How does work the technology (torture) that is slowly killing millions of innocent citizens around the world? yes, I’m talking about TARGETED INDIVIDUALS.

There are constant breaks between torture sessions so that the victim doesn’t begin to ‘Habitualize’ to the pain, meaning so the pain level and pain threshold of the targeted individual does not also increase so that the pain becomes more bearable. So, to prevent an increase in the pain threshold of the target they give the target periodic breaks between torture sessions. They are not using a mouse or a screen. They are using two interfaces against you and all TI’S: a brain to computer interface and an electronic brain to brain interface. You have been ‘CLONED’ to a supercomputer and to the DIA operator/behavioral scientist who is monitoring you, known as handlers. There are usually four to six of these because they work in shifts. Once the handler places the electronic helmet on his head and achieves Integration Completion with the targets brain, then there is at that moment an remote tie between the brain of the handler and your brain. They can see through your eyes. They can hear through your ears. They can feel what you feel, both physically and psychologically, etc. They can literally read your mind and hear your thoughts at speed of light (energy travels at speed of light) in ‘Real Time’ as you are thinking them. Then they will constantly inject, using a continuous remotely applied stream of directed electromagnetic energy, which is specifically tuned to your unique brain wave frequency known as your ‘Specific Residence Frequency’ various thoughts, emotions, memories, aromas, images, etc. because it is a fabricated and falsified stream of electromagnetic energy designed to mimic the normal electromagnetic emissions of your brain. The torture is absolutely necessary in order to map out you brain by remotely measuring your responses over a long period of time and then integrating those response statistics into RNM data they can use on you in the future for the purpose of Remote Neural Manipulation of your mind. There is no mouse or computer screen. It is an electronic brain to brain interface using similar technology like that which is used by pilots of the new stealth F-35 fighter which is controlled by the pilots thoughts, not manually. They can manually override if necessary and inject whenever they wish. No, just like the F-35, the trigger is their thoughts and the targeting camera is their eyes. If they think ‘burn his left arm’ then your let arm will burn, etc. Trauma Based Mind Control cannot exist without extreme trauma and pain.
WELCOME TO THE MONARCH PROGRAM.

Advertisements

Meet the Online Tracking Device That is Virtually Impossible to Block

WebInvestigator.KK.org

(David Sleight/ProPublica)

Update: After this article was published, YouPorn contacted us to say it had removed AddThis technology from its website, saying that the website was “completely unaware that AddThis contained a tracking software that had the potential to jeopardize the privacy of our users.” A spokeswoman for the German digital marketer Ligatus also said that is no longer running its test of canvas fingerprinting, and that it has no plans to use it in the future.

This story was co-published with Mashable.

by Julia Angwin

A new kind of tracking tool, canvas fingerprinting, is being used to follow visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.

First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the…

View original post 349 more words

Ethics and morality at the end of history

Systemic Disorder

Strange, isn’t it, that the system supposedly representing the apex of human development — even the end of history — has no place for ethics or morality.

Perhaps this becomes inevitable when an ideology develops to the point where the economy is considered to be outside the environment. From that dubious — to put it overly modestly — vantage point, the journey to seeing the environment, and the natural resources and life it contains, as nothing more than a cow to be milked at will is not a long one. A forest counts as nothing unless it can be monetized, which often means knocking it down. Clean air? Clean water? Luxury items for those who can afford them, and thereby profits for those who can bottle it and create a market for them.

Photo by Alex Proimos Photo by Alex Proimos

A thoughtful article in the May 2009 issue of Monthly Review caused me to…

View original post 767 more words

The individual vs. the illusion of consensus reality

Jon Rappoport's Blog

The individual vs. the illusion of consensus reality

by Jon Rappoport

July 26, 2013

www.nomorefakenews.com

This is such a supercharged subject, I could start from a dozen places.

But let’s begin here: the individual is unique, because he is he. He is unique because he has his own ideas, because he has his own desires, because he has his own power. That power belongs to no one else.

In particular, it doesn’t belong to the State. The State will try, will always try to suggest that it is granting power to the individual, but this is a lie. It’s an illusion broadcast with ill-intent.

While everyone else is trying to manufacture connections to the group, under the banner of a false sense of community, the individual is going in the opposite direction.

Philip K Dick: “Insanity—to have to construct a picture of one’s life, by making inquiries of others.”

Consensus…

View original post 1,258 more words

Legal Code on Surveillance by State plus /NSA/War/Public Law

http://tinyurl.com/5s5wnl
The National Center for Victims of Crime – Video Voyerurism Law for each State.

CHAPTER 119—WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS
http://www.fas.org/irp/offdocs/eo/eo-12333-2008.pdf (In case you didn’t look it up) Executive Order – 12333
http://edocket.access.gpo.gov/2010/pdf/E9-31418.pdf  The President Executive Order 13526
http://tinyurl.com/6esq5mb  Executive Order 13526
http://codes.lp.findlaw.com/uscode/18/I/37/798   18 U.S.C. § 798 : US Code – Section 798: Disclosure of classified information
http://codes.lp.findlaw.com/uscode/50/15/I/403   50 U.S.C. § 403 : US Code- Section 403: Director of National  Intelligence

 

http://www.fas.org/irp/offdocs/laws/usc50.html  US Code Title 50  (looking for Section 6)

 

http://biotech.law.lsu.edu/blaw/dodd/corres/pdf2/d54007p.pdf   Department of Defense DIRECTIVE (looking for public law 86-36 (50 U.S code 402  noted)

 

http://codes.lp.findlaw.com/uscode/50/15/I/402/notes  Notes on 50 U.S.C. § 402 : US Code – Notes

http://intelligence.senate.gov/nsaact1959.htm NATIONAL SECURITY AGENCY ACT OF 1959,  P L 86-36
http://cryptome.org/nsa-fisa.htm  NSA/CSS Policy 1-23, Procedures Governing NSA/CSS Activities that Affect U.S. Persons