Targeted Individuals Part I


This is a two part series on how subcontractors hired from the Department of Defense are experimenting on 3500 or more civilians in the United States. You will have to wait for the technical discussion on the technologies employed along with a refutation of the medical communities refusal of accepting the claims of targeted individuals. The first part is to set the stage of mind control by providing a brief history. I have also included a chapter from Dr. Hall’s book titled Guinea Pigs. Dr. Hall is an anesthesiologist who is a targeted individual and has interviewed thousands of others. I will refine this post with more citations and information as time goes on.


All truth passes through three phases.
First it is ridiculed. Secondly, it is violently opposed.  Third, it is accepted as being self evident.
– Arthur Schopenhauer

A Silent Crime

A Silent Crime

Introduction

Freethoughtblog’s themes include science, atheism, equality, and human rights. This topic involves an abuse of human rights; it is about how individuals across the globe have become targets for electronic harassment. If that is not enough, the medical community destroys the reputation of TI’s (Targeted Individuals) by concluding that they have a mental illness. It is unconscionable how practitioners arrogantly jump to a medical conclusion without considering other causes. The practice of jumping to your favorite conclusion, which is what you were trained on, reminds me of the adage “If all you have is a hammer, everything looks like a nail.”

I have found two posts by a psychotherapist, Kim Whiting, who has read over 400 letters from victims and posted her conclusions here. What these TI’s all have in common is that that they have been harassed by similar tactics, especially one in particular, directed energy (no, this is not science fiction!). Whiting, however, has concluded that 80% of the TI’s have mental illnesses. It is not clear to her whether or not the 20% are being intentionally harmed. In any case, she admits that directed energy technology exists.

Unfortunately, psychotherapists are not explicitly trained in the realm of critical thinking. Even if the therapist is a clinical psychologist or had a focus in quantitative research within their program, this is a topic that is not formally touched upon [i]. Coursework will teach them how to differentiate between pathologies but not to distinguish between good and bad reasoning. If Whiting was a cognitive scientist or a philosophy major trained in logic, perhaps her conclusions would have been different. Unfortunately, this is not so.

The reported experiences of TI’s can be hypothesized to be caused by either a mental illness or being electronically harassed through the DoD’s mind control technologies. Of course they could be mistaken or liars, both unlikely.

My conclusion is that subcontractors hired by the department of defense have been experimenting on civilians with directed energy and remote neural monitoring. This governmental agency is experimenting on us to help determine how effective their technologies can manipulate and control the mind. These technologies were developed by universities and private industry decades ago and have now become weaponized. Cognitive warfare appears to be where the military industrial complex is headed. There is good reason to believe that the experiments are for the life-time of the individual to test for the chronic exposure to microwaves[]. Dr. Hall, a former targeted individual, has conducted over 1,000 interviews with people who all experience the same symptoms. Robert Duncan, a researcher who has worked on these technologies, has interviewed over 2,500 targeted individuals who also have the same symptoms []. A shared symptomatology that in many respects does not resemble a mental illness along with their similar testimony constitutes as strong evidence in favor of them being targeted individuals []. The fact that the DoD has a long history of experimenting with mind control tactics, drugs, and technologies makes this event more than plausible.


Probability and Conspiracies

I find it troubling that many call themselves skeptics and do so because they like the image. Moreover, skepticism does not mean to adapt obstinance when there are unusual claims. Unfortunately, we will be “unmoved” if we are not educated on a topic. When we do not posses the knowledge, then our intuition will make us believe that an event is implausible. And unless we have either experienced it ourselves or have the knowledge we will never be moved by the evidence. Furthermore, to be moved, we must possess the frames to do so. Frames allow us to make sense out of facts. We will build the necessary framework to interpret the facts here. Lastly, we cannot use motivated reasoning. This means that we start with a conclusion and then reason our way with only the facts that support our conclusion. We must look at all conclusions (i.e., causes) as well as account for all of the evidence!No, we cannot explain evidence away if it does not fit our conclusion. That is an indication that something has gone awry.

These are not the only errors that people commit. When we reason with probabilities, then we seem to rely on what we know, which is high school probability theory. This is when each event is equally probable to occur. Equally probable is not always a good model. We cannot simply divide 2500 interviewed people in US with symptoms with 300,000,000 total people in the US and say that we have a negligible chance of being targeted. These people were probably not selected at random which would bias the selection process to make any particular individual more likely to be chosen than some other individual. We need to be thinking Bayesian here, and Bayesian’s clash with frequentists. A Bayesian approach is arguably superior when dealing with these types of claims.

When people say that this is an improbable event, then they are thinking of the prior probability! We could use that ratio above as our prior probability despite it being unrealistic, but there is another probability in Bayesian terms. This is the likelihood! The prior probability is the model assigned before we see the data, while the likelihood is the probability assigned after seeing the data. The event becomes arguably very probable once we see it in terms of the evidence. The likelihood is how expected is the evidence if the hypothesis is true. In short, there are always two probabilities. Be weary if someone says that the probability is a simple ratio.

We are conditioned to believe that government conspiracies are, well, “conspiracies”. And we think conspiracies are for “crazy” people. Saying that something is a “conspiracy theory” works in the favor of the conspirators. And saying that something is a conspiracy theory out of misbelief is only discouraging institutional analysis. Homo sapiens are the most manipulative species on the planet bar none. Do not ever think for a second that people can’t harm, deceive, and manipulate others. When it is a concerted effort, then we call it a conspiracy. This does not mean we can’t give some the benefit of the doubt since people can also be trustworthy when their reputations are on the line. We are a complicated species with inner contradictions and many tensions.


End-Game of DoD

What are they up to? The answer is kind of disappointing. Everyone thinks their lives are the most important but that isn’t true to the war machine.  TIs are just a data point amongst 10s of thousands. The short answer is data collection of mind control, practice, improve the victory of all possible outcomes, plausible deniable assassinations, false flag terrorism, and to incite wars.

Targeted individuals are experiencing a form of experimentation that follows a progression of phases that include selection, surveillance, stalking, defamation, attack, and monitoring. These six phases may have some overlap; however, they are distinct enough to separate them into phases. The time spent on each phase may vary from individual to individual and is probably a reflection of the desires of the perpetrator of the experimentation.

Before we get into mind control and evidence, I will cut to the chase. Here is what Dr. Duncan has concluded what the DoD is doing. The above quote discusses objectives while below shows the protocol for the electronic harassment and mind control. Below shows the actual algorithm of the DoD. Remember that most of these programs are classified.

Confuse -> Terrorize, Torture, and Scare

  • Psychoanalysis of personality, Interrogation, Memory Retrieval
    • Program Tactics (dream manipulation, depattering, neural linguistic programming, and behavior modification)

Goals and Outcome -> Act Irrationally in public, get locked up in mental health hospital, create track record of mental illness

  • Assign targets to Tis who are programmed as assassins and terrorists
    • Tis will Kill specific targets OR kill themselves (dispose of target)

History of Mind Control

Goals of mind control by the DoD: get control of an individual to the point where he will do our bidding against his will and even against fundamental laws of nature. [3]

Let us establish that the DoD has a track record and interest in mind control as a weapon since 1950. This is taken from Renee Pitmann’s book titled “Remote Brain Targeting – Evolution of Mind Control in U.S.A.” who is not only a victim of experimentation but unintentionally contributed to mind control technology. In each one of these snippets below, research was inevitably conducted on the civilian population [3].

1950: As CIA’s Project BLUEBIRD expands, the CIA-contracted psychiatrists’ experimental purposes and activities include inducing amnesia, inserting hypnotic access codes in subjects’ minds, controlling behavior from remote transmitters with brain electrodes, administering LSD to children, and using electroshock to erase memories.

1951: CIA’s Project BLUEBIRD evolves into Project ARTICHOKE, with goals such as “get control of an individual to the point where he will do our bidding against his will and even against fundamental laws of nature.”

1953: CIA Director Allen Dulles authorizes a new expanded mind-control program, MK-ULTRA, brainchild of Richard Helms, a high-ranking member of CIA’s Clandestine Services.

1958: U.S. corporations, including Westinghouse, General Electric, and Bell Telephone have begun telepathy research.

1960’s: Neurophone – A device that converts sound to electrical impulses; allowing information to be transmitted to the brain by means of radio waves directed at any part of the body (skin). In other words, recorded or live messages, noise, music can be directed at an individual and, through the nerves, the signal will be carried (involuntarily) to the brain, bypassing the inner ear, the cochlea, and the 8th cranial nerve. In its original form electrodes were placed on the skin but with defense department developments, the signals can be delivered via satellite.

1961: The Defense Intelligence Agency (DIA) is created in the Department of Defense (DOD) by DOD Directive 5105.21, August 1, 1961. [NOTE: After the 1971-1972 creation of the CIA-initiated remote viewing program, its administration later gets transferred, at least in part, to DIA as one action of the remote viewing shell-game of secrecy that goes on for decades.]

1962: A book published in the Soviet Union, “Biological Radio Communication,” claims “experimental confirmation of the fact that communication between two people separated by long distances can be carried out through water, over air and across metal barrier by means of cerebral radiation in the course of thinking, and without conventional communication facilities.”[

1963: CIA’s Richard Helms attempts to defend CIA drug operations like Midnight Climax by telling CIA Inspector General John Earman that such testing has been necessary “to keep up with the Soviets.”

1965: Psychiatrist Jose Delgado gives a mind control demonstration in Spain with a bull: he presses a button on a radio transmitter and the bull brakes to a halt. He presses another button and the bull turns to the right and trots away, obeying commands being delivered through radio signals to brain regions in which fine wires had been planted the day before.

1965: working under the auspices of CIA’s MK-ULTRA, prepares a review article entitled “Extrasensory Perception.” It says ESP has been demonstrated, but is not understood or controllable.

1966: Harold “Hal” Puthoff from NSA and Ingo Swann from the UN enroll in Scientology, supposedly unknown to each other. Within five years they will be at the highest levels of Scientology and under secret contract with CIA to developremote viewing for military intelligence.

1971: In one of a series of long-distance remote viewing experiments at ASPR, OT VII Ingo Swann suggests calling the experiments “remote sensing” or “remote viewing.”[

1972: “The Soviet Union is well aware of the benefits and applications of parapsychology research. The term parapsychology denotes a multi-disciplinary field consisting of the sciences of bionics, biophysics, psychophysics, psychology, physiology and neuropsychology.

Robert Duncan’s Summary of Mind Control

Many of the discovered government mind control programs use trauma based conditioning.  Here is a short list of revealed programs.  Project Bluebird, initiated in 1949, was the first CIA behavior modification program.  Bluebird morphed into Project Artichoke to create programmed assassins and split personality spies.  Then the CIA added to the goals of the program into its most famous mind control program, MKultra, for espionage, counter-espionage, and clandestine manipulation of global politics. Thousands of pages were declassified on this program during the 70’s Church hearings.  These programs were followed by many others under new names and budgets such as MKdelta, MKsearch, Chatter, Spell Binder, MkNaomi, etc.  The current programs are classified but MKultra continues in new forms and under new names and budgets.  Another common program is a trauma induced form of mind control call Monarch programming. Project Stargate was a cover story of psychic spying however it used very advanced remote sensing and influencing technologies on human beings which has become global. The leaked newer programs follow Disney themes.


Targeted Individuals (Taken from Guinea Pigs by Dr. John Hall [2])

This is not to infer that the individuals suffering at the hands of current technological experimentation fit in the category of separatists. In most cases they do not appear to be separatists, radicals or anti-government. I am merely attempting to explain, from a governmental viewpoint, their plausible need to develop more sophisticated means of controlling the population. The governments from every industrialized nation no longer seek to merely govern their people. The emphasis has changed from governing populations to controlling populations with the United Nations helping pave the way through a myriad of programs.

The group, feeling the brunt of this slow conversion from representative to mental totalitarianism refers to themselves as target individuals or “T.I.s.” This rapidly growing group of individuals is the one voicing the complaints of exposure to electromagnetic technologies meant to alter cognition and physiology. While many of these accounts could’ve been written off as mental illness a decade ago the frequency and similarity of the complaints being vocalized currently point toward a much different etiology. The lack of legislation against nonconsensual experimentation, the willingness of the government to participate in nonconsensual experimentation and the known research and development of electromagnetic weapons validate these claims as probable covert experimentation. I have interviewed thousands of the people voicing these complaints both alone and through Freedom from Covert Surveillance and Harassment, an advocacy organization offering support to the victims. My descriptions of the experiences of these “targeted individuals” are based upon my interviews as well as statistical data provided by FFCHS through extensive surveys that they regularly conduct. Of note, FFCHS is not the only support group that has formed. Many other support groups have developed to handle the exponentially growing number of complaints that are being voiced.

After several thousand interviews and many hours of mulling over questionnaires filled out by victims, I have pieced together an explanation of their experiences. The reader has probably noticed that I do not refer to the victims with descriptive terms like “alleged” or “probable.” After completing this book the reader will be equally convinced that this is a real phenomenon that is destroying the lives of thousands of individuals and their families. Undoubtedly, many victims and non-victims alike will disagree with some of my findings and descriptions of this phenomenon. However, while some victims may have circumstances that differ slightly from my template, the overwhelming majority are experiencing a very methodical progression of experimentation that fits well into the template that I am hypothesizing. Targeted individuals are experiencing a form of experimentation that follows a progression of phases that include selection, surveillance, stalking, defamation, attack, and monitoring. These six phases may have some overlap; however, they are distinct enough to separate them into phases. The time spent on each phase may vary from individual to individual and is probably a reflection of the desires of the perpetrator of the experimentation. Again, the description is based upon a compilation of data and counter-intelligence gathered from surveillance of a perpetrator group identified in San Antonio, Texas. The group in Texas that was counter-surveilled has been independently identified by four unrelated victims from four different geographic areas of Texas.

Selection of a target may be for a myriad of reasons at the local level. One must remember this technology is not available to the average person. The groups perpetrating this type of experimentation are given access to the technology as covert, independent contractors of the government agencies responsible for its development. This research is a continuation of earlier behavioral control operations which were mostly done through front companies. The current experimentation is no different. The groups given access to the technology are allowed to choose victims for any reason they deem necessary. The agencies behind the technology are merely interested in collecting the data on its successes or failures. Therefore, as the data is collected at the top from each of the many perpetrator groups, the selection of victims probably appears random. The selection demographics look very different at the local level.

While a small number of victims have come forward with convincing evidence of direct harassment from various government agencies, these are mostly whistle-blowers employed by the same agencies and comprised the minority. Most victims are everyday people who would be considered “common” by most standards. Through interviews and questionnaires, we have found some trends among the victim population. A large percentage of the victims are female. Most of these female victims have reported drug facilitated rape and sexual assault. This is probably not a part of the experimentation as much as a representation of the criminal nature of the perpetrator group. Technology that allows for complete surveillance, stalking, and subliminal control makes sexual assault a very easy crime to accomplish. While rape has been used in the past as a part of mental programming through trauma, it appears that it is seen more as a “perk” among the current experimental perpetrators. Nonetheless, it is no less physically traumatic and psychologically damaging to the victim. One group of victims in Palm Springs, California does appear to be targeted sexually. This group of mostly gay men is being audibly harassed by the same female voice through the microwave auditory effect as well as being victimized through drug assisted sexual assault. Obviously this represents a psychological hatred on the part of the group perpetuating these crimes in that area. However, to summarize, the selection of targets for inclusion into this experimental protocol may be specific at the local level with some aspect of particular traits that are sought out by the perpetrators. At the agency level, where the data is ultimately compiled, each perpetrator group’s inclusion criteria probably average out to give the target population a random appearance.

Surveillance of the chosen target closely follows selection. The surveillance phase differs from the stalking phase in that during the surveillance phase the target is unaware that it is occurring. Once selected, the target is extensively surveilled through multiple means which include background checks, credit checks, mail tampering, email hacking and direct observation, both physically and electronically. Surveillance accomplishes several important goals that are integral to the success of the remainder of the operation. It allows the perpetrator to accurately determine the target’s daily living activities. Most importantly, where they live, work, bank and how they spend their leisure time are quickly assessed. The people they spend the majority of their time with are identified and scaled in order of importance. For instance, highly valued circumferential targets would include the target’s close family members, supervisors, physicians, clergy and anyone else that they may spend substantial time communicating with. This allows the perpetrators to know with reasonable certainty who the target will confide in once they are aware of their targeting. During this phase the target’s social status is ascertained with regard to their relationships with loved ones, neighbors, co-workers, supervisors, and others. Any participation in taboo behavior such as drug use, excessive alcohol intake, domestic violence, infidelity or pornography are especially noted and followed up on very closely. All the data collected during this phase will be used to control, mislead, defame, and isolate the target. Also, during this phase the perpetrators will often have neighbors, co-workers and relatives assisting them with the surveillance. This is usually accomplished by misleading those individuals into thinking they are assisting with a legitimate law enforcement investigation. In one instance the private investigative agency perpetuating the surveillance identified themselves to a target’s neighbor as FBI agents, complete with fraudulent identification badges. One would be very surprised at the number of people who fall for this ploy without even asking for appropriate identification or contacting the alleged agency to inquire if the surveillance is legitimate. Ignorance of the laws, both nationally and at the state level, regarding surveillance and right to privacy, make this a very effective ploy. The successful application of this technique by the perpetrators will later legitimize the defamation phase and protect them from possible arrest during the stalking phase. With the neighbors believing that they are assisting with an investigation by a legitimate agency, they are more apt to believe the defamatory remarks they are told about the target. Moreover, they are less likely to call the police and report the vehicles they see parked in front of the target’s home throughout the night.

Stalking of the target is a natural extension of the surveillance phase. These phases differ in that the surveillance phase is usually unknown to the target while the stalking phase is done with full awareness of the target. In current literature, the stalking phase of this type of victimization is usually described as gang stalking, organized stalking, or cause-stalking. Gang stalking and cause-stalking are inaccurate descriptions in that they imply either street gang involvement or some grandiose reasoning behind the stalking. Organized stalking is probably the most accurate description, reflecting the highly organized and methodically planned out form of stalking that these victims experience. The methods involved are directly adapted from the COINTELPRO operations ran by the FBI in the 1950’s and 1960’s against groups seen as radical elements. The tactics include total inundation of the target at home and wherever they may go, breaking and entering of their domicile and physical harassment and intimidation. Electronic harassment is used during this phase with regard to email tampering, computer hacking, cell phone spoofing and cyber-bullying. More exotic forms of electronic harassment are covered as part of the attack phase but may be present in any phase of this type of victimization. The stalking phase serves several important functions for the group perpetuating the operation to insure that the target is totally enveloped in the operation with minimal chance of escape. It places the victim in a victim-mind state of hopelessness, especially once the victim has been ignored by police agencies through which the victim has sought help. Stalking is very difficult for police agencies to prosecute under normal circumstances. Police assistance in cases of organized stalking where the victim’s everyday actions have been studied through surveillance for months or years is nearly futile. In addition, the stalkers are highly trained, often with federal or local law enforcement backgrounds themselves, in pushing the envelope just short of giving the police a reason to investigate. The hopelessness that ensues from the feeling that all backs have been turned from believing or assisting the victim is integral to the success of the operation. After repeated police complaints of break-ins where nothing is stolen and personal belongings have been rifled through, the victim is labeled mentally unsound and further police complaints are ignored. Only felony burglary will be investigated by law enforcement agencies. Criminal trespassing will only result in a report that is filed away without an investigation. At worst, multiple complaints of stalking and criminal trespassing will result in a psychiatric referral or mandatory twenty-four hour psychiatric evaluation. The inability of the victim to get appropriate law enforcement assistance helps instill the belief that law enforcement is complicit in their victimization and limits them from further complaints. Once this level of hopelessness is achieved, the perpetrators feel confident in escalating their stalking to more frequent breaking and entering as well as physical and sexual assault with less risk of arrest. The victim mind state often causes the target to go into an extreme state of reclusion which furthers their chance of a psychiatric diagnosis once a psychiatric exam is requested or mandated. This part of the operation has been brilliantly designed with assistance from psychiatric professionals and is a scenario that continues to play out to perfection in almost every case.

The stalking phase serves another purpose. The victim must be located through GPS in order for the constellation of other modalities to be used on them. This can be accomplished in several different ways. Stalking may be a way of performing constant 24/7 GPS location through GPS enabled devices in the hands of the stalkers. This obviates the need for tracking chips in the victim and explains why the stalking phase almost always comes to an abrupt end with only the electronic harassment remaining. At one time chipping the target, much like GPS chipping of animals to study migratory patterns, was probably the more common scenario. However, this exposes the perpetrator group to the possibility of arrest for physical assault if caught and provides evidence of assault to the victim if the chip is found. A less risky alternative to stalking the victim close enough to remotely GPS them until their EEG can be catalogued and used through remote neural monitoring for the remainder of the operation. Our research has reinforced this fact. We have frequency scanned thousands of victims for covertly placed micro-chips with very few found on x-ray or MRI. To add to the confusion, part of the operation is apparently to convince the target that they have been chipped. This causes them to exhaust their finances looking for an embedded device that doesn’t exist with such fervor that it contributes to their psychiatric diagnosis. Essentially, while chipping was once integral to the operation, it is now part of the psychological victimization. However, because many people have been complaining of this targeting for a decade or more, scanning for a tracking chip should probably be part of their work-up. Most recently, Bob Boyce, an inventor from Georgia, was allegedly chipped by an agent involved with the NSA. His chip was found on x-ray and removed by a surgeon. It was a Verichip brand chip that was covertly placed in the tissue of his lateral shoulder where it underwent malignant changes. This case is still in litigation. For the record, in an email correspondence with the makers of Verichip, they assured me that they do not condone covert chipping with their product nor will it function as a GPS tracking chip. The serial number on Boyce’s chip allegedly was traced back to a lot of chips sold to the United States government. I will allow the reader to make their own decision regarding the sincerity and the reply I received from Verichip. Nonetheless, the fact that we are not routinely finding chips in the multitude of victims and the targeting continues in those with chips removed tells me that it’s being done through other means with chipping or stalking being used strictly as a method of location. Dr. Robert Duncan, in Soul Catcher: Secrets of Cybernetic Warfare Revealed puts forth this same assumption.

The stalking phase takes place hand-in-hand with the defamation phase. Inevitably, the stalkers are occasionally caught and questioned by neighbors, onlookers, or possibly local law enforcement officials. The excuse most often given to those who question the stalking is that the target is under official investigation for a drug, sex, or criminal crime. Since most of this type of stalking is usually done by private investigative groups, they often have former officers on their payroll or close enough relationships with local municipalities that the police question them no further. Neighbors that have noticed the 24/7 stalking are usually receptive of the drug or sex crime excuse for the simple reason that only a legitimate agency would spend the money necessary to surveil someone “really dangerous” for twenty four hours per day. The PI groups in San Antonio, Texas would present themselves as FBI agents since their company’s owner is former FBI. Neighbors or others who notice the organized stalking will almost always believe this excuse. The defamation eventually leads the target to extreme measures to deny the allegations made against them which in turn make them look that much guiltier. The defamation is much worse for licensed professionals such as doctors, lawyers, teachers, nurses or any state licensed professional. The “drug addiction” scenario is most often used in these cases where the mere mention of a drug problem will usually mandate that they undergo drug screening. Illicit drugs are usually placed in the victim’s food or drinks that they are known to consume frequently through months of surveillance. Once their appropriate licensing agency is notified of their possible drug problem, the stalkers ensure that they will test positively for the drug that they are accused of abusing. This scenario works with near 100% effectiveness in destroying the career of the victim. The ultimate goal of the stalking and defamation phase is to get the target diagnosed as mentally ill or drug addicted to ensure job loss where they will be more apt to remain home where the rest of the operation can be accomplished. Incidentally, the stalking and defamation phases are also the two easiest points in this operation to intervene successfully and bring it to a halt. Unfortunately, most victims, out of fear or suspicion that they are being targeted by a legitimate investigative agency, do not pursue this. Moreover, until recently most states have had very weak anti-stalking laws that are not easily enforced. Texas has taken the lead in 2011 with a bill written by state legislator Jane Nelson and Judith Zaffirini that was passed into law. The bill was written after a young woman who complained of stalking to the Bexar County Sheriff’s Department was written off as mentally ill. Her stalker had held her at gunpoint while forcing her to slit her own wrists and write a suicide letter. She survived but was largely ignored by the appropriate agencies she entrusted to help her. Several months later her stalker followed her to work and murdered her in the parking lot. According to the new law, a restraining order can be issued now against an alleged stalker without first proving bodily injury by that person or persons. Furthermore, the definition of stalking has been changed to make the charge much easier to put forth. Unfortunately, this charge did not come in time for Kristi Appleby for whom the law was changed. An organized effort should be undertaken to force every state to follow suit in altering their stalking rules. This will make defending against organized stalking much easier. Currently, the perpetrators of this type of stalking take full advantage of the lack of legislation against it.

While it appears that I am solely placing blame on independent private investigative agencies for the stalking, I am not excluding participation by corrupt individuals that are active duty law enforcement at federal and local levels. This does occur, as I will illustrate. One must remember that the technology being used to commit these crimes originates at the federal government level. Hence, it is seen being used most often by private investigative agencies that are owned and operated by former FBI agents. These individuals maintain contacts with the agency who work with them in a reciprocal relationship. These relationships are imperative to the defamation phase. The majority of the public, dumbed down by years in the American public school system, will believe the defamatory lies told about a target by the private investigators. However, the more educated members of society, who see private investigators as nothing more than licensed criminals, will question the legitimacy of what they are being told about a family member, friend, or co-worker. An active duty police officer or FBI agent spreading this same misinformation is seen as much more credible by the people being subjected to it. My own experience with defamation serves as a good example of active duty FBI employees taking part in this phase. A close friend of mine received a call on her cell phone from someone claiming to be an FBI agent, asking her to come in for questioning. The term, “asking”, I am using loosely. She was actually told that she would be formally requested to come in and if she did not come in voluntarily. Fearful from the threat, she reported as instructed to the FBI office in San Antonio, Texas. After going through their metal detectors and having a copy of her driver’s license made, she was greeted by an FBI agent. Special Agent J.A. questioned her extensively about my first book. A New Breed: Satellite Terrorism in America. Of course, he downplayed the existence of the technology mentioned in the book. In finishing the interview, he told her not to believe anything I talk about, that I was a “piece of shit” and she would do well to stop communicating with me. He added that I was not under any type of official investigation, inadvertently admitting that this was strictly harassment. This occurrence is my first experience with active duty FBI personnel taking part in the defamation phase. I assume that this is probably going on in other cases as well. As of the writing of this book I have yet to be questioned by this agent directly. One would surmise that questioning the author of the book would serve them better than harassing the author’s friends who have only read the book. Again, the fact that they have not directly questioned me leads me to believe that their goal was purely harassment, defamation and an attempt to prevent this book from being released.

The best defense against defamation is to know your neighbors well and live a good life. Despite the stalking and attacks, one should do their best to function normally. Continue to work, attend church, children’s activities or whatever social activities you would ordinarily be expected to attend. Reclusive behavior will lead people to believe the lies being told about you. Moreover, stick to victim’s forums or organizations that handle victims of this type of crime to vent frustrations or talk about your experiences. Repeated attempts to convince nonbelievers of what you are going through will further align their belief with the doubts about your sanity that they’re being told. Moreover, if you are using illicit drugs, STOP! Illicit drug use can and will be used against you, not only to defame you but the entire crime will be blamed on drug induced psychosis. The government has specifically targeted drug abusers for mind control experimentation ever since the early MKULTRA subprojects, solely for the reason that they are easily discredited. In conclusion, visibility in your community and normal societal interactions are key in defeating the defamation phase. This is a lesson learned from the perpetrators themselves. The perpetrator groups in the San Antonio area have ingrained themselves so well in their community as good Methodist, wholesome people, that I wager no one that knows them would suspect or believe the atrocities they have committed. Victims must do the same. Living your life as a recluse, placing foil in the windows and constantly talking about this issue to people who are uniformed will worsen your plight.

The attack phase is characterized by directed-energy attacks meant to disrupt normal physiologic functioning. It may occur at any time during a victim’s targeting but is most noticeable as a distinct phase late in the targeting. Early attacks, prior to the victim’s awareness of stalking or defamation, may be perceived as ordinary physiological medical issues. Often the victim has multiple physician visits with complaints of muscle twitching, headaches, heart palpitations, skin burning and other more obscure complaints with nothing medically abnormal found. Later in their targeting the attacks are accompanied with voice to skull transmissions that make it very obvious to the victim that their ailments are not the result of medical pathology. Once the perpetrators are certain the victim is hearing their transmissions and have noticed the stalking, the attacks will escalate. During the attack phase, the victim can expect to be assailed almost twenty-four hours per day. If the victim is lucky enough to still be employed by the time this phase begins, attacks will be used as their key weapons to sleep deprive the victim. Often, the attacks will subside just long enough for the victim to fall asleep with hopes that they will sleep through their alarm and be tardy or absent to work. Remember, the goal of this phase is complete annihilation of the victim’s personal and professional life. This phase will continue until these goals are met or the perpetrator group is diverted or hired to target someone else. Manpower constraints within the perpetrator group will often result in abrupt cessation of attack as they focus their attention on another target that they’ve been directed or paid to attack. However, the victim will still usually have the infrequent attacks as a reminder that they are still being watched and are not entirely free from the program.

According to Dr. Robert Duncan PhD, in his book “Soul Catcher: secrets of cybernetic warfare revealed, the attacks are the result of central nervous system manipulation. In effect, the brain is being manipulated to manifest the physical symptoms of twitching, burning, spasms and other symptoms.” While this may be true, almost all of the victims also report electrical disturbances within their homes. It is my belief that some of the attacks are secondary to directed energy attacks at specifically targeted peripheral nerves, muscles and organs and not strictly through the central nervous centers controlling them. In effect, the same directed energy modalities being used to open and close garage doors, turn lights on and off and disrupt computer screens in the victim’s home may also be used to physically attack the victim at targeted sites other than the brain. This may explain why neuro programming to alter the EEG in most victims does stop some, but not all, of the attacks. It would stand to reason that with the myriad of weapons within the electromagnetic spectrum at their disposal, the mode of attack would be variable in nature and not dependent solely upon central nervous system manipulation.

The weapons used in the attack phase include microwave, millimeter wave, radio-frequency, laser and probably scalar modalities. All of these modalities have been researched extensively and weaponized for military use as mentioned earlier in the book. While they have all been identified under the heading of “non-lethal” weapons, non-lethality in the research setting was not based on 24/7 exposure. Moreover, the exact effect of their exposure long term on the human body is not known, at least not in official research. The victims of the current experimentation may be the guinea pigs of some type of long term exposure protocol that is too unethical to be done under a legitimate Institutional Review Board with consenting volunteers.

The attack phase is followed by the monitoring phase. Having worked with multiple victims that have been victimized for varying lengths of time, it is clear that the victims have been chosen for experimentation for the duration of their lifetime. Dr. Duncan and I are in agreement that the targeting is done for the life of the individual. However, once the goals of the perpetrators have been met, namely, social, personal and occupational destruction, the attack phase often lessens. As mentioned earlier, this victim will experience the occasional attack as a reminder to them that they are still being watched. Apparently, one of the rules of this experimental protocol is that once a victim is chosen, he or she must be monitored until their natural death occurs. Many victims are drawn to suicide by their respective perpetrators. This may be an attempt by the perpetrator groups to prematurely end the monitoring phase of one particular victim so manpower can be focused on other victims. The psychological resilience of the victim to the stress of the experimentation obviously plays a factor as well. From a medical perspective, the monitoring phase is probably to denote any immune problems, cancers, psychiatric problems or diseases that may result from the long term exposure to the electromagnetic weapons used in the experimentation. These issues will need to be elucidated before those modalities are released on the population as a whole for psycho-social control. In 1971 Dr. Jose Delgado, and MKULTRA researcher, published “Physical Control of the Mind: Toward a Psychocivilized Society.” His research required implanting the brain with a micro-chip to acquire the desired results. The development of directed energy has allowed for more efficient delivery with even better results without the need for brain implantation.


Credibility and Background

I must mention a trend I see in those who have already made up their mind. Time and time again individuals will target the credibility and background of the researchers. I realize that having advanced degrees is correlated with motivation and intelligence, but no advanced degrees are required to understand how something works. It takes interest and motivation to understand these types of mechanisms with a descent background in computers, physics, chemistry, and biology. As far as having someone qualified enough to assess whether or not these technologies are possible realities, it takes a person within that specific industry to come forward. Every individual that is listed as a source has either been a targeted individual, has a medical degree, or is intimate and passionate about the technology and some even involved in the industry of mind control weaponry. Ability and backgrounds are non issues.

What about liars or those with ulterior motives? Every now and then we can find an outright liar who has motives to advance their image at any cost, even the truthfulness of their content or background may be suspect. But this is rare. Most people, especially those who spend their life in an industry or academia, value and guard their reputation. Every source that I have used has been personally affected by their experiences with this technology. At worst, a researcher may frame their educational background in a self-serving way which may mislead us. This does not mean that they are liars always and everywhere, but instead may indicate the outside pressure to meet the harsh opinions of others. Each source that I have picked strikes me as genuinely concerned about the use of mind control weaponry such that we should give them the benefit of the doubt.


Notes

More about Renee Pittman

My work at the time was involved with an AI database for paranormal references (Project Parafile). A second paper was also presented at the Omniversal Symposium, California State College at Sonoma, (September 29, 1973). This was titled “Embryonic Holography,” and was an application of “The Holographic Concept of Reality” model. It dealt with biogenesis and neurological regeneration, and included speculation on the origins of cancer, faith healing, psychic surgery and more technical aspects of mind-body energetics. One week after the delivery of that paper, four men came into my place of business, two in suits and two in full Army dress. The two suits held me under close arrest, while the two Army personnel went through my files, pulling anything related to “Embryonic Holography.” The paper was rewritten from old notes and memory, but it was not the same. What got this paper classified “top secret” for almost 20 years was that it was critical for the use of Allan Frey’s study, and its possible application to mind control. I never was able to draw what was so important in that initial paper until I began researching this paper, more than 24 years later. I will discuss those aspects further into this document.

 


References

[1] Duncan, Dr. Robert . How to Tame a Demon: A short practical guide to organized intimidation stalking, electronic torture, and mind control . CreateSpace Independent Publishing. Kindle Edition.

[2] Hall, Dr. John. Guinea Pigs: Technologies of Control

[3] Pittman, Renee. Remote Brain Targeting: Evolution of Mind Control in USA – A Compilation of Historical Information Derived from Various Sources (Mind Control Technology Book Series 1)

Comments

  1. flex says

    Okay, this essay was pretty big on conspiracy but small in the way of evidence. I presume we’ll get more of that in the next post. But a few comments.

    First, that the US Government has funded research into mind control for decades is not news. The assumption here is that they succeeded. There is no evidence presented which showed that. What was presented was a claim that various private companies have been using technology developed by the US government to perfect this control. What is incredible is that idea that none of these private companies have leaked this information. Further, the purpose of these trials is unclear. The claim is that these trials are to perfect the technology which has already been developed, but in order to do so they need to get the targeted individuals to self-isolate? Why? The goal is apparently “… complete annihilation of the victim’s personal and professional life.” Why? Even accepting the idea that a government may treat it’s citizens as Guinea pigs, there isn’t much point in developing a tool to drive a person insane over a period of months/years.

    But let’s move on to another claim. Paragraph eight from the section Targeted Individuals.

    There is a lot to unpack here. Just for the record, there are several types of devices which can be implanted. But we’ll look at GPS trackers and RFID chips. GPS tracking chips are battery powered and emit pings at intervals to allow researchers to locate things like birds as they migrate. The battery on these lasts only a few months and the signal is so weak that they usually won’t work if the subject is indoors. They do sell these for dog collars, I’ve looked into them, but they are not always effective as a cloudy day can be enough to confuse or block the signal. A different technology is the RFID chip which is entirely passive, it is powered by the transmitter which is used to locate it. The transmitter sends a signal and the chip collects the energy from that signal and responds. The further away the transmitter the more powerful it needs to be in order for the chip to collect enough power to respond. They are typically good for 2-10 meters, but sometimes the range can be extended. These are the types of chips implanted in pets, and the reader is usually held close to the skin of the pet in order to get a response from the chip. Flesh can attenuate the signal and reduce the range of the RFID chip. Keep in mind that these are different designs, to confound the two is like confounding a fork with chopsticks.

    And yet the author appears to do so in several places. Verichip makes RFID devices, but it is implied that this is used to find the target’s GPS location. The fact that a lawsuit is pending, and that the government purchased these RFID chips is an insinuation without any connection to the claim that the chip was implanted by an NSA agent, which also lacks any evidence. I am not surprised that the government might purchase RFID chips to use in their laboratories and warehouses. Simply the fact that the government purchased RFID chips is not any evidence that they were used for mind control experiments.

    Then there is this tidbit, A less risky alternative to stalking the victim close enough to remotely GPS them until their EEG can be catalogued and used through remote neural monitoring for the remainder of the operation. What does that even mean? “Remotely GPS”? The implication is that the stalker gets close enough to the target in order to identify them. Okay, then what does GPS have to do with it? Or is there a certain distance the stalker can be at in order to identify the target? If the target is within 30 meters then they can read EEG (not really possible, but okay)? Again, why is GPS invoked?

    I think the sentence is trying to say is that the stalkers can read the target’s EEG from a distance and once that EEG has been cataloged the target can be tracked by their EEG as if it was a GPS signal. I don’t think that’s possible, but if that is what they mean they shouldn’t confuse the issue with jargon like “Remote GPS”.

    Next,

    Our research has reinforced this fact. We have frequency scanned thousands of victims for covertly placed micro-chips with very few found on x-ray or MRI. To add to the confusion, part of the operation is apparently to convince the target that they have been chipped.

    Well, this gives a bit of it away. So people are convinced that they have been “chipped” before they come and see the authors. The authors examined these people with x-rays, MRI, or “frequency scanned”, and “very few” chips are found. How many is “very few”? One? Five? Moving on. Next, apparently part of the mind control operation is to convince people they have been chipped. Are the stalkers doing this for the fun of it? Because if the intent is to use this technology to control minds, telling people that they have implanted a chip in them before using the tech to cause them to self-isolate seems like a bad idea. To test the technology, it would seem to be best to NOT confound the test by telling the subjects that their body has been implanted with a chip. But what do I know, I’m not an evil government scientist conducting covert mind-control experiments on unwilling subjects.

    However, this allow the author to claim that negative evidence, i.e. evidence looked for but not found, is turned into positive evidence by saying that since the author knows the government is doing this to people, they must have a way to do this without using any chips. If a chip is found that’s proof that the government is targeting the person, if a chip is not found that’s also proof that the government is targeting people. They win whether the coin toss shows head or tails.

    I don’t know if the last paragraph was a continuation of the book excerpt, or written by the blog author. In either case, the reason why credibility and background of the people making claims is important is because it does provide an indicator of expertise in a field and the credibility of the claim. When Linus Pauling promoted the idea that vitamin C prevents colds it was taken seriously, until it was tested and proved to be untrue. When Uri Geller claimed he could turn pages in a telephone book with his mind, Johnny Carson, who knew some basic magic tricks, easily debunked it. We know that Pauling was a sincere quack, he wasn’t trying to fool anyone but he had fooled himself. Geller knew some magic tricks and presented himself as a psychic, he was a deliberate fraud. The background of the person making a claim, especially an extraordinary claim, does matter. The fact that it appears that Robert Duncan didn’t get all the degrees he has previously claimed for himself does matter, it means he is willing to lie to inflate his self-image.

    As for the statement that the sources selected are genuinely concerned about the use of mind control weaponry, I don’t doubt it. I remember people being genuinely concerned that because there was a leak of radioactive gas at the Three-Mile-Island nuclear reactor that it really meant that the reactor core was sinking into the earth. Being genuinely concerned about a topic doesn’t make that person an expert, or correct.

    With all due respect, the claim in this post is rather weak tea. The claim is that there are groups in the USA who are targeting semi-randomly USA residents using various EM (or sonic) tools to first self-isolate, then communicate with them, then control them. (Or is the claim to use EM tools to cause people to self-isolate, then self-destruct with the goal being the “… complete annihilation of the victim’s personal and professional life.”) The evidence provided for this claim is that law enforcement doesn’t believe people who report it, that physical examinations do not find any embedded chips even though the people suffering this torment believe those chips are there, and that the government has funded programs (and probably still does) to investigate the possibility of mind control.

    You have indicated that the next post is going to discuss ways and means. I am looking forward to it. I’m an electrical engineer with over 30 years of experience in automotive electronics, I worked for six years in electromagnetic compatibility testing and four years on radio frequency devices. I do not call myself an expert in these areas, but I know enough to follow pretty much any causal path.

    And to be clear, my comments, and skepticism, are not directed at you. I am willing to be convinced that something is going on, and I’m certain you will provide the best arguments you can to show that something is. I’m not looking to “win” an argument, but I will try to be respectfully clear where I think evidence is lacking.

    • musing says

      I appreciate the comment. My background is similar to yours. As far as evidence, there is not much direct evidence. These things are classified. We will have to rely on those who have worked on the technologies and in the industry as well as the shared symptomatology of the victims. These symptoms cannot be explained away, and once viewed as a cluster of symptoms that show up only during attacks, it is highly unlikely that they are manifestations of a mental illness, especially not from thousands of people.

  2. says

    Unfortunately, psychotherapists are not explicitly trained in the realm of critical thinking. Even if the therapist is a clinical psychologist or had a focus in quantitative research within their program, this is a topic that is not formally touched upon [i]. Coursework will teach them how to differentiate between pathologies but not to distinguish between good and bad reasoning.

    I have no experience with how psychotherapists are trained (I majored in international relations); but I consider this claim quite suspicious as well as kind of vague. I find it kinda hard to believe a trainee would get absolutely no class in “critical thinking” either in undergrad or graduate school. Such a class wouldn’t necessarily be taught by the medical or psychology school, but it would be available (and likely required) from some other department, like math or statistics. Diagnosing a patient, and dealing with patients’ own claims and conclusions, does in fact require some degree of critical thinking.

    The reported experiences of TI’s can be hypothesized to be caused by either a mental illness or being electronically harassed through the DoD’s mind control technologies.

    Actually, those dealing with such reports have also offered a few other possible causes, such as disease, exposure to toxins, unusual stress, or combinations of those and others. Not sure if those other explanations are satisfactory, but they have been offered. Whoever is saying only two options are being considered, is not someone who knows what they’re talking about.

    Also, here’s another possibility: directed-energy weapons can cause brain damage in their targets, and brain damage is known to manifest in symptoms such as paranoid delusions and voices in the head. So it’s very likely that people who have been hit by directed-energy weapons will report voices in their heads and fears of being stalked and controlled by some vast conspiracy, despite there being no actual “mind-control” involved.

    A shared symptomatology that in many respects does not resemble a mental illness along with their similar testimony constitutes as strong evidence in favor of them being targeted individuals. The fact that the DoD has a long history of experimenting with mind control tactics, drugs, and technologies makes this event more than plausible.

    That depends entirely on what kind of “mind control tactics, drugs, and technologies” we’re talking about in this long history. If they didn’t involve directed-energy technologies like what we’re talking about in the present, then no, that past history does not really support any present-day claims to that effect.

    Many of the discovered government mind control programs use trauma based conditioning…

    Yes, but does any of that involve directed-energy? When we’re talking about one (alleged) form of mind-control, diverting our attention to a totally different form of mind-control doesn’t help.

    We are conditioned to believe that government conspiracies are, well, “conspiracies”. And we think conspiracies are for “crazy” people.

    Please stop belittling other people’s thinking as “conditioning.” We’re not “conditioned” to think conspiracy theories are irrational; we CONCLUDE this because we’ve seen so many conspiracy theories that REALLY CLEARLY ARE irrational, from the “Jewish conspiracy” to JFK to the flat-earth coverup to “Big Pharma” suppressing all manner of allegedly life-saving snake-oil remedies to the Queen’s anti-American drug cartel to the “stollen election” of 2020, and many many more. If you want anyone to take your particular claims seriously, don’t start by pre-emptively calling us “sheeple.”

    1960’s: Neurophone – A device that converts sound to electrical impulses; allowing information to be transmitted to the brain by means of radio waves directed at any part of the body (skin). In other words, recorded or live messages, noise, music can be directed at an individual and, through the nerves, the signal will be carried (involuntarily) to the brain…

    Yes, there’s plenty of devices that convert sound to electrical impulses and vice-versa (telephones, radios, TVs, etc.); but none of these things “allow information to be transmitted to the brain” via the skin. Sensory nerves in the skin do NOT transmit signals to the part of the brain that receives, processes and understands sounds; so whatever signals they do transmit to the brain won’t be processed as sound, words, music, or anything else of the sort. (And even if that were so, wouldn’t it at least make some sort of difference which part of the skin got hit? Would beaming a signal at your ass have the same effect as beaming it at your elbow or your scrotum?)

    1962: A book published in the Soviet Union, “Biological Radio Communication,” claims “experimental confirmation of the fact that communication between two people separated by long distances can be carried out through water, over air and across metal barrier by means of cerebral radiation in the course of thinking, and without conventional communication facilities.”

    That was 62 years ago. Sixty-two years to hone and refine such new powers and tailor them to specific military and civilian applications. So has anyone reported any evidence of Russian army commanders using such superpowers in Ukraine? Of course not — all that stuff about Soviet advances in psychic-power development was debunked (IIRC) in the 1990s: it was all a make-work project for Red Army or Spetznaz units to keep from being sent to Korea, Vietnam or Afghanistan. And it never delivered any real results.

    “Havana syndrome” is real, and the suffering and early death it has caused are real and need to be acknowledged and dealt with, honestly and competently. This sort of endless wall-o-text rambling incoherent rehashing of very old paranoid conspiracy theories about MK-ULTRA and “CIA mind-control experiments” from the early 1950s really aren’t helpful here, and are, IMO at least, a gross disservice to the real people affected. They don’t deserve to have their issues muddled and obfuscated in a fog of old paranoid conspiracy allegations — especially when all those claims lead to the conclusion that there’s a conspiracy too pervasive and powerful to fight.

    If there’s any sort of microwaves being beamed at anyone’s brains, it’s a WEAPON. Plain and simple. There’s no “monitoring” or “mind-control” going on here — just a weapon causing damage. Let’s all try to stay focused for the victims’ sake, shall we?

    • musing says

      I don’t agree with what your analysis. Directed energy shows up as a probable cause from people labeled with the Havana Syndrome. As far as remote neural monitoring, v2k, and neural telepathy, these are classified. The only evidence that we have is indirect. We have to refer to some of the experts that have come forward who have worked on the technology. I will explain the technology to the best of my ability in the next post. But I am afraid your standard for evidence may be too high for me to satisfy. I only provide an indirect abductive argument. Please be sure to read it. Thanks for comment.

      Edit: it’s probably not critical thinking skills per se when discussing practitioners. It’s the strong confirmation bias that highlights the evidence “hearing voices” and “people are stalking me”. We all have been conditioned to believe these things are mental illnesses. But these technologies can mimic mental illness, perhaps intentionally to obscure the experimentation. Moreover must of the people interviewed live in apartments alone and a disproportionate number of them are drug addicts. These people were handpicked to conflate psychosis with their complaints.

      • says

        If all that stuff is “classified,” then how can we say we have enough evidence to confidently conclude it’s at all real? You can’t confidently assert that something is happening, but then say “it’s classified” when questions arise as to the plausibility of the claims. Extraordinary claims require extraordinary evidence, and so far I don’t even see any evidence that any of this “directed-energy-mind-control” stuff is even possible, let alone feasible or actually happening. Specific experiments and their documented results may be classified, but the known science behind it all is not. And if any of those experiments were actually successful, why haven’t we seen any results on any battlefield or civilian endeavor?

        Seriously, I’ve been reading about all those DoD and CIA experiments for many years now, and it never reads as anything but a sad bad joke and a litany of laughable pathetic failures. Those technocrats were really good at inventing machines, but they totally sucked at messing about with organic human brains — because organic brains don’t work like machines.

        • musing says

          We have experts testimony that have been involved in the R&D phases of its production. That doesn’t even matter because the best evidence is the shared symptomatology of the victims. The effects of microwave and ULFRF used as directed energy are well documented. If you view the complaints as a cluster of symptoms that only occur during an attack, this counts as very strong evidence in favor of a directed energy weapon. Physicists posit an unknown source all the time when studying unknown phenomena. This is what makes it a strong adductive argument. The victims have independently verified their symptoms prior to any worry of them being influenced by others on the internet through personal interviews by a qualified medical professional (3000+). It would be very improbable that these specific symptoms where a lot of them include physical burns would be manifestations of a mental illness, especially due to the sheer number of complaints. The stories all follow scripts created by a few agencies within the DoD. These people are all scared of the same thing, and I believe they are more than genuine. If you have been reading my posts, I only care about truth and knowledge. I wouldn’t waste your time. Mark my word that this is happening even remote neural monitoring, v2k, and neural telepathy and much more. I know because someone very close to me is a victim. I will have very intimate testimony for you to read on their tactics. The DoD is not to be trusted. Believe what you read in my references. It’s a nightmare for the victims, many having committed suicide because of the realization that the studies go for the life of the individual to test for chronic exposure of microwaves. Your privacy and due process of law may be in jeopardy one day. I have believed no conspiracies ever except this one because of the haunting experience of someone close to me. This story must be told.

          Edit: see my reply to your other comment that I edited too

      • says

        It’s the strong confirmation bias that highlights the evidence “hearing voices” and “people are stalking me”. We all have been conditioned to believe these things are mental illnesses.

        Again, that’s not “conditioning,” that’s longstanding knowledge that hearing voices and paranoid delusions are indeed indicative of mental illness, and have been since long before humans discovered microwave anything.

        But these technologies can mimic mental illness, perhaps intentionally to obscure the experimentation.

        First, I’m inclined to think directed-energy weapons CAUSE mental illness by damaging the brain, not “mimic” it. And second, why the AF would the conspirators “mimic mental illness…to obscure the experimentation?” Obscuring the experimentation makes the experiment pointless. That doesn’t make sense even from a mad-totalitarian-government-scientist point of view. It sounds like the mad government scientists are “experimenting” with something they (allegedly at least) already know how to use with perfect foresight.

        And this whole elaborate scenario of systematically breaking down and destroying their test-subjects’ lives seems like a needlessly elaborate and laborious way of doing these experiments. Why not just zap a chosen subject with the directed-energy weapon and then watch their every move like they would a suspected enemy spy? If he complains to his boss or his friends or goes to a doctor, those conversations could be monitored the usual ways, plus maybe a late-night break-in to see the doctor’s notes. There’s really no need for any sort of multi-phase stalking or harassment campaign, or “constellation of modalities,” especially since (so far at least) doctors wouldn’t be able to conclusively identify the cause of the reported symptoms.

        • musing says

          Raging Bee, Re Conditioning and Confirmation Bias: You fail to see my point. Let me try to explain it better. Regardless of whether or not there is good reason to believe that voices being heard stem from mental illness, it is still a confirmation bias. This is how the brain works. The brain will start with a belief, which is that voices mean illness, and then once it observes the evidence, it will confirm it. We do not want that to happen here! We need someone to look at alternate causes or hypotheses with an open mind. I will present an argument on the next post that should compel even a non-believer. Medical professionals are biased to infer mental illness when voices, “weird”, or improbable phenomena occur to people. It just turns out that mind control technology mimic the same things.

          Re Mimic Mental Illness: Here you are claiming that DE is causing brain damage. It can. Well, what kind of brain damage? The mimicking of symptoms is not from damaging the brain but from the technologies themselves. For example, microwaves can penetrate your skull and cause your brain tissue to thermally expand, oscillating with the frequency of the modulated sound, which is then picked up by the inner ear as a sound wave. It is the fact that they are hearing voices caused by the “hearing effect” (microwaves) which mimics a mental illness.

          Re Obscuring the experimentation makes experimentation pointless. I suppose it would, but that is not what I meant to say. The experimenting on civilians is not legal, so they want to hide their experiment, which results in people hearing voices and getting beamed microwaves as DE, by having others believe that it is a mental illness. After all, there is an uncanny resemblance between them.

          Re Needless Experiment: I see your point. The only thing we can do is look at the DoDs history. They have given children LSD to alter their minds in hopes of controlling them. They seem to be very interested in cognitive warfare. In fact, there are plenty of articles claiming we are in an arm’s race with other countries. The goal is to be able to influence someone’s behavior by knowing their thoughts, feelings, insecurities, and fears. Why? Because you can get people to do your bidding for you by controlling them. The DoD has been obsessed with mind control. They want to test how the effects of torture, manipulation, sabotage, harassment, and intimidation will get victims to do what they want them to do. Alternatively, they may want to see how quickly they can get rid of an enemy by exposing someone’s shame-ridden past (true or false) such that they become ostracized or incarcerated as a result. To have the power to do those things, is quite a weapon. This is what the victims are claiming is being done to them, and experts on mind control are tacitly confirming this.

          I ask of you to not get trapped in trying to discern whether or not the perpetrators motives make sense. We do not know precisely what they are, and they are in the business of deception. I ask of you instead to follow my argument that I will present on the next post.

          • Anonymous says

            Regardless of whether or not there is good reason to believe that voices being heard stem from mental illness, it is still a confirmation bias. This is how the brain works. The brain will start with a belief, which is that voices mean illness, and then once it observes the evidence, it will confirm it.

            Everyone who advocates any sort of conspiracy theory at some point accuses critics of their theory of “confirmation bias” — apparently without any awareness of the possibility that they might be doing the same thing themselves. But you can’t really say “this is how the brain works” without admitting it could be how YOUR brain is working.

            Re Needless Experiment: I see your point. The only thing we can do is look at the DoDs history…

            Sorry, but that really doesn’t help in the present — especially since that history is so long ago and all the clueless technocrats who did these experiments are dead and discredited with ZERO discernable successes.

          • musing says

            You are right. We all have confirmation biases because we cannot simultaneously confirm two things at once. The brain doesn’t work like that. As far as zero successes, I do not buy that. And I am not sure how you made that conclusion. The nature of the DoD is clandestine, so we do not know everything. We can only make inferences concerning the victims symptoms as well as rely on other experts who have worked on the technology. Moreover, these agencies want the general population to believe that unlikely events committed to the general population are conspiracies. Not believing that a conspiracy can and has happened by agencies within the DoD is ridiculous. And thinking that conspiracies are for crazies discourages institutional analysis.

  3. says

    As far as zero successes, I do not buy that. And I am not sure how you made that conclusion.

    Lack of evidence, plain and simple.

    The nature of the DoD is clandestine…

    The DoD is the MILITARY. They may do clandestine R&D to develop new weapons or powers, but they do all that to get new and useful tools for battlefield advantage; and whatever they successfully develop will be used on a battlefield, and then it won’t be “clandestine” anymore. No battlefield application — in either Vietnam, Gulf War I or II, Afghanistan, Bosnia, Libya, Latin America or anywhere else — means no actual success in developing any sort of new weapon.

    …so we do not know everything.

    We know enough to dismiss most, of not all, claims of “monitoring” or “mind control” via microwaves. Insisting that we set aside what we know, because of other things we allegedly cannot know, is a form of know-nothingism, obscurantism or anti-rationalism, which is never good or beneficial to anyone.

    • musing says

      Raging Bee. I am not in agreement with you. I may, however, be able to change your mind on the next post. There will be NO physical (direct) evidence because it is classified, and what they are doing is illegal! And as far as no activity on the battlefield, this does not mean that mind control weapons have not been created successfully. It means mind control weapons have not been used in battle, at least that is what mainstream sources claim.

      You are stuck on physical evidence meaning can mainstream actually see the weapons? Of course not. That standard of evidence is too high for the given circumstances. We have inductive evidence which is indirect. We can infer that these are specific technologies based on their effects. Physicists never see the source but posit the existence of entities all of the time. It is an abductive argument that I will make.

      I understand your pride in “rationalism”, but your last statement comes across as bit arrogant. In any case, I enjoyed the back and forth because it tells me what I should focus on. Thanks!

  4. John Morales says

    I don’t see how the purported motive stacks up.

    “This is a two part series on how an estimated 3,500 people within the United States are experiencing electronic harassment from subcontractors hired from the Department of Defense to experiment on civilians with mind control technologies.”

    Experimentation. On civilians. Within the United States.

    OK. Perhaps that’s because USA civilians are the ultimate test subject.
    Or something. Best way to be secretive, perhaps.

    I can certainly rate the plausibility of the premise, and I do.

    However, experimentation implies a less-than-mature technology.

    cf. https://en.wikipedia.org/wiki/Dollhouse_(TV_series)

    • musing says

      Motive is a good point. To buttress the motive, the DoD not only has a track record of experimenting on civilians with mind control but there are patents scattered everywhere indicating that the technology is probably available for testing. Not only that because there are people who have come forward who claim to have worked on the technology or at least know about it. We can never know for sure what their intentions are, but we can say if the technology exists, perhaps prematurely, there should be a motive to test it.

      Why on civilians? Because it is important to get a statistical representation of the population. Although there are a disproportionate number of victims who live alone in apartments, there does not seem to be any other attributes that would differentiate them. Well, there is a high incidence of drug abuse amongst victims which is either a result of the torture to alleviate suffering, or this could be intentional. It would be intentional because the DoD can conflate psychosis with their symptoms of the mind control technology. A perfect way to conceal what they are doing since the medical professionals by default diagnose these symptoms with a mental illness. Putting those two attributes aside, the selection process appears to be random. That is, they want to test how mind control works on all walks of life.

      As far as the technology being premature, it is obviously at a phase good enough to observe what we do in victims. I appreciate the comment because it gets me to think deeper about these issues. Oh, and some experts believe that one application could find its way on crowd control for dissent and even for potential criminals. You would need to know how this technology works on different personalities. I will explain in more detail on the next post.

      • John Morales says

        I can see you have put work into this, musing.

        I do take you seriously, though of course I remain sceptical.

        You must be aware that, if what you claim is true and it is deliberate and ongoing, your going public with these posts is for sure exposing yourself to become a, well, targeted individual.

        Unless, of course, that would make it too obvious that you have a point.

        (But that’s getting a bit involute, no?)

        • musing says

          What I tell you is absolutely one hundred percent true. I know this for a fact as I have inside information that I cannot reveal. Look at my past posts; do I look like someone who would subscribe to bullshit? It is so out of character for me to write something like this. But conspiracies happen, and the DoD wants us to believe that they are for wackos.

          This technology will trickle if not already its way down into the hands of local police and will obviously have huge privacy and human rights consequences. Watch this video and don’t be turned off by Ventura’s folksy voice and theatrics. In particular, note the researcher (Robert Duncan) who has worked on this technology for the CIA and DoD and has devoted his latter years to warning the public. He appears at the end and hear him say in response to the question are people being abused, emphatically “it is the ultimate weapon, worse than abused, these people are being tortured.” It is the most sinister crime out there because no one believes it, and therefore no support goes to these people. This is not something to take lightly.

          Robert Duncan died in July of this year. He told his friend that ever since he started working on his latest books that for the first time he himself was receiving directed energy attacks. He then told his friend that if he dies, it is because of his book. He died a day later.

          Here is the video. I will post detailed information on the next post regarding two technologies.

          https://www.bitchute.com/video/mnCDlmYf3wxn/

Leave a Reply

Your email address will not be published.