-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

Dave Hartley
http://www.asheville-computer.com/dave



The write-up at the URL given below gives info on the 'god'-control and
pulsed microwave subliminal hypnosis methods used. It is missing the
technological mechanical set-up and tracking of the individual. An
exploration of this is up on http://www.geocities.com/wtmick/buckies.htm
which looks at the electro-technological means likely being used, within
existing documented technologies.

Mick

http://www.kimsoft.com/2000/NSA-psy.htm
s------)


NSA's Subliminal Posthypnotic Scripts

Subliminal implanted posthypnotic suggestions and scripts using acoustically
delivered and phonetically accelerated posthypnotic commands without
somnambulistic preparation in the subject for intelligence and
counterintelligence applications by the United States National Security
Agency.


1. INTRODUCTION:

1.1. The following information is an overview of one area of NSA
Intelligence Technology and Applications. A Technology Title, Applications,
Technology
Description, case history summaries and the NSA's Behavioral Modification
Procedure Outline documented for the non-technical person.

2. TECHNOLOGY TITLE:

2.1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using
Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands
without
Somnambulistic Preparation in the Subject for Intelligence and
Counterintelligence Applications by the United States National Security
Agency. "Computer
Simulated Subconscious Speech Language".

3. APPLICATIONS:

3.1. Intelligence:

3.1.1. Used on foreign and domestic diplomats, spies, and citizens to gather
intelligence, steal advanced technology for US Defense applications. Surveys
of citizen's
opinions to government events and propaganda. Heavy survey use during times
of war, economic strife and political elections. War against drugs. Used to
identify
investments that have high yield to support clandestine operations. Used to
direct field agents without the agents having to carry communications
hardware and
encryption devices.

3.2. Counterintelligence:

3.2.1. Used on foreign and domestic diplomats, spies, and citizens to
identify intelligence operations; scope, participants, communication
methods, and weaknesses
in individuals, systems, equipment, or signals that can be exploited.
Additional applications include misinformation dissemination, confusing and
confounding leaders
during critical decision moments, distorting significance of various facts
to sway decisions and actions in US favor, behavioral modification of
foreign spies to betray
their loyalties, self initiated executions (suicides).

3.3. Behavior Modification and Accelerated Resocialization:

3.3.1. This technology is used to develop and control spies, political
candidates, and other public figures through psychological intimidation,
fear and extortion.

3.3.2. The NSA uses this technology to resocialize (brainwash) the US
civilian voting population into "Giving their lives to Christ" (giving up
their personal will and
civil rights to the NSA). Each subject is required to maintain a "Personal
Relationship with Jesus Christ" (following the precepts of the Bible and
doing what is
ordered by the NSA). The technology is also used to monitor and optimize NSA
employee performance and loyalty.

4. DEFINITIONS AND ACRONYMS:

4.1. Age Regression: The act of bringing back past memories in a subject
though the use of hypnosis. The memories can be very vivid and real in the
mind of the
subject.

4.2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic
suggestion.

4.3. NSA: United States National Security Agency, Fort Mead, Maryland.

4.4. ODO: On-Duty Officer, or officer-on-duty.

4.5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term
"Command" is more commonly used when the hypnosis is forcibly given to the
subject
and when the subject's will has been broken down though the use of REM Sleep
Deprivation and Suggestibility Index increasing drugs like CNS and
Cardiovascular
Stimulants. The exposure to extreme REM deprivation and select chemical
stimulants cause the subject to have no ability to resist the "Suggestion"
any longer
thereby making it a "Command".

4.6. Posthypnotic Suggestion: A subconscious suggestion or command resident
and potentially active in the subject following a hypnotic trance or period
of direct
access to the subconscious mind.

4.7. Posthypnotic Suggestibility Index: An index or rating of a subject's
susceptibility and sensitivity to hypnosis.

4.8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A
subject deprived from REM Sleep has multiple symptoms i.e. reduced protein
synthesis, black circles around eyes, loss of short term memory, confusion,
impulsiveness, anger, frustration, diminished self-esteem, increased
suggestibility, reduced
productivity, apathy, and depression. Long term REM Deprivation results in
death.

4.9. Script: A carefully constructed series of words arranged in the form of
a posthypnotic suggestion. The script will generally consist of four
separate parts;

     (1) an identifier (subject's name, description, or other identifying
factor),
     (2) trigger activation condition or conditions (when, what or how the
suggestion will trigger),
     (3) the content (what the trigger will precipitate in the perception of
the subject),
     (4) and a duration (when or under what conditions will it stop or
finish).

Additional reinforcing scripts are usually added to "strengthen" or
reinforce the central posthypnotic command.

4.10. Somnambulatory State: An abnormal condition of sleep in which motor
acts (like walking, running) are performed. This state is typically achieved
and a
prerequisite to traditional hypnosis.

4.11. Subliminal Implant: A posthypnotic suggestion successfully delivered
to the subject's subconscious mind.

4.12. Transceivers (NSA): Nearly microscopic electronic surveillance devices
that collect and transmit encrypted audio, color video, and location
coordinates
collected at the subject site to NSA Satellites that in turn forward it to
NSA central intelligence operations. The devices also receive encrypted
audio scripts from
NSA central intelligence operations through the satellites and deliver it to
the subject's site in the form of a subliminal posthypnotic suggestion.
These devices are
approximately the size of the head of a straight pin and can be concealed in
houses, offices, automobiles, planes, and street corners.

5. TECHNOLOGY OVERVIEW:

5.1. In addition to the ability to see and hear what is going on inside
people's homes, vehicles, and businesses through the use of nearly
microscopic digital
surveillance technology, the NSA is able to interrogate and influence a
person subconsciously without the knowledge or consent of the subject.

5.2. Thought Labels (Response Labels):

5.2.1. Have you ever watched a baseball game? Did you see the catcher and
pitcher communicate using a series of itches, baseball cap rearrangement,
and clothing
tugs? An elaboration of this communication technique is used by the NSA to
detect a fleeting thought in a subject or "read minds" so to speak.

5.2.2. Lets discuss how an itch, clothing tug or even an innocent sneeze can
be used to label a thought. For simplicity, we will call itches, clothing
tugs, sneezes,
coughs, or involuntary muscle spasms that are performed during subconscious
interrogation "thought labels".

5.3. Post-Hypnotic Delivery Method:

5.3.1. The NSA combines hypnosis and thought labels to interrogate people
without the subject being aware of it. "How can hypnosis be used?" you might
ask. The
subconscious mind operates at a speed of about 1200 to 1400 words per
minute. This is many times faster than the conscious mind that operates at
250 to 450
WPM (words per minute). The posthypnotic script can be spoken at fast
conversational speed approximately 250 WPM and a recorder or a computer
speeds up
the message up to approximately 1200 to 1400 WPM. Remember what happens when
you play a 33 rpm record at 78 rpm?

The resulting voice sound like the old American cartoon characters the
Chipmunks. This is only slightly past doubling (2X) the delivery speed. At
speeds as high as
1400 WPM, the voices would sound like a high pitched chattering whine.
Remember when the words "Drink Coca Cola" were written on one frame of a
movie in a
theatre back in the 1960s?

The frame rate in movies is played at 30 frames/second. At 1/30th of a
second the conscious mind could not recognize the message but the
subconscious mind could
read it clearly. The audience increased their Coca-Cola consumption by 65%
that night resulting in the Federal Government prohibiting subliminal
advertising. The
following probable reasons for not achieving a higher percentage of
subliminal delivery effectiveness (> 65%) are described as follows. In that
1/30th of a second
some people were blinking, some people were looking around the theatre,
looking at spouses, children, candy, popcorn, etc. or they had sufficiently
poor eyesight
that they could watch the movie but could not distinguish the small writing
clearly.

5.3.2. In the early years of this technology, the NSA originally recorded a
spoken posthypnotic suggestion message into a tape deck and sped it up by
speeding up
the tape. This process was labor intensive, required each officer to have
excellent diction and mastery of the language and dialect required, and was
of poor quality
due to background noise and the delay in timing during recording and
processing.

It also required extensive training to assure that each officer spoke at the
same rate of speed so that the resulting "sped-up" script was delivered at
the correct speed.
Now computers are used to append digitized samples of optimized, ideal
phonemes together to form words and the words are sped-up to the correct
delivery
speed. Where dialects are present, a different set of base phonemes is used.

5.3.3. Currently, to optimize efficiency and accommodate the variety of
languages on the planet, phonetic elements from each language and distinct
dialect are
sampled, digitally edited to optimize them, and appended during delivery to
form words and words arranged to make sentences in the from of scripts that
resemble
hypnotic suggestions. The empty space between words is minimized and pitch
rise is compressed and filtered. Repetitive sine waves are also removed from
the
phonetic element's acoustic wave train thus reducing the actual number of
sine waves making up a word by 50% or more.

This reduces the actual length of the time it takes the phoneme to be
delivered prior to accelerating (speeding-up) the delivery (like fast
forward). This helps the
message to be played at higher speeds and reduces the subject's ability to
recognize it as accelerated speech. The technique of using optimized
digitally sampled and
edited phonemes appended together to for words and then sentences structured
as hypnotic suggestions can be termed "computer simulated subconscious
speech
language".

5.3.4. The subconscious mind is also very sensitive. It can hear things that
the conscious mind ignores. If you have watched television, you have
probably noticed
that there are many "subliminal tapes" on the market to program your
subconscious mind. These tapes have their "messages" recorded/hidden in the
sounds of ocean
waves, music, or other sounds but they are not sped-up to subconscious
delivery speeds and are therefore not very effective.

The subconscious mind can hear and discern the message even when there is
background noise like waves, cars, planes, or even when someone else is
speaking to
you in normal conversation. Your conscious mind won't hear anything unless
it is very quite in the house. If you are very attentive you may hear what
sounds like a
low-pitched tape on fast forward, and played at low volume. This is the
sound of the NSA's high-speed audio subliminal message.

5.3.5. This modification of the phonetic elements, played at low volume,
combined with the environmental background noise makes it very difficult for
a subject to
record the NSA message. Even if the subject were to effectively record the
message, it is very difficult to filter (separate) the NSA's message from
background
noise.

Then, reconstructing the missing sine waves from the acoustic wave train and
slowing the message down to discern the actual content of the "posthypnotic"
script
with the conscious mind would be nearly impossible for the average citizen.
To briefly summarize, the subject would have no chance in analyzing a NSA
message
without the following items:

5.3.5.1. Professional state-of-the-art technology recording equipment.

5.3.5.2. Digital acoustic wave editing equipment.

5.3.5.3. Advanced engineering knowledge of acoustic wave science.

5.3.5.4. Phonetics and linguistics expertise.

5.3.5.5. Hypnosis theory and scripting. 5.3.5.6. Ideal environmental
conditions for recording.

5.3.5.7. NSA ignorance of the subject's intent and ability to capture a
message.

5.3.6. This technology is the perfect intelligence tool. It is nearly
impossible to detect or measure, difficult to trace back to the NSA. The
symptoms that the NSA
can "program" or inflict into the subject can cause fear that they might be
thought to be insane if they were to report the NSA activities.

The subject does not know the source of the technology or the technology
itself, the subject has no proof or evidence, only their perception,
suffering, and isolation.
Additionally, potential recourses that are available to the subject can be
interrogated out and preventative actions taken by the NSA to further
isolate or disable the
subject.

5.4. Using the Post-Hypnotic Delivery Method with Thought Labels:

5.4.1. The NSA technique is simple; they transmit their human programming
message through the audio-visual electronic surveillance equipment installed
in your
home, car, or office to you. The subliminal message delivered to you could
be "Mr. Jones, imagine that the IRS were auditing your taxes. Think back to
a time you
have cheated on your taxes and that you are worried that the IRS might find
out in an audit.

If you have never cheated on your taxes and have nothing to fear you will
feel an itch on your right-hand ear lobe that will go away when you scratch
it. If you can be
caught by an IRS audit, you will feel an itch in the left nostril of your
nose that will disappear after you itch it twice." From your perspective,
you have just had a
fleeting thought about your past tax returns and had an innocent itch
(thought label).

To the NSA Officer On Duty (ODO), you have just communicated to him whether
you have ever: 1) cheated on your taxes, and: 2) If the IRS could catch you
in an
audit.

5.4.2. This is a very oversimplified example of a typical NSA interrogation.
Actual interrogation messages may consist of several hundred words and be
very
complex and sophisticated. Most messages consist of several dozen words. Yes
indeed, the NSA has exceeded the wildest expectations of the book "1984". As
you can imagine, the spy world has reached a new plateau that directly
affects every person in the USA and abroad. This electronic surveillance
system extends
down through Mexico, Central America, and deep into populated regions of
South America. It also has been installed in Australia, Africa, and the
free-world
countries in Europe.

5.4.3. The NSA's goal is to have the whole world under its electronic eye by
the year 2000. They are almost there now, but are having difficulties with
high-tech
countries that have the counterintelligence resources to identify the high
frequency bursts of microwave transmission from the transceivers. The system
also has the
ability to take a "voice print" from any person and place it on file. This
file can be used to locate the subject later by comparing it to real-time
surveillance audio
samples received from the field as long as the subject is speaking in close
proximity to a transceiver.

If the person is aware that the NSA has this capability and remains silent,
the NSA can transmit a periodic worldwide subliminal message that addresses
the person
by name and causes them to dream and talk in their sleep. After the person
talks, the voiceprint would be eventually identified and the person's
location can be
identified nearly anywhere in the world. Yes, it is a small world, and
getting smaller all the time.

5.4.4. This technology was originally conceived under CIA studies and
fascination with the power of hypnosis in the late 1950's and perfected by
very early 1960s
and implemented with unlimitedresources to all areas of vital national
security interest first. Originally, after noting the behavioral effects in
visual subliminal effects like
the highly publicized event where stating "Drink Coca Cola" on a single
movie frame "delivered a higher rates of speed than normal movie viewing
raised the obvious
question, "Does the human hearing work as good as eyesight accepting
subliminal messages?"

Preliminary theory work was transferred to Fort Mead NSA who had expertise
in characterizing language in analog domains where a sampled phoneme could
be
edited (shortened by removing excess sine waveforms from the "acoustic
wavetrain") and electronically reconstructed back into shortened words of
language. Some
of the early experiments included "Remote Viewing at NSA where the Viewer
would relax, open their mind and explain the clarity of images that were
described by
the NSA using this technology.

These early experiments allowed the NSA to refine the specifications of the
"Computer Simulated Subconscious Speech Language" and the scripting formats
to
maximize the ability to deliver an accurate "vision or picture" into the
subject. Pictures already seen by the subject could simply be recalled using
"Age regression"
script variations.

6. OTHER REFERENCE MATERIAL:

6.1. Please refer to the book "Inside America's Most Secret Agency, The
Puzzle Palace" by James Bamford, Published by Houghton Mifflin Company,
1982. This
book contains extensive information and references on the NSA's history and
the NSA's first surveillance system that originally only eavesdropped on
telephones
and is now expanded to audio-visual.

7. NSA CASE HISTORY EXAMPLE SUMMARIES:

7.1. NSA Self-Initiated Execution (Suicide): 7.1.1. Bamford's "The Puzzle
Palace" references one of the NSA's first self-initiated execution (suicide)
with this
"Thought Control" technology they developed. The NSA employee reportedly
ranoff NSA property saying demons were in his mind and he killed himself.

7.2. NSA Initiated Execution to Cover-up in the News: 7.2.1. A University of
California at Berkley student that went into a bar on or around November 27,
1990
took hostages and insisted to the police that the CIA Director talk with him
so that he could get relief from the suffering. The young man had sent
letters to the
president and the CIA but the requests had fallen on deaf ears.

After the young man panicked and shot a customer in the bar, a SWAT team
fatally shot him, the San Jose police found copies of the letters written to
the President
referring to people that could "read minds" and that he had learned how they
do it. The NSA had been unsuccessfully brainwashing him and had no
alternative but to
terminate him to assure their security. It is interesting that what was
originally broadcast on the news "The gunman was demanding to talk with the
Director of the
CIA" etc. disappeared quickly (suppressed?) from later news accounts.

7.3. NSA Initiated Execution to Cover-up in Music: 7.3.1. Curt Cobain of the
musical group "Nirvana" was another victim of NSA brainwashing and was
terminated by NSA. Cobain had started writing clues to the NSA activities
into his music to communicate it to his music followers. He referred in
music to the NSA
as the "Friends inside his head". Once the NSA puts on the highest level of
brainwashing pain, the subject expires quickly. Cobain used heroin to numb
and
otherwise slow the effect of the brainwashing.

7.4. NSA Initiated Executions in Overseas Defense Project:

7.4.1. Some years back several employees of the United Kingdom's Government
working on a top secret Radar Project committed suicide with no apparent
penetration by a hostile government, drug abuse or any other commonality
other than working in a secured government project. They were not "Staged"
suicides
(murders) because some of them happened behind doors that could not be
opened from the outside. These men were subjected to the same technology and
processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and
thousands of others have experienced.

7.5. Musical references of NSA Technology:

7.5.1. Talking Heads; a music group popular in the eighties, wrote a song
explaining the scientific process of the NSA's brainwashing technology in a
song called
"Wild Wild Life". The song gave an example of what the audible transmission
sounded like at the end of the song (like a tape on fast forward).

They mentioned in the song that "They (NSA) talk so fast..." and that the
musical group had spent "All their time and money..." unsuccessfully trying
to find a place
that the NSA would not be able to harass them. The Talking Heads exposed the
technology, gave an example of what it sounds like, scenarios of how the NSA
might select you for the brainwashing, and the scope of the electronic
surveillance system.

7.6. NSA Counterintelligence Experiments:

7.6.1. Many experiments were performed by the NSA to determine the
conditions and procedures that would be required to turn spies that were
trusted by US
enemies into assassins that we could invisibly manage. In early experiments,
the resulting NSA experimental subjects would get extensive attention in the
news
because of the horror and unusual nature of the atrocity.

7.6.2. One example that comes to mind happened several years ago and created
much news. A man became obsessed with his son, poured gasoline on him and
ignited it. He had planned to do the same to himself but his desire for
survival overpowered the NSA's behavioral conditioning. After he was
imprisoned, he spoke
about how all of a sudden his mind became clear and he couldn't figure out
how he could do this crime.

The hypnosis was simply removed and the subject was allowed to sleep so that
experts studying the file would not find out anything if the subject would
have been
subjected to traditional hypnotherapy or other psychoanalytical techniques.
Another successful counterintelligence experiment completed with no
liability or
traceability to the NSA.

7.6.3. Perhaps ten years ago I read of several elderly people died of sleep
deprivation in Florida. The doctors tried everything they could do but could
not stop the
sleep deprivation that resulted in a 100% effective termination yield. The
NSA had developed the right combination of delivered anxiety scripts
combined with
muscular tension and delivery schedules optimized according to decreasing
post hypnotic durability over time as the subject's health degraded.

7.6.4. David Koresh of the Branch Davidians spent many hours talking with
FBI negotiators about God and the Bible and finally waited for "God" to tell
him what to
do in the final hours of the siege. The compound probably had numbers of
Personal Journals (required for subjects by the NSA during brainwashing)
that could lead
to questions about how this cult came to this level. Additionally, just like
other loose ends the NSA had to secure, "God spoke to them and said to
commit suicide"
and they did securing another one of the NSA's great experiments in mind
control and social pathology.

7.6.5. A friend of mine, David Sautter and I worked at Singer, Kearfott
Division, producing government weapons where we worked under a multi-tier
security
system; Company Security, FBI, DIA, and at the top of the ladder watching
the watchers; the NSA. I discussed the NSA's technology with Dave and a few
months
later, I heard he had committed suicide inside of a locked room. This theme
should familiar by now and the details of the case will be destroyed or
rewritten by NSA
influences to preserve national security.

7.7. The cases of NSA activities go on and on. With access to the FBI's
Crime Information Center (CIC), we could find several thousand files having
the
characteristic patterns where the NSA had experimented on the individuals
with their "Thought Control" technology.

7.8. Currently, the NSA has many subjects in the field (our society) that
need only a series of "triggers" (carefully constructed posthypnotic
scripts) to send them
over the edge and on a mission to kill. The NSA calls them "Shooters on a
Shelf". A recent example was Russell Eugene Weston, Jr. that went on a
shooting spree
at the Capitol around July 26, 1998. He was diagnosed with schizophrenia,
had delusions that he had an affiliation with the CIA or FBI and thought a
radio-tracking
device was planted in his tooth.

He was a product of NSA brainwashing. He did not have the ability to
recognize the advanced technology even though he knew that "someone" (CIA,
FBI, etc.)
was communicating with him and that this communication ability spanned
across the USA leading him to believe that he had a tracking device planted
on him.
Because of the real effects of the NSA hypnosis treatments, he therefore
reasoned that the schizophrenia medication would not help and so he quit
taking it. This was
a man desperately trying to alleviate the suffering the NSA inflicted on
him.

7.9. Through the years, I have met thousands of people that have been
brainwashed into Christianity to a level where God tells them what to do in
their minds
(described as a gentle voice by victims) and they mindlessly obey. Yes, they
have "Friends inside their heads" also. It appears the Biblical Anti-Christ
in the Book of
Revelations has arrived and is convincing many subjects that Jesus is back
on earth and directing them.

8. NSA BEHAVIORAL MODIFICATION PROCEDURE:

8.1. The following procedural outline documents typical techniques,
processes, explanations, and definitions of the National Security Agency's
Behavioral
Modification Procedure using Subliminal Implanted Posthypnotic Suggestions
through acoustically delivered phonetically edited language elements
combined into
scripts without somnambulistic preparation in the subject.

8.2. In simpler terms, the subject is unknowingly given hypnosis while the
subject is completely awake and is tortured and punished with this hypnosis
into a
predetermined behavior by the National Security Agency. The behavior is
usually extremely religious, is called "reborn" by the church, with the
subject's life-long goal
of "a personal relationship with Jesus Christ".

8.2.1. ABSTRACT, Behavioral Modification:

8.2.1.1. The NSA's behavioral modification process starts with
identification and qualification of the subject. The NSA used to choose
subjects based on the
subject's net present value to the agency in public visibility, financial
resources, political clout, or other intelligence and counter-intelligence
reasons. Additional
considerations are given to minimizing security risks of exposure, the
subject's posthypnotic suggestibility index, the subject's intelligence and
reasoning ability, moral
and superstitious beliefs, and the subject's social status and the weakness
of the subject's primary support groups (family).

Now a recent report referenced in the March 26th Business section of the
Orange County Register from the National Sleep Foundation reports that 40%
of
Americans are experiencing sleeping problems. This news could indicate that
the NSA is broadening its influence to the greater public. As explained
below in this
document, the NSA always starts its behavioral modification process with REM
Deprivation.

8.2.1.2. After selection, the subject is subjected to long periods of REM
Sleep Deprivation and reinforced torturing posthypnotic suggestions that
will breakdown
the subject's will, confidence, self-reliance, and moral values. Meanwhile,
the subject is increasingly isolated from their familiar and trusted peer
groups causing the
subject to experience depression, apathy, and ultimately social and
financial failure.

8.2.1.3. Typical post-hypnotic induced delusions reported by subjects are
tingling in various areas of the body, which are thought to be resulting
from microwave
beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights,
etc. Beliefs that the subject's neighbors are conspiring against them, or
that the subject is
being followed. Sometimes subjects believe that the various perceptions,
feelings and experiences are the result of "Implants" in their body.

It is important for the subjects to understand that the NSA controls this
technology from nuclear hardened underground shelters and the neighbors next
door have
nothing to do with the subject's experiences. Nobody has the time or
inclination to follow a subject around with a microwave gun to tickle
various parts of the body.

We are saturated with microwaves all the time from television stations,
communication satellites, etc and yet we do not have any symptoms because
microwaves do
not have the ability to trigger localized synaptic responses in our brains.
Furthermore, when the subject is in a room surrounded by several people, and
the subject is
the only one experiencing the "thoughts", tingling feelings, etc., then
obviously a delivery method is being employed that affects only the subject;
high-speed acoustic
delivered hypnosis.

8.2.1.4. After a while, the subject has an emotional breakdown and a new
support group is built around the subject. The new support group is
typically a church
with doctrines centered in the Bible but the NSA also uses cults and other
social groups. The NSA prefers Christian churches because the doctrines
allow "God or
Jesus to speak directly to the subject" and the negative reinforcement can
be attributed with Satan and the positive rewards can be considered to be
blessings from
God thereby masking the NSA's technology and processes.

When the NSA uses other relationships without in which the subject
experiences a religious awakening and "Gives their Life to Christ" and the
NSA achieves total
control of the subject. 8.2.1.5. The subject is slowly released from the
damaging uncomfortable hypnosis and it is replaced with positive rewarding
hypnosis as "God
and Jesus works in their life". Soon, the subject has complete loyalty to
Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).

8.2.1.6. The subject is required to give daily status reports in the form of
prayers in the privacy of their home, office, or car where the NSA's
electronic surveillance
system captures and sorts the prayers by "Keywords". The NSA then delivers
additional hypnosis in the form of punishments or rewards or directs the
subject
accordingly to "God's will". If the subject resist's the NSA's instructions,
additional punishments are inflicted on the subject.

8.2.1.7. The subject is institutionalized in this system where any
nonconformances committed by the subject are watched, critiqued, and
reported on through prayer
by other "Christians" to the NSA. Thus, the new church peer group acts as a
behavioral reinforcing mechanism that will bring any of the subject's
problems to the
NSA as they have been trained themselves (this is similar to the Nazi
Gestapo of World War 2 and other communist approaches).

8.2.1.8. A subject that has successfully completed the NSA's behavioral
modification program lives out the rest of their mediocre life in service to
Jesus (NSA) and
never causes any waves in the church or news media for fear of reprisal from
the NSA. The subject's lives are relatively unproductive because their focus
is on their
"Life after death" and not what they accomplish while they are alive. They
avoid "worldly activities", and usually are confused and disjointed in
rational thoughts and
concepts. For instance, they don't believe in anything that is not in the
Bible, i.e. dinosaurs, evolution, space travel, even though they ride on
airplanes and watch
television both of which are not referenced in the Bible.

8.3. BEHAVIORAL MODIFICATION PROCESS:

8.3.1. Triggering Techniques:

8.3.1.1. The NSA minimizes security risks by using multiple posthypnotic
delivery techniques for applying negative reinforcement into the subject.
The patterns fall
into three major categories; real-time deliveries, prescheduled deliveries
via a preprogrammed computer, and posthypnotic or "conditional" deliveries.
The NSA
does not use real-time transmitted posthypnotic commands exclusively because
the subject might recognize when the NSA was not actively watching causing a
security concern and it would be cost prohibitive to baby-sit the subject 24
hours a day.

8.3.1.2. Behavioral modification generally occurs fastest when using
negative reinforcement continuously. It is not practical or economical to
watch a subject
continuously to apply real time deliveries. Additionally, using all three
script delivery patterns confuses the subject, causes the subject to believe
they are always being
watched, and maximizes behavioral change over time though continuous
pressure.

8.3.2. Real-Time Subconscious Implant Delivery:

8.3.2.1. Real-time means that the NSA ODO is transmitting the posthypnotic
command script to the subject and observing the subject's response. This
technique is
required for subliminal interrogations. All NSA standard posthypnotic
command scripts can be delivered real-time. This form of delivery can
precipitate the
perception of a "voice" heard in the mind of a subject to give them
information (true or false) or orders depending on the purpose of the NSA's
activities.

8.3.3. Prescheduled Subconscious Implant Delivery:

8.3.3.1. The NSA central switching computer can transmit a script to a
specified subject at a pre-specified time. The transmitted script's
transmission range can be
limited to a single building, a city, or a large geographical area (i.e.
North America or Europe). By having prescheduled scripts, the subject has
seemingly randomly
occurring thoughts and feelings that can't be associated with a commonly
recurring situation like event-triggered scripts precipitate.

8.3.4. Event-Triggered (conditional) Implant Delivery:

8.3.4.1. Posthypnotic subconscious implants that are triggered (activated)
with an event, thought, or code word (event-triggered or conditional) are
strongly
experienced by the subject and are powerful tools for reinforcing a
predetermined desired behavior and inflicting delusions.

8.3.4.2. This type of posthypnotic commands are the ones most commonly used
by hypnotherapists to help people quit smoking, study better, or in general,
change
behavior (behavioral modification). There is extensive information on the
Internet and college libraries about this form of posthypnotic command
delivery and how to
"script" and use them.

8.3.4.3. The NSA can reinforce a predetermined desired behavior by
associating a subconscious implant (negative or positive reinforcement) with
an event. An
example is that when the NSA want's to isolate the subject from the company
of a specific person place or thing, the subject will be implanted with a
feeling of
increased anxiety, hostility, tension, simple discomfort, or a feeling of a
lack of peace. When the subject leaves the person, place, or thing, another
posthypnotic
implant is triggered that rewards the subject's behavior with a feeling of
relief from the anxiety, hostility, tension, discomfort, and peace is
restored in the subject's
mind.

Example: This script will always cause a girl or boy not to sleep with the
opposite sex: "You will feel very tense and not be able to relax if you
kiss, sleep with, or
stay long at your (boy or girl) friend's house and you will feel a deep
peace when you leave their house to go back home". These types of scripts
left unmanaged and
not removed can cause great harm as the subject develops and social
conditions and behaviors change over time.

8.3.4.4. It should be noted that the NSA precisely tailors the type of
negative and/or positive reinforcement, the degree of the reinforcement, the
duration of the
reinforcing effect and the conditions of the trigger. This posthypnotic
event-triggered reinforcement can be initiated gradually and can remain so
subtle that the subject
believes that the discomfort is naturally occurring and that it is the
subject's decision uninfluenced by anyone else that the subject should avoid
the person, place or
thing.

8.3.4.5. This subconscious implant can be combined with other implants like
a posthypnotic-triggered thought to enhance the subject's decision toward
the situation.
For example the subject can be subconsciously implanted with a command to be
very sensitive to the changes in their feelings and to feel great about
making strong
decisions to take charge of their lives. This can be reinforced with another
posthypnotic suggestion to avoid all the situations that cause the subject
discomfort and
that each time the subject commits himself/herself to removing a situation
of this kind in their lives, they will feel an increasing control over their
lives. Note that as the
subject perceives an increasing control over their lives they are actually
losing control to the NSA proportionately. Numerous other examples exist and
it is beyond
the scope of this document to document every possibility.

8.3.5. Stage 1 (Prescreen Evaluation):

8.3.5.1. The subject's Posthypnotic Suggestibility Index is determined by a
series of simple tests. Hypnoamnesia is applied to the subject for the name
of an object
or individual and the subject's speed is timed to determine how quickly they
can overcome or not overcome the posthypnotic suggestion "You will not be
able to
remember the name of "____" no matter how hard you try.

Other posthypnotic suggestions can be used to create fear or discomfort in
the subject that can be remedied by flight or movement. The subject must
overcome a
posthypnotic suggestion that they cannot move no matter how hard they try.
In summary, a posthypnotic suggestion is given to the subject and the
subject's ability to
overcome it is evaluated.

8.3.5.2. A full study of the subject's religious, superstitions, fears, and
insecurities is made through standard subliminal interrogation techniques
and behavioral
observation.

8.3.5.3. Interrogation scenarios are presented to the subject using standard
subliminal interrogation techniques and somnambulistic interrogation
techniques. The
standard two types of scenarios are "Open-ended Questions" (similar to
multiple choice with response labels pre-assigned to each choice) or "Reject
if
Disagreeable" (negative response label if the subject disagrees). More
advanced techniques of interrogation scenarios are used as required or as
determined by the
experience of the ODO.

8.3.5.4. Real-time observation, standard subliminal interrogation techniques
and somnambulistic interrogation techniques are used to determine the
subject's overall
social status, abilities, attitudes, and communication skills with primary
support groups and friends. 8.3.5.5. Scientific understanding and practical
applications
experience in the fields of psychology, hypnosis, pharmacology, and problem
analysis are considered risks in the subject that may complicate or inhibit
subsequent
behavioral modification processes. Once the subject identifies the
technology used it is nearly impossible to contain the potential security
breach without terminating
the subject. Most NSA initiated executions (suicides) are the result of the
subject identifying the technology used or carelessness on the part of the
ODO managing
the file.

8.3.5.6. The NSA technology affords powerful control over the subject, the
subject's environment, and the subject's ability to plan and implement a
disclosure to
appropriate Government Agencies. When the subject finally does achieve a
disclosure, the subject's physical and mental condition is depleted. The
subject's ability to
communicate concisely has been arrested, and the subject has already been
set up and dishonored in the sight of local and federal law enforcement
agencies to
assure the subject's testimony is questionable and unsubstantiated. Where
the NSA feels that these steps cannot be achieved in medium risk subjects,
the NSA will
not recruit the subject into the behavioral modification process.

8.3.6. Stage 2 (Standard Process): 8.3.6.1. This stage is where most
subjects are behaviorally modified to serve and follow "God" (AKA NSA
management of the
subject's civil rights). If the subject accepts religion and direction at
this stage the NSA reinforces the subject's relationship with Jesus and
closes the file. This
shortened program receives the maximum return for the NSA for the least
investment and minimizes the security risk. It also causes the least amount
of damage and
institutionalization in the subject. 8.3.6.2. Coincidence:

8.3.6.2.1. Coincidence is used to create the perception in the subject that
supernatural events are beginning in the subject's life. A combination of
posthypnotic
commands and pre-information awarded to the subject prior to an upcoming
experience that the NSA intelligence system has discovered gives the subject
a feeling
that "God" or some other supernatural being is taken interest in their life.

8.3.6.2.2. The following is one typical technique used by the NSA. NSA
Intelligence gathers information regarding the topic of the sermon in the
subject's church.
This information is gathered through electronic surveillance equipment
installed in the church. The NSA then implants a posthypnotic command that
triggers the
subject's mind into concern and contemplation about the sermon's topic prior
to going to church. When the subject hears the sermon, the sermon seems to
be
speaking directly to the subject that adds to God's mysterious and
unexplainable ability to address the innermost concerns of the subject,
especially when the subject
has not shared those concerns with any other human being.

8.3.6.2.3. Another typical method used by NSA concerns tragic events
occurring to loved ones. NSA Intelligence receives a local broadcast or
preliminary
information through electronic surveillance that a subject's relative has
been injured or killed. The subject is given a posthypnotic suggestion that
a feeling of dread or
loss is welling up inside them and they are directed to think of that
particular loved one. When they are finally notified through official
channels, the subject believes
that they have special powers, insights, or communications from God, aliens,
or other entities.

8.3.6.3. REM Sleep Deprivation:

8.3.6.3.1. The Rapid Eye Movement (REM) stage of sleep is controlled and
usually limited to one to two cycles per night resulting in micro-sleeps
during the day.
REM deprivation inhibits short-term memory, concentration, tactile
abilities, verbal articulation, reasoning, and self will. Protein synthesis
is inhibited and thereby
reduces the subject's ability to heal after physical damage or after periods
of extensive exercise. The result is that the subject's general health
degrades as does social
bonds and work/school performance.

8.3.6.3.2. The NSA performs control of REM Sleep through various methods.
Posthypnotic implants can be implanted that place a subject in a light sleep
(posthypnotic trance) with various combinations of muscular tension and
computer cycling implant deliveries (to be discussed later).

8.3.6.3.3. Subjects typically complain of no sleep, restless sleep, waking
up every hour on the hour, staying awake until the hour they have to get up,
waking up an
hour after they retire and not returning to sleep, and typically cannot
recall any dreams. Additionally, they will complain of repeating torturing
thoughts, racing
thoughts, and facial itching and numbness. Daily fatigue, poor recall of
names, and caffeine consumption is typical.

8.3.6.3.4. Dark rings' surrounding the eyes is evident and the darkened area
around the eyes can be reported as sore or tender by the subject. The subtle
perceptual
impairing effects of REM deprivation make it more difficult for the subject
to identify the REM Deprivation problem. When the REM depravation onslaught
is
gradual and accompanied by a posthypnotic command that the subject "will
feel energetic and rested", the subject will not recognize the REM
Deprivation.
Additional posthypnotic commands can be implanted that will make it
difficult for the subject to "see or perceive" the rings surrounding their
eyes. I have seen many
subjects with very dark eye rings and the subjects could not recognize them
at all.

8.3.6.4. Shame Factor Enhancement:

8.3.6.4.1. Various posthypnotic suggestions are implanted in the subject
after a week or so long period of REM deprivation. The content of the
posthypnotic scripts
is constructed to cause the subject to perform embarrassing and otherwise
shameful acts (usually sexual but always anti-social). These shameful
behaviors are used
by the NSA later to shame the person into a lower self esteem, reduced
confidence in their own self discipline, a need for forgiveness from God.
These
embarrassments provide a means to Blackmail or discredit the subject if the
NSA is detected and otherwise threatened by the subject.

8.3.6.4.2. The NSA will always use another law enforcement agency to
document the behavioral discrepancy to retain anonymity. The NSA has been
known to
help subjects avoid prosecution to gain loyalty or create an adversarial
relationship between the acting agency and the subject (another intimidation
factor) even
though the NSA was responsible for creating the behavioral problem in the
subject's life.

8.3.6.5. Religious Relevance and Convictions:

8.3.6.5.1. The NSA typically implants posthypnotic suggestions that are
clearly referenced in the Bible. The subject may be punished (through
negative
reinforcement) by anything that is referenced in the Bible to substantiate
the validity of the "Word of God". When the NSA does not follow the standard
Biblical
references, most subjects fail to recognize the contradictions out of
ignorance or an inability to rationalize, or, they find other ways to
justify the events to receive
peace from God (NSA). This component of the NSA process is to provide the
subject with an increased sense of fear and intimidation resulting from
God's
presence and force. "Thou shall not disobey God".

8.3.6.6. Paranoia:

8.3.6.6.1. Paranoia is a powerful tool used by the NSA. It provides a means
to develop the subject's distrust of other people including the subject's
primary group
that could provide positive support during this time of distress in the
subject's life. Paranoia is often recognized and discounted as a character
fault by most peoples in
American society and therefore discredits the subject's testimony even
further. Uninformed, but well wishing people including friends, may
recommend to the subject
to pursue counseling. This negative feedback can make the subject fear that
people will believe the subject is crazy.

8.3.6.6.2. When the subject seeks professional counseling, the result will
be a misdiagnosis with an expensive, inappropriate and ineffective
treatment. The observed
symptoms result from simply hypnosis, not biological, chemical, or
environmental stresses. A misdiagnosis strongly motivates the subject not to
communicate their
experiences to others to avoid social disgrace of a "schizophrenia" label
and additional financial burden. This isolation of the subject and their
reluctance to
communicate their experience to others reduces NSA security risk. The NSA
cannot allow the subject to share information with other subjects that have
already
experienced the program and thereby starting a pool of information that
could be compiled and used to expose the NSA system.

8.3.6.6.3. The subject is led to believe that the subject's neighbors, work
associates and/or family are conspiring against the subject through a number
of scripts
delivered to the subject by the NSA. The NSA can further complicate the
conspiracy delusion by using the same technology to have a work associate
ask the
subject a question or to make a comment that can be used by the NSA to
confirm the subjects fears. This technique further isolates the subject from
trusting their
peer groups, causes additional emotional distress and hostility toward these
people. The subject sometimes resorts to violent behavior, which is viewed
by observers
as irrational, unprovoked behavior that may be treated as criminal behavior
by law enforcement personnel.

8.3.7. Stage 3 (Extreme Process):

8.3.7.1. This method is very severe and usually results in a two to five
year program. Because of the severity of the suffering, the subject is
usually permanently
impaired for integration into normal mainstream life and is essentially
institutionalized. The result is that the subject must reside in a less
competitive environment like a
church group. Subjects that receive this program tend to be highly
superstitious, are agitated easily when objective evidence that contradicts
their belief system is
presented.

They tend to believe in the spiritual world (demons, ghosts, god, spiritual
entities, etc) and consider the spiritual world to be more powerful and
important than the
material or real world. This program basically follows the following steps;
REM deprivation, breakdown of self esteem and confidence, intense suffering,
exaggerated
conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle,
release (saved by the Savior), and recovering (blessed by Jesus Christ).
Whenever possible the
NSA will skip or reduce these steps to minimize security risk and financial
cost.

8.3.7.2. Increasing Dependence on Drugs and Alcohol:

8.3.7.2.1. As the REM Deprivation increases the subject must depend on
Central Nervous System (CNS) Stimulants to compensate for degradation of
productivity
at work, school, and in interpersonal relationships. This serves the NSA in
several ways. Use of drugs (especially CNS stimulants) increases the
subject's index of
suggestibility. Or in other words, the post hypnotic commands are more
effective and the subject has greater difficulty resisting the impulses
generated by the
commands.

In addition, the increased stress of coping with the drugs in conjunction
with the resisting the newly introduced posthypnotic commands serves to push
the subject
closer to an emotional breakdown. If the subject uses illegal drugs, the NSA
tries to set the subject up for a conviction to get assure that the subject
looses
credibility. Who would believe a drug user that claimed that he/she was
being harassed by a government agency that was tormenting them with
hypnosis? It also
serves the NSA in the program by documenting something that the subject will
be ashamed of when the program reaches the exaggerated conscience stage.

8.3.7.2.2. Alcohol, sleeping pills and other medications also inhibit REM
Stage sleep and increase irritability over time thereby further degrading
and isolating the
subject.

8.3.7.2.3. In summary, the NSA benefits from the subject responding to the
REM Deprivation assault with self-medication. This response discredits the
subject by
labeling them in society as a drug user, it enhances the effect of the
implanted posthypnotic commands and it gives the subject a reason for shame
that will be used
against the subject later to justify the punishment from "God". It should be
noted that the subject is not really guilty of anything, except being a
victim that was
manipulated in a carefully controlled scientific behavior modification
process.

8.3.7.3. Poor Nutrition:

8.3.7.3.1. The poor nutrition reduces the energy the subject has and serves
later as another justification of God's punishment. The subject will be
taught later that "the
body is the temple" and that to abuse it is to violate God's will.

8.3.7.4. Apathy:

8.3.7.4.1. After the subject's self-esteem is broken down and continuing
failure and persistent suffering start to dominate every day, the individual
becomes apathetic
as a defense mechanism. At this stage the subject has committed another sin
of "not persevering through faith" which is later used on the subject later
to increase a
feeling of guilt.

8.3.7.5. Depression:

8.3.7.5.1. Depression precipitates as a result of chronic REM Sleep
Deprivation, social isolation and a feeling of helplessness in the subject.
Commonly, when the
subject seeks professional counseling, they are misdiagnosed and treated for
depression with medications but the root cause of the problem (negative
reinforcing
posthypnotic suggestions inflicted over long periods of time) is not treated
or corrected.

8.3.7.6. Insecurity:

8.3.7.6.1. The subject starts to experience severe insecurity in this stage.
The NSA uses this insecurity against the subject in several ways. Because of
the impaired
reasoning ability and emotional isolation, the subject is susceptible to the
approaches of insincere people, which are used by the NSA to emotionally
hurt the subject
more.

This allows the NSA to convince the subject that people can't be trusted and
that only the NSA (Jesus) can be trusted. This serves to isolate the subject
from
supportive peer groups and makes the subject emotionally dependent on the
NSA resulting in the NSA gaining more power in the subject's life.

8.3.7.7. Journals and Diaries:

8.3.7.7.1. Most of the subjects are directed to keep a "Journal" or diary by
the NSA so that the subject can record and review feelings, events,
observations, and
"God's directions" that normally would be unavailable due to short term
memory loss during extended periods of REM Deprivation. The NSA uses the
Subject's
Journals in a variety of ways.

8.3.7.8. Degrading Spelling and Grammatical Performance:

8.3.7.8.1. Subjects in these prolonged stages of REM deprivation, confusion,
and emotional distress, have very poor grammar, spelling, and short
attention spans.

8.3.7.9. Slowed Speech:

8.3.7.9.1. Subjects experience slower speech and have a greater time
articulating concise points as a result of the REM Deprivation and other
performance
degrading posthypnotic commands. Very slight alcohol consumption can
exasperate the damage of REM Deprivation and precipitate slurred speech.

8.3.7.10. Confusion:

8.3.7.10.1. Confusion results from three primary sources; REM Deprivation,
specific posthypnotic commands to reinforce the confusion, and the emotional
damage
and stress that is being inflicted. The confusion allows the NSA to
continuously inflict damage to the subject's life without real-time
observation. A confused person
generally is not as productive as an organized clear thinker is and has a
greater potential to offend people by what they say or do and is less likely
to recognize when
they have made mistakes. All of these symptoms assist the NSA's objectives
in this stage and subsequent stages. In addition, the confusion restricts
the individual
from analyzing the source of their suffering and taking corrective actions,
and therefore reduces the NSA's security risk.

8.3.7.11. Poor Concentration:

8.3.7.11.1. Difficulty concentrating impairs the subject's productivity and
restrains the subject from making self-improvements and corrections in
behavior. It makes
it very difficult for the subject to do any research or reading to evaluate
his/her condition. This paves the way for the NSA to demonstrate that the
subject cannot do
anything on their own without "God", thereby increasing the frustration and
anxiety of the subject (inducing emotional breakdown) and ultimately making
the subject
totally dependant on the will of God.

8.3.7.12. Loose Association and Personality Disorders:

8.3.7.12.1. The subject experiences disjointed thought at this stage (Loose
Association) that appears to observers as a strange sense of humor or
inappropriate
responses when engaging in conversations. Ongoing sarcasm and other negative
attitudes and undesirable personality traits can be present.

8.3.7.13. Anger:

8.3.7.13.1. The way that the subject experiences anger is of profound
importance. If the subject allows the NSA to redirect the increasing anger
and hostilities
toward the NSA to another person in the form of violence (misplaced
aggression), the NSA will reinforce the violent behavior with posthypnotic
commands. The
result is a person that can achieve national acclaim as a murderer that
heard voices of Satan directing him/her. Typically, the Subject is
encouraged to commit acts of
violence with spouses, friends, or employers resulting in further social
isolation and increased shame.

Some examples of NSA directed victims of misplaced aggression include recent
US Postal Workers whom work within the Postal Service. This is one of the
vial
"communication intercept" channels the NSA is directed to monitor. The
routes of suspect mail and the postal worker processing it are continuously
monitored by
NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses
them or subjects the postal worker to behavioral modification.

8.3.7.14. Delusions:

8.3.7.14.1. Delusions are used to discredit the witness and also provide an
additional source for fear, intimidation and confusion. Delusions can be but
are not limited
to the Subject developing conspiracy theories of fellow employees and
friends, beliefs that Angels or Demons are communicating or visiting them,
tingling sensations
from microwave guns or implants, beliefs in supernatural events, etc.

8.3.7.15. Audio Hallucinations:

8.3.7.15.1. Subjects often report hearing walls clicking, footsteps in the
house, the sound of someone trying to open the door, drilling at the door,
etc.

8.3.7.15.2. These audio hallucinations are also used to discredit the
witness and also provide an additional source for paranoia, fear, and
negative reinforcement.

8.3.7.16. Voices in the Subject's Mind:

8.3.7.16.1.1. The voices in the subject's mind are achieved in a variety of
ways using real-time and prescheduled posthypnotic suggestion deliveries,
and Noun
Substitution implant techniques.

8.3.7.16.2. Noun Substitution Posthypnotic Implant:

8.3.7.16.2.1. The subject can have a posthypnotic suggestion implanted that
changes the form of pronouns in the subject's internal thinking. The result
is the subject
perceives that someone is telling him/her to do something with nearly every
thought. An example is; the subject thinks, "I should go to church today".
With the noun
substitution posthypnotic suggestion the subject experiences the following
internal thought, "You should go to church today!"

Notice that by implanting the posthypnotic command into the subject's
subconscious mind to think the pronoun "You" instead of "I" the subject will
perceive that they
are being directed by a voice even though the majority of the internal
thought content is their own naturally occurring thought. This subconscious
implant can be used
in combination with other implants to increase the subject's perception of
threat, fear, and therefore paranoia.

It can be used with other posthypnotic suggestion implants that will give
the subject the perception of either a "good" or "evil" voice or spirit is
directing him/her. This
implant is powerful because it gives the subject the perception that the
spirit, angel, God or Holy Spirit knows and directs the subject's every
thought. It provides a
convincing proof that "God knows every thought of his children". Subjects
that don't have a superstitious frame of reference and seek professional
help are usually
misdiagnosed as schizophrenic. 8.3.7.17. Tinnitus (Ear Ringing):

8.3.7.17.1. Tinnitus is commonly reported by subjects harassed by the NSA
and typically has no pharmacological or biochemical basis and is produced by
a
posthypnotic suggestion. It is often misdiagnosed as ringing caused by
excessive aspirin use and is actually an audio hallucination triggered by
hypnosis.

8.3.7.18. Complete Quiet Silence:

8.3.7.18.1. Used by the NSA as a positive reinforcement for two general
reasons; the subject has the tinnitus removed to indicate that the subject
has "The Lord's
Peace Restored", and secondly, the subject has achieved a milestone toward
being released by God (the NSA).

8.3.7.19. Quiet Wind:

8.3.7.19.1. The audio hallucination of a quiet wind is used to convince the
subject that the Holy Spirit is visiting him/her. An excellent example of
this hallucination
combined with the fear that accompanies it is contained in Phil Collin's
lyrics of a song that has the chorus "I can get so scared, Listen to the
wind".

8.3.7.20. Visual Hallucinations:

8.3.7.20.1. Visual hallucinations are usually implanted in the waking
moments when a subject is coming out of sleep or is in a somnambulatory
state (light sleep)
preferably in a darkened room. The hallucinations are fleeting, usually
lasting less than one minute and are not durable. Typical hallucinations
reported by subjects are
Angels, large spiders, and movement of various shadowy objects across the
ceiling, bright spot of light ahead of the subject, etc.

8.3.7.20.2. The television show "Sightings" has had numerous reports of
people seeing "Aliens" at waking moments. These types of news accounts
create confusion
in US society and serve to keep people searching for the wrong phenomenon
thus keeping the NSA's technology secure (disinformation).

8.3.7.21. Tactile, Olfactory hallucinations and Muscle Spasms:

8.3.7.21.1.1. Tactile hallucinations can be more durable and are used to
communicate a desired direction to the subject typically after a real-time
interrogation.
Typical behavioral cues issued by the NSA are manifested in the form of:

8.3.7.21.1.1.1. Temporary sensation of pressure to the tip of the right
index finger (symbolizing Faith or have Faith).

8.3.7.21.1.1.2. Temporary sensation of pressure to the tip of the left index
finger (symbolizing no Faith or "deception of Satan").

8.3.7.21.1.1.3. Temporary sensation of pressure to the center of the right
palm (symbolizing Jesus "Sitting at the right-hand of God").

8.3.7.21.1.1.4. Temporary sensation of pressure to the ball of the right
foot (symbolizing "Get on the Ball" or "hurry-up").

8.3.7.21.1.1.5. Temporary sensation of pressure to the tip of the right foot
big toe (symbolizing "Right Direction").

8.3.7.21.1.1.6. Temporary sensation of pressure to the tip of the right foot
center toe (symbolizing "Fucking-up Direction").

8.3.7.21.1.1.7. Temporary sensation of pressure to the tip of the left foot
big toe (symbolizing "Wrong Direction").

8.3.7.21.1.1.8. Temporary sensation of pressure to the buttocks (symbolizing
"Bad Attitude" or "subject is acting like an ass").

8.3.7.21.1.1.9. Temporary sensation of pressure on tip of penis or clitoris
(symbolizes immoral thoughts like subject is thinking/acting with his penis
or her clitoris).

8.3.7.21.1.1.10. Temporary sensation of pressure to the left ear drum
(symbolizing "do not listen").

8.3.7.21.1.1.11. Temporary sensation of pressure to the right ear drum
(symbolizing "listen").

8.3.7.21.1.1.12. An involuntary blink of the right or left eye (symbolizing:
right eye = God's agreement or left eye = Satan's agreement).

8.3.7.21.1.1.13. Temporary tingling sensation on the Testicles (symbolizing
insufficient male confidence or "Having no balls or strength").

8.3.7.21.1.1.14. Temporary tingling on other areas of the body to imply that
something invisible and/or supernatural is touching the subject. May be
perceived as
threatening or reassuring to the subject. Can be used to intimidate and
confuse the subject often times combined with additional posthypnotic
implants to inflict
delusions like "being attacked with microwaves" or being caressed by Angels.

8.3.7.21.1.1.15. Muscular spasm or perceived pressures near the jugular vein
on right side of neck (symbolizing Satan having subject by Jugular or
throat). This is
used to inflict fear and doubt.

8.3.7.21.1.1.16. Muscular spasms are sometimes used to inflict severe pain
on the subject by causing extreme involuntary contraction of the sphincter
in the anal
region or other lower back or leg muscles.

8.3.7.21.1.1.17. Perceived odor sensation of a thick, sweet smell
(symbolizing Satan's sweet victory over the subject's soul).

9. Misc

This section is written in an attempt to provide interested individuals with
some of the considerations and precautions when seeking to demonstrate the
NSA's civil
rights abuses by demonstrating the effectiveness and concepts of subliminal
access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using
Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands
without Somnambulistic Preparation in the Subject.

9.1. Reverse engineering of the NSA's technology to prove it's abuses
against the American people is quite difficult. Consider the following.

9.2. If the scientists and technicians perform their research in a facility
that the NSA has the standard transceivers installed, and therefore the NSA
can influence the
direction of research or the data by effecting perceptual effects in the
researchers. These perceptual effects can be confusion, lack of attention to
important details,
oversights, bad assumptions, incorrect interpretation of the test data.
These same misperceptions will also be incorporated into the research test
subjects. The
technology cannot be developed and optimized if the NSA has any access to
the test subjects.

The test scripts given to the test subject delivered from the researcher can
be neutralized by the NSA delivering a canceling script immediately after
the researcher's
script. The NSA's test script can also include a hypnoamnesia script at the
end to cancel any residual perception in the subject so that the test
subject would report
no effects and the researcher would conclude the test script had no effect.

9.3. The research must be carried out in a facility secured from all NSA
electronic intrusion. All equipment in the facility must be TEMPEST
protected and
electrically isolated from the outside world. The research personnel and
their subjects must never leave the secured area of the facility so that
they cannot be
subliminally interrogated by the NSA. The NSA would take this opportunity to
deliver disinformation scripts to the subject or researcher. Foodstuffs and
supplies
would be the logical choice of NSA intrusion if all other security measures
were effective against the NSA.

9.4. The NSA will exploit all opportunities to introduce microscopic
transceivers into the facility of it's surrounding grounds. The minimal
requirements for the NSA
to take control of the research are:

9.4.1. NSA audio delivery (a micro receiver with a micro speaker)

9.4.2. Visibility of the targets (researcher or test subject) to capture
response labels during subliminal interrogations. This can be through normal
illumination or
infrared to see through window, or millimeter wave or other technologies
that can see through barriers like walls and ceilings.

9.4.3. Audible response labels can be used if the NSA has a micro receiver
with a micro speaker inside but cannot get a transmitter in and operating
without
detection. Sneezes, coughs, clearing of throat that can be picked up by
laser microphones, audible amplification microphones, etc. can also be used
as response
labels.

9.5. The NSA currently has satellites with millimeter wave technology that
will allow visible intrusion into most facilities. The test facilities
should be deep
underground, AKA 100 feet with no adjacent access from other facilities,
sewer lines, water lines or power conduits etc.

9.6. Any facilities existing will have to be debugged before habitation and
research begins.

9.7. Subjects must be able to be subjected to traditional hypnosis after
facility habitation as a test prior to research to assure that the NSA has
minimal scripts
already implanted.

9.8. This technology is the highest level of intelligence gathering for the
USA. The abuses resulting from mismanagement of this area of the NSA's
intelligence system
must force Congress to legislate additional laws to protect the citizens.
The NSA must regulate this system better. The NSA will take all necessary
steps without limit
to assure that this technology is preserved and autonomously under their
control.

10. Conclusion:

America's greatest and highest level intelligence asset is being mismanaged
and the mismanagement must be corrected before all the Enemies of our great
country
acquire it. Imagine if China had this technology to use on their defenseless
population? 11. May God help us all in protecting the American public and
preserving and

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance�not soap-boxing!  These are sordid matters
and 'conspiracy theory'�with its many half-truths, misdirections and outright
frauds�is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to