbyTodEnsignhttp://t.co/pR5dybi8 3daysago ReadingTheSilentMassacreonScribdhttp://t.co/mnhXCaCE#readcast3daysago ReadingCommunityNotificationsandGangStalkingonScribdhttp://t.co/XQgz0qol#readcast 3daysago

RecentPosts
McVeigh:TheManchurianCandidatebyDavidHoffman TimothyMcVeighTheMilitiaMilitaryConnectionbyTodEnsign RichardColvin VictimsStories19992005 Hacking&ComputerCrimeinGeneral

Archives
SelectMonth

links
Definitions HRC@FacebookGroup HRC@Scribd HRC@Soundcloud HRC@Vodpod HRC@YouTube HRCTISCanada@Facebook HRCTISCanada@Twitter OSEH@Vimeo StopBullying!Canada! TISCanada@Blogspot TISCanada@Livestream TISCanada@Podbean

TISCanada@Vimeo TISCanada@YouTube

EmailSubscription
Youarefollowingthisblog(manage).

BlogStats
109,333hits RSSPosts RSSComments

TopWordPress BlogatWordPress.com.Theme:INovebyNeoEase.