Concise Idea about Mind Control
Mind reading and mind control sometimes is referred to as mind rape. The reason is that in general mind reading is not used to observe, but instead to control a person in illegal ways or to inflict maximum damage(including death) to a person.
From Operation Mind Control (excerpts from) by Walter H. Bowart:
Mind control is the most terrible imaginable crime because it is committed not against the body, but against the mind and the soul. Dr. Joost A. M.Meerloo expresses the attitude of the majority of psychologists in calling it ‘mind rape,’ and warns that it poses a great‘danger of destruction of the spirit’ which can be ‘compared to the threat oftotal physical destruction . . .’ … [p. 23]
Gangstalking and electronic harassment are tools that are used to murder a personmentally or physically. Not in a moment of rage but systematically, like turning pages in a book, we are talking about premeditated murder here. The mind of the target is forced into such a a state that he/she will do everythingto get rid of this mental and/or physical torture. Gang stalking and electronicharassment are used to rape the mind of a target over and over again until the target collapses mentally or physically..
Artificialtelepathy also offers an ideal means for complete invasion of privacy. If allthoughts can be read, then Passwords, PIN numbers, and personal secrets simplycannot be protected. One cannot be alone in the bathroom or shower. Thecriminal network has at its deposal plentiful first class technical know-howand high quality equipment."
It’s deadly and damaging
These are some of common symptoms of the individualstargeted through this technology:
1).Microwave hearing and torture with intense
loud electronic sounding noise
2). Visual disturbances, visual hallucinations
3). Manipulation of will, emotions, feelings, perceptions
4). Manipulation of human behavior: forced speech, involuntary body movements,transmission of specific commands into the subconscious, compulsory executionof these commands
5). Reading thoughts remotely, retrieving memories, implanting personalities
6). Debilitation of mental acuity, inability to concentrate, disruption ofability to think rationally and independently
7). Loss of memory and knowledge
8). Inadequate states, which targeted individuals have never experienced before(states of narcotic intoxication, depression, obsessive desires and so on)
9). Control of sleep patterns: sleep deprivation or uncontrollable sleep
10). Blurred vision
11). Cramps, seizures and spasms
12). Excruciating artificial pain in any part of the body, for example, heartattacks and other symptoms.
Reported mind control symptoms and descriptions include: “aslow death,” “unbelievably sophisticated,” “vicious, amoral, sadistic, andcruel,” .
Symptoms can be depression, befuddled thinking, lossof memory, stress, not being able to cope, manic behavior, schizophrenia,nervous breakdowns, physical collapse, brain and nervous system damage, heartattacks, cancer... Precisely modulated microwave radiation is used to influencebrain function. Human behavior and reactions can be entirely controlled byusing pulse modulated microwave EM radiation.
Victims from all over the world havecontacted Mind Justice with reports of being targeted with mind controltechnologies, although approximately 75% of victims are American and Russian. The following is a description of symptomsmost commonly reported by victims.
Victims are subjected to various kinds of harassment andtorture, twenty-four hours a day, seven days a week, for years on end. Mostbelieve that some type of technology can remotely track, target, and controlevery nerve in their bodies. Heart and respiration rate can speed up and slowdown, and stomach and bowel functions are regulated. Illnesses and all types ofpain can turn on and off in an instant.Microwaveburns are reported. Sleep deprivation is common and dreams are manipulated.Victims say, “They [whoever] is targetingthem] can see through my eyes, what I see.” Sometimes victims describe seeingthe images of projected holograms.Thoughts can be read. Most victimsdescribe a phenomenon they call “street theater.” For example, people aroundthe victim have repeated verbatim, the victim’s immediate thoughts, orharassive and personalized statements are repeated by strangers wherever thevictim may go. Emotions can be manipulated. Microwave hearing, known to be an unclassified military capability ofcreating voices in the head, is regularly reported.19Implantedthoughts and visions are common, with repetitive themes that can includepedophilia, homophobia and degradation. Victims say it is like having a radioor TV in your head. Less frequently, remote and abusive sexual manipulation isreported. Almost all victims say repetitive behavior control techniques areused and include negative, stimulus-response or feedback loops.
Some type of outside force can strikeheavy blows to any object, or set any object including the body into strongvibration while nearby objects are not vibrating at all. Wrenching ofhouse/building structures cause loud snapping or crackling noises, often heardat precisely the point where a victim is starting to doze off to sleep. Victims regularly report many types ofbizarre and harassive remote manipulation of electrical equipment, phone, car,TV, and computers. Mail tampering is reported as well. Black bagintelligence tactics--tire slashing, break-ins without burglary but at timesincluding sabotaged, modified items also appear on the list of invasions.
Victims agree: the experience of mind control phenomena isvicious, amoral, sadistic, and cruel. Most victims describe the experience asvery debilitating and compare it to mental rape, an electronic prison, or totaldestruction of the quality of their lives.Many have been labeled mentally ill and live with financial ruin, loss ofhealth, social life, and career. Victims theorize that the goal of theexperiments would appear to be the development of weapons to neutralize theenemy, without killing them. All say the technology is unbelievablysophisticated and effective. To them, itis like a slow death.
Biological Effects OfElectromagnetic Radiation (Radiowaves and Microwaves) Eurasian CommunistCountries, show that microwave frequencies similar to those of the cellular phones can causehealth problems in the following areas:
- Cardiovascular System.
- Central Nervous System.
- Digestive System.
- Visual System.
- Internal Sound Perception.
How thebrain targeting works?
"The EMF emissions from the brain can bedecoded into current thoughts, images and sounds in the subject’s brain. Itsends complicated codes and electromagnetic pulse signals to activate evokedpotentials inside the brain, thus generating sounds and visual images in theneural circuits. With its speech, auditory and visual communication systems,RNM allows for a complete audio-visual brain to brain link or abrain-to-computer link."
"Of course, the mechanism needs to decode theresonance frequency of each specific site to modulate the insertion ofinformation in that specific location of the brain. RNM can also detect hearingvia electromagnetic microwaves, and it also features the transmission ofspecific commands into the subconscious, producing visual disturbances, visualhallucinations and injection of words and numbers in to the brain throughelectromagnetic radiation waves. Also, itmanipulates emotions and thoughts and reads thoughts remotely, causes pain toany nerve of the body, allows for remote manipulation of behavior, controlssleep patterns through which control over communication is made easy.
Violation of Privacy Issue
Article 17 of theInternational Covenant on Civil and Political Rights of the United Nations of1966 protects also privacy: "No oneshall be subjected
to arbitrary or unlawful interference with his privacy,family, home or correspondence, nor to unlawful attacks on his honour andreputation. Everyone has the right to the protection of the law against suchinterference or attacks."
"Invasion of privacy is the intrusion intothe personal life of another, without just cause, which can give the personwhose privacy has been invaded a right to bring a lawsuit for damages againstthe person or entity that intruded."
"An otherwise non-public individual has aright to privacy from:
a) Intrusion on one's solitude or into one'sprivate affairs;
b) Publicdisclosure of embarrassing private information;
c) Publicity which puts him/her in a false light to the public;
d) Appropriation of one's name or picture forpersonal or commercial advantage."
"The Central Information Commission has tried tocreate a plausible definition of ‘privacy’ to assist lawmakers who might enacta clear law against ‘invasion of privacy’.
“One whointentionally intrudes, physically or otherwise, upon the solitude of anotheror his private affairs or concerns, is subject to liability to the other forinvasion of his privacy, if the intrusion would be highly offensive to areasonable person,” the CIC picked up the definition from the US Restatement ofthe Law on Torts."
Intentionalinfliction of emotional distress (IIED) is a tort claim of recent originfor intentional conduct that results in extreme emotional distress. Some courtsand commentators have substituted mental for emotional, but the tort is thesame. Some jurisdictions refer to IIED as the tort of outrage.
In most civil law jurisdictions, defamation isdealt with as a crime rather than a tort
INTERCEPTIONOF PRIVATE COMMUNICATION
Section 184(1) of the Criminal Code sets out the general rule that it is illegal to willfullyintercept a private communication:
Everyonewho, by means of any electro-magnetic, acoustic, mechanical or other device,willfully intercepts a private communication is guilty of an indictable offenceand liable to imprisonment for a term not exceeding five years. This involveswiretapping and second lines.
Everyone who, fraudulently and without colour ofright,
UNAUTHORIZEDUSE OF A COMPUTER
(a) obtains, directly or indirectly, any computerservice,
(b) by means of an electro-magnetic, acoustic,mechanical or other device, intercepts or causes to be intercepted, directly orindirectly, any function of a computer system,
(c) uses orcauses to be used, directly or indirectly, a computer system with intent tocommit an offence under paragraph (a) or (b) or an offence under section430 in relation to data or a computer system, or
(d) uses,possesses, traffics in or permits another person to have access to a computerpassword that would enable a person to commit an offence under paragraph(a), (b) or (c)
is guilty of an indictable offence and liable toimprisonment for a term not exceeding ten years, or is guilt.