Wednesday, November 14, 2012

Evidence of Remote Neural Monitoring, or Carefully Planned Disinformation?

by Anthony Forwood


The Case of John St. Clair Akwei

John St. Clair Akwei claims to have worked for the National Security Agency (NSA) of the US government, and filed a lawsuit against them in 1992 (Washington DC, Civil Action 92-0449) for being targeted with what he referred to as ‘Remote Neural Monitoring’ (RNM) technologies. Many people have referred to this case as proof that these technologies exist, but on closer examination it can be seen that there’s very little to actually substantiate his claims. In fact, there is good reason to suspect that this case was a deliberate disinformation ploy to create the illusion that the NSA has more capabilities than it really does. This is a standard tactic used to throw off foreign and domestic adversaries and protect classified secrets. This sort of disinformation ploy is designed to create a prop that can then be used to lead people’s beliefs about the capabilities of these technologies so that they have a false understanding of the methods used in their targeting and the real methods are overlooked.

Akwei’s lawsuit application has been posted on the Internet in its entirety, and in reviewing it, I discovered that he provided very little information about the technology that would indicate how it operates, nor is there any more than a few sentences regarding the effects he claims to have suffered by these technologies at the hands of the NSA. Apparently, Akwei had no evidence at all to support his claims, or he would have clearly stated this fact in his lawsuit application. In fact, his case was dismissed by Judge Stanley Sporkin on the grounds that it was frivolous. By reading his application, it is indeed obvious that he had no case. I came across one online post by someone who said they had contacted Akwei to find out the results of the case, and Akwei hadn’t been interested in discussing it and didn’t want to be bothered about it.

Nonetheless, because Akwei went so far as to file a lawsuit, many people have come to automatically assume that this somehow gives his claims credibility, and I see his case being cited by one person after another as supporting evidence for their own claims, which makes me suspicious. It appears that his case is being used as part of an ongoing disinformation campaign to influence the targeted public in what it believes about these mind-control technologies and the methods that are used to cause the effects that they are experiencing.

Akwei states that he was in two-way communication with NSA agents who used these technologies to harass him, but he provides very few other details about his targeting beyond this and the majority of his application is filled with background information about the NSA and some details about their purported technological capabilities. Most of this information was already widely available at the time he filed his lawsuit. The only information that might have been relatively new at the time was a few of the more extraordinary claims he made about the technology.

For instance, Akwei describes technological capabilities that I have already shown (see http://exposinginfragard.blogspot.ca/2014/06/a-primer-on-v2k-vs-mind-reading.html) to be unrealistic. For instance, he states (emphasis added):

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. Visual memory can also be seen.

He goes on to state that it is all done non-invasively and “with no physical contact with the subject.” This implies that no special requirements are needed, such as implants or preliminary EEG sessions for learning a target’s unique brainwave signature patterns. However, I have already shown in my previous article how scientifically unrealistic this is.

Like virtually every other person making such extraordinary claims about these technologies (Tim Rifat, Jesus Mendoza, Robert Duncan, Alex Jones, etc.), Akwei fails to describe whatever method might be used that would circumvent all of the problems that have been detailed in my previous article regarding remote mind-reading technologies. He also fails to provide any sources for his information other than a list of references to a number of books and documents that he states he only discovered in 1991 after having notified the authorities and getting no responsive action. This list seems to be the extent of his evidence, and much of the referenced material is familiar to this author and none of it bears evidence that would support Akwei’s more extraordinary claims.

In his lawsuit application, Akwei makes the following claim (emphasis added):

NSA computer-generated brain mapping can monitor all the electrical activity in the brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes.

He also states:

Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived.”

Irrespective of finding some way of overcoming all of the problems described in my previous article regarding these technologies, reading all the activity of the brain, even if it could somehow be done, would require some very powerful computers with incredibly immense storage and memory capacities for each person being targeted. Even a MEG machine can’t read the activity of individual neurons and approximately 50,000 active neurons are needed for the brain to generate a signal that is strong enough to be detectable by it, so the claim that all brain activity can be monitored would require some exceptional science that lies outside of our current understanding of physics. This comment of Akwei's reflects his ignorance of the physical limitations of such a scheme.

But let’s consider this claim a little further, just to properly understand how unrealistic it is.

There are approximately one hundred billion neurons in the human brain, which means that just to capture one millisecond (1/1000 of a second, the approximate time it takes for a neuron to fire) of brain activity for one person, with only one byte of computer memory allocated to each neuron, it would require about 100 gigabytes of storage space per millisecond. One second of monitoring would require 100 terabytes (1 terabyte = 1,000 gigabytes). One hour (3,600 seconds) of monitoring one person would require 360,000 terabytes (360 petabytes, or 360 quadrillion bytes). Multiply this by the number of people that Akwei claims are supposedly being monitored (hundreds of thousands), and it becomes even more unrealistic. Of course, a single byte per neuron is far short of what would actually be required, since it would also be necessary to store and analyze information about each neuron, such as what it does, what its state is, what other neurons it connects to (there are approximately one thousand dendrites on each neuron that connect to other neurons), its firing rate, etc. Each additional piece of information about each neuron would multiply the storage requirements for each neuron by at least a factor of two, but probably much more. On top of all this, there’s the necessity of mapping all the meaningful neural firing patterns that are decoded from a person’s brain activity, which would require even further computer resources, both for doing the analysis and for storing the patterns and information about their meaning. Even though far less than the full set of 100 billion neurons would ever be of interest in mapping or monitoring for any particular type of pattern, the storage and analysis of a person’s brain activity would still require extraordinary memory and storage capabilities.

To put this into better perspective, in August 2011, IBM was reported to have built the largest storage array ever, with a capacity of 120 petabytes (120 million gigabytes). This would be about enough to store the complete neural information for one human brain for about twenty minutes at most.

So we see that for Akwei’s claims to be true, there has to be a database for each individual target that contains complete data on that person’s recognized patterns, as well as storage capacities for every millisecond of brain activity to be used for real-time monitoring while also analyzing the person’s brain activity. This might easily require days, weeks, or even months worth of recorded data during the preliminary pattern learning phase. Not that this is completely impossible, but it needs to be kept in perspective what Akwei is claiming, and what is realistic.

Akwei makes one more statement in his application that’s of particular interest here. He says (emphasis added):

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.”

This is an important point to take note of, because it supports the fact that the Robert Malech patent is also often cited as proof that these mind-reading technologies exist, yet the fact that this patent is in the public records goes directly against NSA procedures for keeping technological secrets. Why would it be there in the publicly available patent records if it were a classified technology that the government wanted to keep secret? It wouldn't.



The Robert G. Malech Patent

Because many people have been referring to this particular patent as proof that remote mind-reading technologies exist, I decided to search it out at the US Patent Office website, and retrieved a copy of the original application (US patent #3951134). The patent application was made in 1974 and was granted in 1976. The patent application describes the technology as an:

Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject's brain waves. The interference waveform which is representative of the brain wave activity is re-transmitted by the brain to a receiver where it is demodulated and amplified.”

As has already been explained in my previous article, there are a number of problems with this method of remotely reading brainwaves that makes it unrealistic as a real application. However, because it received a patent grant, many people assume that the technology must work.

The use of the word ‘remote’ can be deceiving when used in relation to such technologies, and might mean nothing more than the distance of mere inches, as with SQUIDs in a MEG machine. The Malech patent gives no indication of the distances that the described technology would be expected to work at, but it does state the following (emphasis added):

If the amplitudes of the two signals transmitted to the subject are maintained at identical levels, the resultant interference waveform, absent influences of external radiation, may be expected to assume zero intensity when maximum interference occurs[.]”

This raises the problems that I outlined in my previous article – that any extraneous electromagnetic interference arising between the source and the target will disrupt the signals, and this interference is virtually impossible to eliminate in an open environment. The greater the distance between source and target, the more interference there will be to contend with. This applies to both the transmitted signal and the returned signal, doubling the problem of sending and receiving a reliable signal. But more than that, the above quote also reveals the patent author only assumes that the technology will work as expected, rather than having actually been tested.

Further, in describing the method of operation, the patent application states (emphasis added):

[T]he interference waveform is modulated by the brain waves. It is believed that this is due to the fact that brain waves produce electric charges each of which has a component of electromagnetic radiation associated with it.”

These last two quoted statements clearly indicate that, at least at the time that the application was filed (1974), there was no certainty that this technology would work as described or even that specific brainwave patterns could be determined, which suggests that a prototype of the technology was never actually built and tested to see if it would do what the patent author claims. According to the patent application process in the USA, such requirements are not necessary as long as the technology or invention is conceptually sound and based on known scientific principles.

One more thing needs to be understood that has to do with the patent process. According to an explanation of the patent examination process available on the US Patent Office website (emphasis added):

As a rule the examiner will give to a claim its "broadest reasonable interpretation consistent with the specification. […] [T]he words of the claim must be given their plain (ordinary and customary) meaning unless applicant has provided a clear definition in the specification.”

Given this fact, a closer scrutiny of the Malech patent application will reveal that certain distinctions in its wording – most specifically in the choice of using the words ‘can’, ‘will’, and ‘may’ when and where they have been – suggest that the application author clearly understood that certain key aspects of this technology’s operation were only being assumed to work, rather than being certain to. I will spare the reader from going over these details of the application here, however, and will instead leave it to those who are interested in verifying this for themselves to read the original patent application available at the US Patent Office and carefully note how it is worded to reflect certain assumptions were being made about its capabilities.

One final note about this patent. It was obviously of no interest to the military or intelligence organs of the US government, otherwise it would have been immediately classified and kept out of the patent records. The fact that it received a patent grant relatively quickly and is in the patent records implies that the military/intelligence organs had already researched this technology and found it to be unworkable. That being the case, the Malech patent may have been purposely planted in the public records as a prop for later disinformation campaigns to mislead and confuse the targeted public about the sort of mind-control technologies that are being used on them, while other, more realistic methods of mind-control are applied without any awareness of the target. Even if the Malech patent wasn’t purposely planted, it has nonetheless become a misleading piece of information that has since been frequently used as proof that this remote mind-reading technology exists and can even do everything that John St. Clair Akwei claims.


Tuesday, July 24, 2012

The Phone Trap

by Anthony Forwood


 
Has this happened to you?
 
You start making friends with other TIs on facebook or some other website, and they want you to phone them.
 
Sometimes they'll say that they want to tell you something, but they don't feel safe talking about it online. So they want you to call them by phone so you can hear whatever it is they have to say.
 
I recall that when I first came on facebook, the first person I made friends with was a certain woman about my own age who approached me almost immediately and claimed to be a TI victimized by mind control. She posted a lot of different pictures of herself that were always very alluring and seductive. She was quite a looker. She always talked about how badly her perps were treating her, but never really said exactly what they were doing, or who they were. She said she wanted me to call her so she could tell me about her situation.
 
I don't have a phone, so I had to turn her down. I thought it was kind of strange that she would think that a phone was any more secure against perps than online messages, particularly when she was talking to someone she didn't know anything about, and so I concluded that she was into phone sex or something, and was trying to suggest that to me.
 
But then other people did the same thing. They said they had something important to tell me, and wanted me to call them. Again, I had to turn them down.
 
But I was suspicious. Something didn't seem right.
 
I mostly forgot about these incidents until it happened when I was investigating a few people. The first was a man named Jack Pruett, whose name I had previously seen mentioned in relation to the Montauk Projects (a mind-control program involving children), and then I had come across a newly published book by him at the library. The book (The Grandest Deception) was about the coming New World Order, and the author ended by asking interested readers to contact him if they were interested in joining together with him to devise a long-range plan to fight against it. It was all very intriguing, so I copied down his email address from the book and wrote to him, inquiring about this plan he had. I also asked him point-blank if he was the same Jack Pruett that worked on the Montauk Projects. Interestingly, he replied that he knew about that secret program, but denied being the same person.
 
He also asked me to call him by phone to discuss his plan. I refused, and mentioned that I didn't trust phones because of the ability to be hypnotized through them, and I didn't feel certain that he wasn't the Jack Pruett from Montauk. His responses to my emails had been coming immediately after I sent mine, and when I sent the one saying what I had about my suspicions, instead of getting a response, the computer terminal I was using suddenly went weird on me, and everything I was typing was showing up on the screen backwards, from right to left instead of left to right, the keys stopped working properly, and I couldn't do anything at all but log off. That ended our conversation, and it left me more suspicious than ever. I thought that it was an intimidation tactic and that I had been absolutely correct in pegging him as the same man that was involved in the secret mind-control programs at Montauk (I have since found further evidence to support this).
 
I also started thinking about all these requests to call these people by phone.
 
Just to explain a little background on this phone issue, I had previously researched the little-known story of another man named Jack Sarfatti (a quantum physicist who played a small historical part in consciousness research in the 1970s, whose name I had often come across in a number of books), who, when he was 13 years old back in 1953, had received a series of very strange phone calls from a metallic-sounding computerized voice that had left him in a dazed, hypnotic state after each one. It turns out that Sarfatti had been enrolled in a secret government program for gifted children at about this same time, and this program wasn't unlike the Montauk Projects in certain ways. The story of Sarfatti (described in his online book 'Destiny Matrix 2012', and in my own online book 'Shadow World') is actually what led me to begin all my research into mind-control technologies, and this phone hypnosis issue kept coming up in certain early cases of UFO witnesses and 'alien abductees' (which I've since come to conclude are aspects of early mind-control experiments). These witnesses and abductees were very often describing getting these strange phone calls from metallic-sounding computerized voices just like Sarfatti had received, so I've become quite certain that there's something to these calls and 'phone hypnosis' as part of a standard mind-control process, and still is.
 
To continue... After dealing with Jack Pruett and having him attempt to get me to call him, and the sudden strange activity on the computer when I told him my suspicions, certain other people that I've investigated for their extraordinary claims have also attempted to get me to talk to them by phone, including the self-proclaimed 'super-soldier', Duncan O'Finioan (interviewed on Jesse Ventura's TV show, 'Conspiracy Theory'), and the more familiar TI 'activist' Robert Duncan, who I've more recently been dealing with.
 
So, all these attempts by people who have something to do with gang-stalking or mind-control to talk to them by phone has got me very suspicious about phones being used as part of a hypnosis program to draw people into this sinister web, and I'm tending to believe that there really is something to this. Each of these people have acted very strange in certain ways, and I've decided to keep my distance from them for obvious reasons.
 
One of them, who is here on facebook, was having a very hard time with their gang-stalking not long ago, and then all of a sudden they were saying that everything was fixed and it had all ended, and they wanted me to call them to tell me something very important. I never did, of course. Now, in only a few months, they've gone from being without any money and forced to live on the street to apparently having all sorts of money and traveling around to other countries, living it up and not a problem in the world. Very strange!
 
There are a few other strange instances with others here on facebook as well, each of whom has also wanted me to call them by phone, but to describe these is just too complex to get into at this point, so I'll leave them for now.
 
I'm just curious if anyone else has had any TIs want them to call them by phone, and what might have come of it. I urge everyone to be very careful of this, since you may not even know what such a phone call might have resulted in, if you had made it. You may be being hypnotized and programmed or otherwise manipulated. You won't necessarily know, considering how effective hypnosis can be at covering its own tracks!
 
I must also warn about online videos, since they can be used in a similar manner. Although they don't offer the feedback necessary for in-depth hypnotic programming, they can still be used to put you in a light hypnotic state that will make you suggestive to commands and instructions, whether they be spoken normally or inserted subliminally. These might be used to influence you to take further steps that will lead you into more intense mind control by other means.
 
One final note of explanation... Since 1953 when Sarfatti received those strange calls (the very same year that MKULTRA started, by the way), hypnosis techniques could easily have been computer automated and packaged as a software program that would allow anyone to apply it on others. There are certain audio tones and electromagnetic frequencies that will put a person into a hypnotic state, and subliminal suggestions can then be given to test if the person is hypnotized, and through these means they can be completely and unknowingly mind-controlled. They can be made to believe anything, including alternative suggestions for whatever strange things occur to them or around them. These might include suggestions that will confuse them as to the technologies being used against them.
 
If you are curious about this, please stay up to date with my documents and articles posted here on my blog, as well as at http://www.scribd.com/aforwood, and the facebook group Anti-Gang-Stalking Network. You may also contact me at forwood@live.ca with any questions or concerns you might have.

Sunday, July 22, 2012

Let's Get Real About All This Technology

by Anthony Forwood

Let’s play Devil’s Advocate assume that we are a group of fascists who have the technologies that many people claim to exist. This means we can put voices in people’s heads, read their thoughts, see what they’re seeing, hear what they’re hearing, insert thoughts without them realizing it, make them feel any way we want, act any way we want, etc… All the things that the most prominent promoters of these technologies among the TI community claim they can do. Let’s also assume that we can target anybody at all, since there is apparently no way to guard against these technologies.

Now, if we were going to target anybody at all, what would the objective be?

To piss around with nobodies just for a kick? That would be a complete waste of these very expensive and highly sophisticated technologies and the entertainment value for psychotic minds wouldn’t be worth it.

To police or punish certain individuals? Even if the technologies were used for this purpose, the cost for what these technologies would require in hardware per person makes this very unfeasible compared to other more practical methods. I calculated the computer storage requirements for a full representation of the human brain, and with 100 billion neurons in the human brain having an average firing rate of 1 millisecond per neuron, at one byte per neuron, that equates to 100 billion neurons x 1000 milliseconds = 100 trillion bytes, or 100,000 gigabytes per second of brain activity! So, to use such sophisticated technology for policing and punishing ordinary people is totally impractical. This technology would deserve something much more worthwhile to make it practical.

The best objective in using such highly advanced technology would be to apply it to the ultimate goal of any fascist group: the complete takeover and control of a population to turn it into a totalitarian dictatorship.

So, when seen in this light, who would we target first? Would it be ordinary people like you and me, or would it be more influential people like political, military, and corporate leaders?

If we were interested in bringing about a totalitarian state and we had this incredibly powerful and undetectable technology at our disposal, we’d target highly influential people first, who we could make to think and act in ways that are to our benefit. If we were seeking to turn a nation or the world into a slave population, as most of us believe is the ultimate goal of those developing and using mind-control technologies, then we would focus on accomplishing this in the best and quickest way possible, and not waste time toying with ordinary people who have little influence at all in fulfilling that objective and can offer us next to nothing as our unwitting slaves.

Our political, military, and corporate leaders would certainly be the first targets, and this would be quite easy if we could actually eavesdrop on everything they saw, heard, felt, thought, said, or did, and if we could insert other thoughts, feelings, sounds, and images, or cause them to otherwise act in ways that were more desirable to us, without them even knowing that we were. From all the extraordinary claims that many people are making about these technologies, based on their own supposed experiences as targets of them, the technologies are so sophisticated that these people can’t be sure of anything any more, and can apparently only guess when they are thinking and acting of their own free will at any given time. So, it would be just the same for these leaders, and there would be nothing that could be done about it.

Once our leaders were under control, the next targets would be the people directly under them, and the targeting would continue to expand downwards through the levels of power and authority until ALL levels were contained and controlled. Working from the top down would be the most efficient and least problematic method of applying these technologies to take over an entire population, and NOT bottom up, starting with ordinary people like you and me.

As this was going on, certain acts in business and politics would begin to quickly unfold that would move us towards the preferred state that those who possess the technologies want. There would be no reason to dally and wait for the right situations, since, as we know from 9/11, such situations can be created to advance certain draconian measures that move us in the direction that these fascists want. But with these technologies being at the level of sophistication that so many people claim they are, such measures could be taken to a far greater extent far more quickly and with far more desirable results than 9/11 produced.

If these technologies actually existed in the manner that many claim they do and for as long as they supposedly have (at least twenty years), then we would already be living in a totalitarian dictatorship, and there would no longer be any reason for those who possess them to worry about pretending otherwise. We would already see this quite clearly and it would be common knowledge that this was the state we were in. Society would have quickly become far different than it was before, and it would be nothing at all like it is now. The very first thing that would be done would be that all constitutional rights would be immediately and publicly revoked, something on the order of Martial Law would be declared, and police and military would be on the streets day and night in full combat readiness, prepared to squelch any public revolt. People would be being shot on site for protesting in any way whatsoever, just to get the message across. It would be quick and to the point.

Just to understand such a situation better, the idea of revolting against this sudden change needs to be considered. Any attempts to revolt would require the ability for people to first plan and organize, and this would require them to be able to communicate with each other in a secure and expedient fashion. But since all of our communications systems are already closely monitored by ECHELON (or could otherwise be taken down quite easily), there would be no way to plan and organize without being immediately discovered. Even to set up a new means of communication, even if it were simply a code system used over the existing communications network, or even messengers on horses, or whatever else, that system would have to already be in place and each party involved fully understanding how to use it, otherwise the same communication problem would still exist. And this neglects the possibility of sabotage by infiltrators.

How many people would it take to police the remaining population? With the technology at the level of advancement that so many people claim they are at, it wouldn’t require very many people at all. People would suddenly be quite expendable, and as the population came to realize that they weren’t of any great value to the new power structure beyond slave labor, people would begin to volunteer themselves to that new power structure, just to save their own lives. So the population would start policing itself rather quickly and voluntarily, and those who refused to conform or had any dissenting thoughts would be quickly weeded out and unceremoniously exterminated. This would serve those who possess the technology by eliminating the greatest opposition and preserving only those who would be most conforming to the new power structure, as quickly as possible. With the technology that many people claim exists, and to the degree that they say it does, the remainder of the population would be brought into the mind-control system without a fight.

So why isn’t this happening?

The answer is very clear. It’s because these technologies DO NOT EXIST to the level that many people claim they do! They can’t read your thoughts, see what you’re seeing, hear what you’re hearing, insert thoughts without you knowing, and they are not mapping the brainwave signatures of an entire population so as to control each of us through these means. It’s not only impractical as far as resources go, it’s also completely inefficient to target ordinary people.

These technologies, with full Remote Neural Monitoring as described here, were claimed to exist as long ago as 1992, in the case of John St. Clair Akwei. That was twenty years ago. Twenty years is a long time for things to progress, and yet, what have we seen that would indicate that these technologies actually exist? All we have to show for it is a lot of very ordinary and unremarkable people who claim to be targeted by them, but from my personal experience, none of these people can even be bothered to back their claims with any sort of intelligent consideration of their own experiences or of the claims they make, nor do they seem to have done any serious research, as anyone who was truly being targeted would want to do.

It’s been coming to my awareness more and more that many of these people who claim that they’re being targeted by such extraordinary technologies are the sort of people who tend to think that whatever might occur around them that they don’t like or are even the slightest bit suspicious of, that it must be due to being targeted. These people see any perceived negative situations as always being somebody else’s fault, and they see these situations as somebody else’s responsibility to deal with, while they claim complete incapacity to do so themselves.

At the very worst, these people have been conditioned to not think at all, but this is due to their own failures and laziness, preferring to spend the majority of their lives entertaining their minds with TV, fictional books and movies, and Internet gossip. The real extent of the mind-control that DOES exist has been effective in dumbing down a large section of the population so that they don’t know how to think, and require – even DEMAND – being babysat by those in power.

These technologies are obviously not even needed for these people. Just pose the idea that they exist, and they crumble in utter paranoia and submissiveness. These people are the REAL threat to society more than anything else, because as their numbers grow and they speak such nonsense more and more, the rest of us begin to look just as foolish as our more rational voices are drowned out, and this only makes it more apparent to those in power that we ALL need to be babysat and are undeserving of the rights and freedoms that we still have.

Freedom of speech comes with certain responsibilities. These people need to be responsible for what they claim.

Tuesday, July 10, 2012

Detecting Disinformation Agents

by Anthony Forwood



There are several types of disinformation agents, from high-profile ones who gain a lot of publicity and promote well-crafted stories, to low-level ones who serve to flood the Internet with less reputable claims. This document deals primarily with the former.

A disinformation agent will sometimes be someone who works directly for a larger entity (usually the government or major corporation) and uses a cover identity, but more often than not they will be someone who receives false information from someone who purports to be ‘in the know’, such as a government whistleblower. In other instances, they might just be someone who makes certain claims that tend to benefit those who keep dark secrets because it creates a sense of doubtfulness about those secrets, and confuses any chance of learning the truth. Whatever the case, they will be used because they’re willing to believe the information they’re given, and they’ll usually have or be provided with the right avenues and receive a greater than usual amount of promotion to ‘get the word out’. Often, they’ll be able to provide physical documents or other evidence that reveal certain truths to their story, but even these will not reveal the veracity of their entire story (nor are they necessarily legitimate). Other times, they’ll be able to provide verbal information that on later investigation by others will pan out, thus offering some legitimacy to what they claim. However, there will ALWAYS be unverifiable information that will be part of the foundation of their claims, and this information will more often than not be extraordinary in nature (e.g. beyond known science).

A disinformation agent will usually be given a scripted story to disseminate. This story will weave many truths with many falsehoods, so that these truths might be disregarded due to the inclusion of the falsehoods. Very often, these truths will simply be disregarded because they’re so far outside of our common understanding that they sound too outrageous to easily accept, and are hard – if not impossible – to prove. In such a case, the added falsehoods are meant to add to the seeming illegitimacy of the truths. This helps to turn away all but the most gullible people, who will be used to further increase the seeming absurdity of these planted falsehoods by the unscientific mindset these people generally have and the propensity to be carried away by imaginative ideas rather than to stay grounded in just those known truths that are provable.

A disinformation agent, particularly one who knows that they are disseminating false information, will rarely expand on their original information, and will be more interested in disseminating just the information they’ve been provided with. An unwitting disinformation agent, on the other hand, will usually be interested in investigating their own information further, and not be as compelled to stick to their original story over time as new revelations crop up.

It’s common for there to be a number of disinformation agents working simultaneously, either in secret collaboration or alone and unaware of each other’s true identity. One of their tactics is to engage in creating controversy between themselves, which only serves to disrupt the situation further and increase the uncertainty, while keeping their followers hoping something revealing might come of it.

Disinformation agents, whether witting or unwitting, will usually believe the story they tell, and this is a standard procedure in keeping secrets. These are cover stories that are fed to them with the purpose of compartmentalizing the knowledge and activities of the secret programs that they might actually be privy to. Virtually no one but those few people at the very top will ever know the full truth about the secret program.

The ultimate purpose of a disinformation agent is three-fold:

a) to create a sense of ridicule about anything that they include in their story so that even what is true will be not be believed by intelligent people,

b) to mislead those who are gullible enough to believe their story, and

c) to divert the efforts of those who seek to know the truth through further investigation.

Although disinformation agents are used to cover up the truth, their claims should not be written off completely, since they can still teach us something about the underlying truth that they’re meant to cover up.

To measure the level of truth within each of these individual stories, the unverifiable claims must be sorted out and then weighed against the verifiable claims. These two aspects of any person’s claims must be clearly understood before considering any further what they’re claiming.

To measure the claims that are being made by someone, it’s necessary to always pay attention to what they say and how they present it. For instance:

1) What percentage of their claims can be checked out, compared to what can’t?

2) What seems to be their motive for making their claims?

3) Do they act fairly and honestly during a discussion?

4) Do they act like they are beyond questioning?

5) Are they willing to provide further evidence of their claims when it’s asked for?

6) Do they claim to have special inside sources that gives them an edge on the facts?

7) Do they claim early on to only be interested in exposing what is going on at whatever cost, but then later blatantly withhold information?

8) Do they ever offer valid sources of information that would support some of what they say?

9) Do they admit when they’re only assuming something or speculating, or do they pass off everything they say as hard fact?

10) Do they often leave it for you to fill in what they aren’t saying, relying on you to use your imagination to make the connections between certain things?

11) How much trust do they expect you to put into what they say?

12) Do they attempt use emotional appeals to gain support for their claims, or do they stick to straight, unemotionally imbued information?

13) Do they convey a lot of fear by the way they describe things?

14) Do they spend an excessive amount of time going over less significant or more widely known information than they do going over the more significant aspects of their claims, or in discussing any new information they might claim to have?

14) Can they explain what they claim in a logical and scientific way that might offer the ability to test, or do they avoid those important aspects and rely instead on emotional appeal for persuasion?

15) Is the way they present themselves that of an honest, fair, and respectful person that can admit being wrong, or are there telltale quarks in their personality that might indicate otherwise?

16) Do they include terminology or phrases that are unusual, and can’t be found anywhere else where the same meaning applies? (I see this with almost every person I’ve come across that I’ve suspected of being a high-profile disinformation agent, and I have a suspicion that this terminology is purposely planted in order to track the spread of the disinformation from its original source, and to indicate what pieces of disinformation are being bought into and what aren’t. You can usually determine whether the phrases are legitimate or just made up by doing an Internet search for them, to see who else uses them.)

* * *

Here are some further pointers I found online (from ‘Disinformation Tactics of Shills & Online Trolls/Zombies’). These are common traits of low-level disinformation agents, although they usually fit high-profile ones as well:

1) Avoidance - They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity – They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental Participation – They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with no reason.

4) Teamwork – They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial – They almost always have disdain for 'conspiracy theorists' and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a newsgroup focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain. Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions – An odd kind of 'artificial' emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial. Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the 'image' and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It's just a job, and they often seem unable to 'act their role in character' as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo. With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent – There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'Freudian', so to speak, in that perhaps they really root for the side of truth deep within.

Often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

8 ) Time Constant – There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

a) ANY newsgroup posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NEWSGROUP ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to 'get permission' or instruction from a formal chain of command.

c) In the newsgroup example a) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay - the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

* * *

Further Notes

The purpose of disinformation is to confuse the facts about an issue as much as possible and leave so many false leads and possibilities that discovery of the truth becomes next to impossible to surmise. By the time any significant facts that would point to the truth can ever be ascertained, the greater part of what remains to be known will still be much greater, so that uncovering a few facts will make little difference. The best that this might lead to is that some people might realize what is true and what is false, but trying to convince anyone who’s willing to believe the disinformation is futile, because the disinformation is designed to draw in the type of person who negates logical reasoning and allows their emotions and imaginations to lead them in making decisions instead. On the other hand, anyone else you might try to convince will want either irrefutable objective proof, or at the very least, the acknowledgement of a trusted authority whom the greater public will believe in.

Disinformation campaigns build on or borrow from each other to keep the most successful falsehoods alive and use these in whatever way they can be to create new disinformation campaigns. Therefore, we see that the UFO/ET issue, which started one of the biggest disinformation campaigns that continues today, has been built on and borrowed from to incorporate other controversial issues, including psychism, time-travel, ancient astronaut theories, spirituality, metaphysics, demonology, mind-control, the NWO, and secret government technologies. If they want to cover up something, they create a disinformation campaign that relies on the more popularly accepted falsehoods of previous campaigns, and the more outrageous they happen to be, the better.

The underlying purpose of disinformation is to create confusion and distraction and thereby bury the light of truth deep beneath a pile of falsehoods, so it only helps the disinformers to put out as many claims as possible by as many people as possible. But in order to keep the truth hidden over a long time, the disinformation campaigns must also continue in one form or other, and this usually means finding new people with new stories to act as disseminators as old ones are ‘put out to pasture’ and dissolve into obscurity. These new recruits will lead the older campaign to new focal points of misdirection, such as we’ve seen happen with the initial UFO/ET issue leading to all sorts of rather extraordinary claims about certain aspects of witness contacts, sightings, and abductions. The underlying reason for building on this earlier disinformation campaign is because it worked so well, and continues to work well, in covering up a far more plausible but equally sinister truth.


Wednesday, June 6, 2012

A Disinformation Report

by Anthony Forwood



_____________________________________________________

*EXTRAORDINARY CLAIMS REQUIRE EXTRAORDINARY CAUTION*
_____________________________________________________


$1000 CHALLENGE -- $1000 CHALLENGE -- $1000 CHALLENGE

I will GLADLY pay $1000 CASH to anyone who can explain how a person’s thoughts can be read remotely at any time without the use of multiple implants placed throughout the brain.

Anthony Forwood <forwood@live.ca>

_____________________________________________________

"The Mother Of All Black Ops" website is putting out disinformation.

They claim that ‘brain fingerprinting’ can be used to remotely track people, anytime, anywhere. THIS IS ABSOLUTELY FALSE! RFID implants are FAR more likely being used, and are probably far more economical as well.

This site also claims:

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing.”

This is equally UNTRUE! It is pure HYPE! It is physically impossible for brainwaves to be read remotely.

See the link at the bottom of this file for more information.

* * *

Apparently, Dr. Robert Duncan is making a similar claim, and promotes the idea that it’s possible to remotely read a person’s thoughts – but as a scientist and Harvard graduate, he falls short of using his intellectual capacities to explain HOW this is done. I have asked him to provide me with that information, and await his reply.

* * *

Note:

Remote Neural Monitoring is NOT the same as V2K. Monitoring is the act of reading/watching/recording activity. V2K is STRICTLY transmitting signals/voices/sounds TO the brain. There is no two-way communications going on. Similarly, ANY remote transmissions will be one-way TO the brain. Brainwaves are FAR TOO WEAK to be read from any distance beyond a few inches, and the complexities of doing so mean that even this is not a simple task!

See the link at the bottom of this file for more information.

* * *

On John St. Clair Akwei:

There are many stories and articles being circulated on the internet that I believe are purposely ‘loaded’, planted as seeds to lead people to believe that certain mind-control technologies exist when they really don’t.

For example, there is the case of John St. Clair Akwei, who claims to be a former NSA employee. Akwei filed a lawsuit against the NSA in 1992 for being targeted with what he referred to as ‘Remote Neural Monitoring’ (RNM) technologies. Although what has been posted on the internet about this case might lead one to believe that these technologies exist (hence the lawsuit), there’s nothing in these posts (particularly Akwei’s own claims) regarding this case that actually substantiates this.

Akwei provides nothing beyond his own very limited and unproven accusations – no technical data, no descriptions of the technology or how it might work, no information about whatever effects he suffered, etc. In fact, the whole case seems to have withered away without anything further coming of it. I read one post from someone who contacted him to find out the results of the case, and this person stated that Akwei wasn’t interested in discussing it and didn’t want to be bothered. The case had been dismissed by Judge Stanley Sporkin on the grounds that it was frivolous.

Obviously, Akwei either had no evidence for his claims, or the whole thing was a purposeful disinformation ploy orchestrated by his employers to mislead the public (and real Targeted Individuals in particular) into thinking that these technologies exist. I strongly suspect it was the latter. However, because he claims to have been employed by the NSA (which he probably was), and because he apparently went so far as to file a lawsuit, many people will automatically believe that this somehow gives his claims a lot of credibility. The fact is, virtually all employees of the intelligence organs are purposely misled or kept in the dark about anything they do not have a need to know about, and are often used (wittingly or not) as disinformation agents to muddy the truth. There is no way that Akwei or anyone else who had substantial knowledge of the truth would be placed in a position where they might be able to expose it. Akwei apparently had no substantial knowledge, and never even claimed to. His case seems to have been one based purely on assumption, or outright lies.

Google ‘John St. Clair Akwei vs. NSA’ to read his court testimony and see for yourself. It’s all hype!

See the link at the bottom of this file for more information.

* * *

Author/investigator Tim Rifat also makes similar claims, but at least attempts to describe the technology to some extent. However, he overlooks the technical limitations of its capabilities.

* * *

See the document ‘A Primer on V2K vs. Mind-Reading Technologies’ at:

http://www.scribd.com/aforwood

It explains in comprehensive detail the capabilities and limitations of these technologies, based on hard science, rather than speculation.

PLEASE READ IT!
_____________________________________________________

*EXTRAORDINARY CLAIMS REQUIRE EXTRAORDINARY CAUTION*
_____________________________________________________


$1000 CHALLENGE -- $1000 CHALLENGE -- $1000 CHALLENGE

I will GLADLY pay $1000 CASH to anyone who can explain how a person’s thoughts can be read remotely at any time without the use of implants.

How about it, Dr. Robert Duncan? John St. Clair Akwei? Julianne McKinney? Eleanor White? James F. Marino? Dr. Rauni Kilde? Tim Rifat?

Anyone at all?


Anthony Forwood <forwood@live.ca>

Wednesday, May 16, 2012

The Art of Cult Creation

by Anthony Forwood



This continues from ‘The Art of Suggestion in Action’, posted previously. If you haven’t read that yet, you’ll need to before reading this. This takes up where that article left off, and considers the deeper, more sinister aspects of what ‘Mellhedek’ seems to be up to with what he calls his ‘Human Protection Software Suite’. For those who aren’t familiar with this scam, please refer to my first article, ‘Human Protection Software Suite’, posted on this blog.

This article should raise some eyebrows…

* * *

Mellhedek’ really had no effect on either John or Mary, although he gave it a good try. John had no symptoms during the entire time, and Mary was at the height of what she thought was an attack when she started, so ‘Mellhedek’ took the credit as soon as it lessened, which it eventually would have anyway. We don’t know what happened after that. The transcripts seem to be cut off before the end of the session. Did Mary really get better? Or did her symptoms return?

The most important thing to note with the above is that ‘Mellhedek’ relied on his suggestions and John and Mary’s gullibility.

Mellhedeh’ only wants to deal with the most gullible people. These are the type of people who tend to have high psychosomatic tendencies, and so they’re easier for him to manipulate into self-induced phantom symptoms. They’re also the least likely people to say anything if they’re dissatisfied, because he uses the fear of being labeled as a perp or infiltrator if they speak up. In fact, it seems that users of his ‘product’ aren’t allowed to speak anything but good things about him and his ‘product’.

I recognize this is a standard method used by cult leaders to control their members, and cults are a phenomenon that was created by the CIA as part of MKULTRA (i.e. the Moonies, Jim Jones, David Koresh, Heaven’s Gate, etc.). I see him applying other methods used by these cults as well, some of which we see above, others I’ve commented on in my commentary on ‘Mellhedek’ and his HPSS, and some that will be described below.

Cults don’t just form overnight, of course. They start out with just one person, acting alone, drawing in his or her first few followers with a lot of sweet-tongued talk mixed with just enough of what the person wants to hear to draw them in further. They don’t even have to grow very large to become effective ‘cells’ that can be utilized for whatever purpose their creators might decide on later. Charlie Manson (another MKULTRA creation) had a small group of only five or six followers, and Charlie was no great mind-manipulator, yet these people were extremely dedicated to him even after his arrest and conviction, as many who are old enough will remember. In fact, he still has a strong cult following to this day (Brotherhood of Love), and continues to control and direct them from a prison phone. He just applied the same basic techniques of cult mind-control that he had learned from his own mind-controllers while they experimented on him in prison as part of their MKULTRA programs. So to think that ‘Mellhedek’ is no real threat is naive.

Something That Dr. Margaret Singer spells out quite clearly, in a document I found online (‘Conditions for Mind Control’), is the following:

When there is control of external feedback [in a cult setting], the group becomes the only source -- there are no reality checks

BEHAVIORS REWARDED: participation, conformity to ideas/behavior, zeal, personal changes
BEHAVIORS PUNISHED: criticalness, independent thinking, non-
conformity to ideas/behavior
PUNISHMENTS: peer/group criticism, withdrawal of support/affection, isolation, negative feedback”

Dr. Margaret Singer, of course, is considered the world’s foremost authority on mind-control and cults, and has worked for the CIA in that capacity for years. We see the same punishment/reward system listed here that ‘Mellhedek’ has described in his FAQ as part of his ‘user agreement’.

Dr. Singer outlines a whole gamut of methods that are used together in cult mind-control, including:

altered states of consciousness (trance)
hypnosis

Hypnosis: (see Ericksonian hypnosis)

speaking patterns
guided imagery*
pacing of voice to breathing patterns
parables, stories with imbedded messages
repetition*
boredom*
stop paying attention to distractions, focus inwardly to what's
going on inside you***
the use of one's voice to get people's attention focused”

Although ‘Mellhedek’ isn’t able to use all of these hypnosis techniques, considering the conditions he’s forced to work under with his unsuspecting dupes (online communications), we can see that he’s attempting to apply those that I’ve marked with asterisks. Although rather limiting, they still have their effect, when applied correctly.

Some other pertinent quotes from Dr. Singer’s document describing cult methods, all of which reflect ‘Mellhedek’s’ methods:

rescue them from negative emotion by giving them a new way
to live”

MUST BE A TIGHTLY CONTROLLED SYSTEM OF LOGIC”

No complaints”

Persons in charge must have verbal ways of never losing”

Anyone who questions is made to think there is something inherently wrong with them to even question”

Phobia induction”

She also describes the need for secrecy about the ‘program’:

Persons being Thought Reformed Must be Unaware that they are being moved through a program to make them deployable agents:

To buy more courses, sign up for the duration, ect.

You can't be thought reformed with full capacity, informed
consent

You don't know the agenda of the group at the beginning or
the full content of the ideology”

I have strong suspicions that ‘Mellhedek’ plans to ‘deploy’ whatever followers he can draw in to bring in further members, as we already see going on with his first recruit, Joselle Rozario, who seems to be already well conditioned to his thought-reform and is fully bought in to his ‘program’.

Here’s a very interesting list Dr. Singer provides for thought-reform methods, which parallel what ‘Mellhedek’ is doing:

enlist recruit's cooperation, offer something they want (personal growth, salvation, etc.)

obtain psychological dominance by making the target's continuing relations contingent upon continuing membership

use seduction by developing bonds and encouraging targets to believe the group can provide something

develop dependency by direct social pressure to influence a decision that the group has special power or knowledge or can solve a problem; the people in the group are made to seem interested in what is best for the target -- then they "up the commitment level"

shift the target's social and emotional attachments to individuals who have already accepted high commitment and are conforming to the behavior”

One further quote from Dr. Singer:

CULTIC RELATIONSHIP - those relationships in which a person intentionally induces others to become totally or nearly totally dependent on him/her for almost all major life decisions and inculcates in these followers a belief that he has some special talent, gift or knowledge”

The fact that many TIs are already well prepared for the next stages of mind-control due to the psychological effects of being targeted makes it far easier for someone like ‘Mellhedek’ to come along and direct them into a cult situation.

Now let me quote something now from Fritz Springmeier that applies here:

What they are trying to do is fragment our belief system. They have brought in a lot of foreign belief systems into the USA but you also have all of these New Age gurus popping up and creating their own little New Age groups. In the bigger picture, it's to destroy the fabric of a unified moral response, and a lot of these New Age leaders (eg. Elizabeth Claire Prophet - Church Universal and Triumphant) are mind controlled slaves. Jay Z. Knight, that's who she goes by - the entity she channels - she's a mind control slave. These are New Age leaders and they are gathering flocks… [N]ot only are the leaders under mind control who start the groups, but part of their flocks are mind control victims who are being programmed to join these cults.” (CKLN radio interview, Jan. 4, 1998)

Targeting through gang-stalking and electronic harassment is being utilized to disrupt society, divide it, and produce in targeted individuals a strong sense of insecurity, isolation from their usual support systems, and, for many, encourage a false sense of reality. At the same time, these individuals are forced to turn to alternative sources for these things. This is where the New Age movement comes in, where there are all manner of cultish groups forming, each with their own belief system and code of conduct. The leaders of these groups are almost ALWAYS found to have ties to military/intelligence organs and are working under them, whether knowingly or not. It’s also fairly well established that the CIA applies various levels of mind-control on it’s own agents and outside ‘assets’, claiming that it’s only for maintaining operational secrets. So, often, these cult leaders are themselves being controlled from higher up.

In another informative document I found online a while back, titled, ‘How Does Mind Control Work?’ (sorry, I don’t have a URL or author name), it states:

With coercive persuasion you can change people's attitudes without their knowledge and volition. You can create new "attitudes" where they will do things willingly which they formerly may have detested, things which previously only torture, physical pain, or drugs could have coerced them to do.

The advances in the extreme anxiety and emotional stress production technologies found in coercive persuasion supersede old style coercion that focuses on pain, torture, drugs, or threat in that these older systems do not change attitude so that subjects follow orders "willingly." Coercive persuasion changes both attitude AND behavior, not JUST behavior.”

This document also lists seven tactics that are common coercive techniques in these programs. These include:

TACTIC 1. The individual is prepared for thought reform through increased suggestibility and/or "softening up," specifically through hypnotic or other suggestibility-increasing techniques such as: A. Extended audio, visual, verbal, or tactile fixation drills; B. Excessive exact repetition of routine activities; C. Decreased sleep; D. Nutritional restriction.

TACTIC 2. Using rewards and punishments, efforts are made to establish considerable control over a person's social environment, time, and sources of social support. Social isolation is promoted. Contact with family and friends is abridged, as is contact with persons who do not share group-approved attitudes. Economic and other dependence on the group is fostered.

TACTIC 3. Disconfirming information and nonsupporting opinions are prohibited in group communication. Rules exist about permissible topics to discuss with outsiders. Communication is highly controlled. An "in-group" language is usually constructed.

TACTIC 4. Frequent and intense attempts are made to cause a person to re-evaluate the most central aspects of his or her experience of self and prior conduct in negative ways. Efforts are designed to destabilize and undermine the subject's basic consciousness, reality awareness, world view, emotional control, and defense mechanisms as well as getting them to reinterpret their life's history, and adopt a new version of causality.

TACTIC 5. Intense and frequent attempts are made to undermine a person's confidence in himself and his judgment, creating a sense of powerlessness.

TACTIC 6. Nonphysical punishments are used such as intense humiliation, loss of privilege, social isolation, social status changes, intense guilt, anxiety, manipulation and other techniques for creating strong aversive emotional arousals, etc.

TACTIC 7. Certain secular psychological threats [force] are used or are present: That failure to adopt the approved attitude, belief, or consequent behavior will lead to severe punishment or dire consequence, (e.g. physical or mental illness, the reappearance of a prior physical illness, drug dependence, economic collapse, social failure, divorce, disintegration, failure to find a mate, etc.).”

Although not all of tactics these are immediately apparent in ‘Mellhedek’s’ methodology, the first three, and certain aspects of the fourth and perhaps even the fifth and sixth, and certainly the seventh, definitely are, and we don’t know what he will engage in with his recruits in private. Remember, this is a progressive method of indoctrination and reform. Not all of these tactics will be used in the beginning stages, but they will be probably applied in one manner or another in later stages, once he has established their trust and commitment and is working with them in private.

As I said earlier, TIs are already semi-conditioned, in that they’ve received plenty of pain, torture, and threats, which ultimately changes their behavior and upsets their belief system, preparing them for someone like ‘Mellhedek’ to come along and offer ‘salvation’, in which he incorporates the methods that will finish the intended job of total mind-control. If you listen to Joselle Rozario or read her testimonial for HPSS, you’ll see exactly the sort of talk about ‘Mellhedek’ and his ‘program’ that reflects the attitude of a full-blown mind-controlled cult member, or at least someone who is modeling one as an example to others.

This document goes on to list Robert Jay Lifton’s (another mind-control authority of MKULTRA infamy) eight point model for coercive thought-reform. These may not all be apparent in the case at hand, but will likely be there for those who are drawn deeper into the web that ‘Mellhedek’ spins:

1. ENVIRONMENT CONTROL. Limitation of many/all forms of
communication with those outside the group.

2. MYSTICAL MANIPULATION. The potential convert to the group
becomes convinced of the higher purpose and special calling of the group through a profound encounter/experience, for example, through an alleged miracle or prophetic word of those in the group.

3. DEMAND FOR PURITY. An explicit goal of the group is to bring
about some kind of change, whether it be on a global, social, or
personal level. "Perfection is possible if one stays with the group
and is committed."

4. CULT OF CONFESSION. The unhealthy practice of self
disclosure to members in the group. Often in the context of a
public gathering in the group, admitting past sins and
imperfections, even doubts about the group and critical thoughts
about the integrity of the leaders.

5. SACRED SCIENCE. The group's perspective is absolutely true and completely adequate to explain EVERYTHING. The doctrine is not subject to amendments or question. ABSOLUTE conformity to the doctrine is required.

6. LOADED LANGUAGE. A new vocabulary emerges within the
context of the group. Group members "think" within the very
abstract and narrow parameters of the group's doctrine. The
terminology sufficiently stops members from thinking critically by
reinforcing a "black and white" mentality. Loaded terms and clichés prejudice thinking.

7. DOCTRINE OVER PERSON. Pre-group experience and group
experience are narrowly and decisively interpreted through the
absolute doctrine, even when experience contradicts the doctrine.

8. DISPENSING OF EXISTENCE. Salvation is possible only in the
group. Those who leave the group are doomed.”

Continuing with this document, it goes on to state:

Coercive persuasion programs are effective because individuals experiencing the deliberately planned severe stresses they generate can only reduce the pressures by accepting the system or adopting the behaviors being promulgated by the purveyors of the coercion program. The relationship between the person and the coercive persuasion tactics are DYNAMIC in that while the force of the pressures, rewards, and punishments brought to bear on the person are considerable, they do not lead to a stable, meaningfully SELF-CHOSEN reorganization of beliefs or attitudes. Rather, they lead to a sort of coerced compliance and a situationally required elaborate rationalization, for the new conduct.”

Accepting the terms of ‘Mellhedek’s’ ‘user agreement’ essentially enforces this sort of situation.

To continue further:

Not all tactics used in a coercive persuasion type environment will always be coercive. Some tactics of an innocuous or cloaking nature will be mixed in. Not all individuals exposed to coercive persuasion or thought reform programs are effectively coerced into becoming participants. How individual suggestibility, psychological and physiological strengths, weakness, and differences react with the degree of severity, continuity, and comprehensiveness in which the various tactics and content of a coercive persuasion program are applied, determine the program's effectiveness and/or the degree of severity of damage caused to its victims.”

To summarize, the more suggestible, psychologically/physiologically weak a person is, the easier they are to apply these techniques to. I see ‘Mellhedek’ is being careful to filter out all but these types of people. That he’s attempting to manipulate them psychosomatically through suggestive influence is merely part of the test to see if they are, as he calls them, ‘compatible’ (the term ‘compatible’ is part of his ‘group language’, as described by Dr. Singer).

I have only offered here a very quick and rather hurried overview of points regarding cult mind-control techniques that I see reflected in what ‘Mellhedek’ is attempting. What I have presented on him is already quite a bit for only three days of reviewing his documentation and researching cult techniques, and writing these articles. I had also hoped to focus on hypnosis techniques as they relate to the methods he used in his ‘session’, in order to better support my comments on that ‘session’. However, I’m out of time for the moment, and will have to put that off for later.

Readers need to understand that gang-stalking and electronic harassment obviously have an underlying purpose that goes beyond just the disruption of society, and they’re both tied directly to the mind-control programs that stem from the CIA’s MKULTRA programs. These all lead to the same ultimate ends – the total mind-control of society.

Mind-control is not just about harassment, torture, and experimentation with new technologies. The technologies that are used to harass and torture are just one aspect of it. They are being employed in these capacities to break the wills of those who are targeted, so that they will be prepared for further steps towards total mind-control, using the methods of coercion that are standardized in CIA cult programs. The coercion is achieved surreptitiously and unknowingly through a disruption of belief systems, followed by the subtle remolding of those belief systems to ones that allow more control over the person. Belief systems that are completely out of whack with reality offer the best means of control, because they leave the believer unable to interpret their experiences accurately, leading to grave errors of judgment and perceptions.

What better state to have a person in, to lead them in whatever direction one desires, and for whatever reason one might?

Consider ‘Mellhedek’ in this light. Consider what purpose he might have to draw in the most gullible and desperate TIs, and prepare them for indoctrination into a belief system where his followers begin to act as perps because their perceptions are twisted through his reinterpretation of reality.

In closing, here’s a quick rundown of the basic step-by-step cult tactics that I see ‘Mellhedek’ employing to draw in new cult members and begin to remold their minds:

Gain Trust in Leader
Offer a New Way to Live
Gain Commitment to Leader
Gain Dependence on Leader
Replace Old Support Systems with Leader/Group
Condition Beliefs
Apply Strict Rules
Apply Strict Conformity
Apply Strict Punishment/Reward System
Control Free Speech
Control Behavior
Censor Outside Information
Encourage Adaptation of In-Group Language
Limit Discussion of Group with Outsiders
Control What is Said About Leader/Group
No Allowance for Reality Checks
Develop Hierarchical Control System