Conocimiento, Consciencia, Educacion

Exposing the Truth.A Primer on V2K vs. Mind-Reading Technologies


Tuesday, June 17, 2014

By Anthony Forwood
Copyright 2012 © All rights reserved
Is Mind-Reading Technology Real?
Many people suspect or believe that their thoughts are being read by mind-control technologies. Many of these people are already targets of ‘Voice to Skull’ (V2K) technology, with which the perpetrators are able to project sounds and voices into their head, and because of what the perps communicate to them in this way, they are often led to believe that the perpetrators are able to read their thoughts as well.
Beyond the fact that many of these people suffer the very real effects of V2K, what makes them come to this conclusion? Is there any scientific evidence that would reveal that actual mind-reading technologies are possible, and if so, to what extent? Can these people’s experiences of the apparent reading of their thoughts be otherwise explained in more practical terms?
Although I’ve never knowingly been the target by any similar sort of electronic weapons myself (other than the usual mass media), I decided to investigate this. I have carefully researched as much of the available documentation as I can find, paying particular attention to actual mind-reading capabilities, as well as examining the published stories of many who claim to be victims of these technologies. On the one hand, what I’ve learned is somewhat reassuring (as far as thought-reading goes), but on the other hand, it’s not, because it reveals that there are many people out there who seem to be misinformed (not entirely their own fault), or who might actually want to be seen as victims in this capacity, for whatever reason. I don’t mean to criticize those people who actually suffer the very real invasive effects of mind-control technologies, but it’s very important to clear up any misunderstandings that they might have, so that they can better understand the reality of their own situation so as not to be taken by others as delusional, and so that they can make informed decisions about how to defend themselves against their perpetrators. My intention here is to provide an overview of the technologies that do exist, with a fairly extensive explanation of the science behind them, which will reveal both their capabilities and their limitations. This document will provide the reader with information that is more detailed and accurate than what is otherwise offered in any documents I have come across that describe mind-control technologies.

So, What is True?

V2K is an established technology, based on Allen Frey’s discovery (first publicly reported in 1961) that pulsed microwaves can be used to cause intercranial sounds (sounds that can only be heard inside a person’s head).i This method relies on specific energy levels, frequencies, and modulations (wave patterns). It’s a brute force method, where the target’s head is bombarded with the microwave pulses. These pulses cause rapid heating and cooling of the tissue cells of the inner ear, causing them to rapidly expand and contract, and this translates into sound vibrations that affect the cochlea, which triggers the appropriate neurons to fire, transmitting a signal to the auditory cortex. There is no direct effect on brainwaves from these microwave pulses, and there is no possibility for two-way transmission.
Any electronic technology that might be created to remotely read a person’s thoughts will entail a much more complicated procedure than that used for V2K, for several reasons.
First, there is the fact that the brain’s natural electromagnetic signals are extremely weak (approx. 0.5 milliwatts), which means that they aren’t able to propagate very far at all before they become lost among the noise of all the other electromagnetic activity that is always present in the surrounding environment. But even before they can reach even a few millimeters, they’re obscured by tissue and bone. Traditionally, electrodes that are applied directly to the outer scalp have been used to pick up these weak brainwaves, but this obviously won’t do for covert mind-control applications. Surgically implanted electronic implants can substitute for these electrodes, since they can be designed to amplify brainwave signals before retransmitting them.ii But even still, although it’s conceivable that a person might have been electronically implanted for mind-reading purposes with or without their knowing it, there are still many factors involved that impose further limitations in retrieving and deciphering brainwave signals, and understanding these will show that what many people are reporting as mind-reading is not the case, and one of several other mind-control methods are more likely involved.
But there are other, more compelling reasons why reading a person’s thoughts is far more difficult than it is to project voices into their heads through the brute force of V2K. Understanding brainwave patterns well enough to translate them into anything resembling actual thoughts is a great deal more difficult, since the complexities of these brainwave patterns parallel the complexities of the brain itself, and an understanding of the one directly reflects an understanding of the other. The workings of the brain are still barely understood, but one thing that is understood is that many different areas of the brain are involved in even the simplest mental activity.
If you’ve ever seen color photographs of brain activity taken from an MRI (magnetic resonance imaging) machine, you’ll understand that different areas of the brain ‘light up’ to different degrees at different times for different lengths of time and in different sequences for every different type of mental activity. It might be simple enough using something like MRI imaging to determine when someone is thinking word-thoughts because the ‘Broca’s Brain’ or ‘Wernicke’ areas light up, but this reveals nothing about what they are thinking. There is obviously more involved in decoding the actual words that are being thought, and brain activity has to be considered in three-dimensional terms, which poses further limitations.
Added to all of this is the fact that each person’s brain activity is slightly different, due to both the variations in neural configurations from person to person and the variables involved in the mental expressions that make up our thoughts. Therefore, it’s wrong to assume that it’s just a matter of deciphering the brainwave patterns from one person and being able to apply them to anyone else to understand what they’re thinking. Each person will require a separate dictionary for interpreting their brainwave signals into actual thoughts.
The patterns of brain activity are therefore very complex, being both spatial and temporal in nature, requiring any analysis of these patterns to take into consideration the three-dimensional expressions that occur in a particular sequence over a period of milliseconds or longer. There is no purely linear means of reading brainwaves and understanding their respective meaning. It will make a huge difference in how the brainwave signals are received (what their four-dimensional temporal/spatial patterning is) depending on the position of the target’s head in relation to any external reading device, making reading someone’s linear thoughts that much more difficult (unless an array of stationary implants or external electrodes are involved). Just the simple movement of the head would upset the reading, if it were being done remotely.
The electromagnetic field around the brain, which is created by the brain’s activity, is a complex field of interference patterns, where the radiating electromagnetic waves arising from the different areas of the brain are interfering with each other in different ways depending on their frequencies, relative positions, and sequential occurrences, so that it might be compared to a visual hologram, where viewing it from different angles results in a slightly different image. Only those brainwave emissions that are traveling more or less in the direction of the remote receiving equipment and not being interfered with by other brainwave emissions would be able to be properly read. As stated earlier, there is an added problem in that the dense bone tissue of the cranium interferes with brainwave emissions by deflecting and deforming them, making it even more difficult to determine the precise area of the brain that emitted a particular signal. This makes mind-reading technology without the use of implants highly unlikely, as far as reading your actual thoughts go. An implant will always be stationary in relation to the brain and will pick up the electromagnetic emissions from a single point of reference, making the monitoring of specific brain areas that much simpler. However, implants would still have to be precisely located where they can properly detect the desired brainwave emissions. It is impossible for a single implant to detect all of the brainwave activity that comprises a thought. Many implants are required for this, as will be explained further on.

More on Brainwaves and Brain Structure

All thoughts create brainwaves, which are electromagnetic waves that carry certain patterns based on frequencies and modulations, and these patterns are specific to the brain activity that is occurring. Human brainwaves are within a very narrow bandwidth of frequencies – the dominant ones are between 0.5 – 30 Hz, with more subtle frequencies reaching up to about 300 Hz. The information they carry is contained in the modulation of these frequencies. Modulation is simply the effect of combined frequencies, which causes specific changes in the up and down patterns of an otherwise uniform wave, and the specific pattern depends on the combination of frequencies involved, and their duration. Amplitude is the strength of the wave, which is measured by the distance between the highest and lowest points of a wave pattern (the peaks and troughs). Since brainwaves are very weak, their amplitude is very small.
The key to deciphering a person’s thoughts (or any other brain activity) from their brainwave patterns is to understand how the modulation pattern of brainwave emissions relates to specific brain activity. Some brainwave activity will be easier to decipher than others, since some types of brain activity is more similar to all of us than other types. Naturally, this is reflected by the similarity in how our brains are structured and operate. There are three distinct stages of brain evolution that become slightly more varied between individuals in regard to the neural structure of each newer stage, due to our individual genetic makeup, learning experiences, mental habits, and physical development. The earliest stage to have evolved, known as the R-complex or ‘reptilian brain’, will be almost identical between all individuals, while the most recently evolved stage, the neocortex, which is far more adaptive and able to reconfigure its structure and functionality over time (due to our individual experiential development and tendencies in how we think), will have the most variation between each person. The middle stage, centered around the limbic system and physically located between the R-complex at the brain’s core and the neocortex that covers the outer surface, is more or less identical for all of us as well, but will still have some minor variations from person to person.
The R-complex deals with the deepest, most necessary brain functions for our survival, and is guided by instinct. The limbic system is the center of emotion. The neocortex is the area of the brain that has the most to do with our thinking and determines our greatest uniqueness as both a species and as individuals of the human species. As such, our individual styles of thought will be reflected in the configuration of its neurons. The neocortex is also the most ‘plastic’ of the three stages, which means that it is more susceptible to reconfiguring its neural connections over time as we change and grow and develop new mental habits, etc. This may be our saving grace, as far as mind-reading technologies go. Also is the fact that each brain is different in the size and shape of its many sub-structures. So, just like fingerprints, which have certain similarities but are always uniquely different through minor variations, no two brains are exactly the same either.
Mind-reading technologies depend on deciphering the patterns of our brainwaves created by our brain activity. Some patterns, such as those created by emotions, are more or less identical for everybody, while other patterns, such as ‘word-thoughts’, will have a certain level of variation in their patterning from person to person, as well as in the manner of their tone, rhythm, and inflection. Therefore, the brainwave patterns of emotions and emotional states would be fairly easy to decipher no matter who is being targeted. Moving to the higher brain functions encompassed by the neocortex and the more complex inherent differences from person to person in their individual neural structures and the resultant difference in their brain activity, deciphering brainwave patterns becomes that much more difficult. Simply put, our emotions and other lower-level brain activity and corresponding neural configurations are going to be more or less identical for everybody, while higher-level brain activity and corresponding neural configurations are going to be more unique to each of us.
With all this said, it should be more understandable that our full-blown word-thoughts (the words we hear ourselves thinking in our heads) are going to be harder to decipher. Each person will have differences in their brainwave patterns due to the differences in the development of their neural structures.
Even though the brainwave pattern for a specific word-thought might be similar for everybody to a certain degree, the corresponding brain activity is still going to be unique enough that for each person targeted for mind-reading purposes, it would first have to be analyzed and broken down into its unique ‘signature’ patterns, and there won’t necessarily be a single signature pattern for specific words that will apply to everybody (whereas with emotions and other lower-level brain activity, there will). These signature patterns will also be made more complex by such things as the variations in mental expression (tone, rhythm, inflection, etc.), the rhythms of various physical functions (such as blood flow, respiration levels, heartbeat, etc.), etc. Some or all of these things would need to be taken into consideration in real-time while monitoring a person’s brainwaves (at least early on during a ‘learning’ phase of the mind-reading technology), since they will all have some effect on the patterning of electromagnetic output.
The connotation of words is important in understanding what is being communicated, meaning that tone, rhythm, and inflection are as crucial as the words themselves. Even in our thoughts, the connotation of words plays a role in expressing ourselves. Without knowing the connotation, sarcasm might be taken seriously by anyone eavesdropping on our thoughts. This means that they will want to be able to differentiate, and this will require greater complexity in any mind-reading technologies than just learning the brainwave patterns of words.
The areas of the brain that are involved in language processing are varied in their specific functions, and are spread out in the brain matrix rather than all centered in the same general location. This means that each of them would need to be tapped for mind-reading technologies to be effective. With there being approximately 100 billion neurons in the human brain, where each of these neurons has a specific function that may be totally unrelated to any of those adjacent to it, picking out the right neurons to read specific signals is no easy task. Being even one neuron off could totally corrupt any meaningful signal.
You should be able to understand from all this that reading a person’s thoughts by monitoring their brain activity and deciphering brainwave patterns isn’t as easy as might be imagined. Determining your emotional state and certain other specific lower-level brain activity by reading your brainwaves might be one thing, but determining the actual words you’re thinking is quite another. And because we’re all somewhat different in our higher-level brain structuring, it isn’t possible to establish a general database of word-patterns that will apply to everyone. Each person would require a separate database for their unique signature word-patterns (or even syllabic or phonetic patterns), and to create this database, each word-pattern would first have to be learned over time through repetition, comparing, and averaging out the results into a single recognizable pattern for each word. This learning period would require knowing precisely when the person is thinking a specific word while recording their brainwave activity, and filtering out everything but those brainwave patterns that relate to those thoughts (such as emotional overlays, lower-stage activity related to physiological functioning, etc.). Only after a relatively large number of recordings of a specific word have been made and compared, would it be possible to determine the underlying word pattern within the more complex brainwave output.

A Review of the Current Technologies and the Science Involved

At this point, it would be a good idea to review the relevant technologies that are known to exist, and consider their inherent capabilities and limitations.

The Frey Effect

As I related earlier, a scientist named Allen Frey published a report in 1961 that revealed that pulsed microwaves transmitted towards a person at certain specific frequencies and modulations would induce buzzing and clicking sounds that could be heard intercranially (inside their head) but not externally. This effect was found to be stimulated by the rapid heating and cooling of brain cells, which causes the cells to expand and contract, and this effect is detected by the cochlea and translated into sound patterns that are then delivered to the auditory cortex. It was determined that short bursts of these pulses could be modulated to simulate voices and other sounds.
Although this effect allows for beaming voices and sounds into a person’s head, it is strictly a one-way transmission and doesn’t provide any means at all for reading a person’s mental activity (two-way transmission).


Electroencephalography (EEG) machines are able to read a person’s brainwave activity through electrodes placed across the surface of the scalp. The number of electrodes used determines the overall spatial resolution of the signal. A minimal array consists of 19 specifically placed electrodes, while a high density array can have as many as 256 electrodes evenly spaced across the surface of the scalp. Readings consist of the differences in voltage between pairs of electrodes, known as a montage. There are various ways that a montage might determine brainwave activity, with each of these revealing different types of information. With digitized recordings, these different montages can be analyzed from the same recorded data, based on different mathematical formulas.

There are four basic frequency ranges of brainwaves, which reflect various mental states, going from the lowest, which relates to deep comatose sleep, to the highest, which relates to wide-awake alertness.

Delta (0.5 – 4 Hz) – Deep comatose (dreamless) sleep
Theta (4 – 7 Hz) – Dream (REM) sleep, hypnotic state, super-learning mode
Alpha (7 – 13 Hz) – Relaxed, drowsy state (creativity)

Beta (13 – 30 Hz) – Wide-awake, alert state

Although one of these states will be dominant over the others at any particular time, all of them will always be present to some degree. This means that the brain is always emitting these various different frequencies to different degrees in different areas within its three-dimensional matrix, and these areas and the frequencies they emit can change over time, depending on changes in the mental state.

A fifth frequency range, known as the gamma range (30 – 100+ Hz), has also been found that reflects special mental functioning that isn’t common in all people. It has been found to relate to advanced meditative states and highly elevated states of consciousness. There is no ‘gamma state’ of the brain, as there are for the four basic frequency ranges (the gamma range never dominates over the others), although the gamma range is present when a person is awake, and is integral to their mental state.

Two further classifications of brainwaves have also been discovered, known as lambda and epsilon waves. They are correlated, and while the epsilon wave is very low in frequency (below 0.5 Hz), the lambda wave is very high (100 – 200 Hz). Lambda waves can be found within the patterns of epsilon waves. These types of brainwaves are only mentioned here for posterity, and have no further bearing on our discussion.
Of the four dominant brain states, beta waves have the highest frequency but a relatively low amplitude, and each of the other states have respectively lower frequencies and higher amplitudes, with delta having the highest amplitude of all.
EEG readings rely on the electric potentials generated by a very large number of neurons that have a similar spatial orientation (i.e. neural clusters). The neocortex is the part of the brain that is closest to the scalp, and because its neurons are well-aligned and fire together, it’s believed to be the source of the EEG signal. The brainwaves from deeper areas of the brain matrix are too weak to be detected in this way. Further inhibitors to brainwave detection are cerebrospinal fluid and the hard bone tissue of the skull, which cause smearing of the EEG signals. This makes accurate distinctions of signals from different areas of the brain matrix somewhat difficult, if not impossible, using EEG machines.
EEGs allow for readings with a high temporal resolution in the range of milliseconds (in comparison, action potentials in the brain take as long as 130 milliseconds to propagate from one neuron to the next), making them very useful for monitoring ongoing brain activity in relation to various stimuli and corresponding brain functions. However, EEG readings are very limited in their spatial resolution, and it’s mathematically impossible to reconstruct an intercranial electrical current source (the specific neural structures) for a given EEG signal.
Note – Theta waves are particularly interesting, in that they have been found to correspond to repression of a response or action, as well as relating to automated tasks where conscious attention is not necessary. This is important to understand in relation to how mind-control technologies might induce certain effects or avoid conscious resistance to their influence.

The P300 Signal

The P300 signal is an EEG signal (30-50 Hz, 0.5 milliwatts) that can be read from the scalp using electrodes, most significantly in the area of the parietal cortex. The P300 signal reflects a person’s brain activity in a way that allows it to be decoded to some extent. The signal arises as an ‘evoked potential’ that appears as a small spike in a normal EEG readout, and these evoked potentials carry the encoded signature patterns that relate to such things as emotional states, stimulus responses, motor commands, auditory events, visual imagery, intentions, and even the word-thoughts that arise in a person’s brain. The evoked potentials of the P300 signal are derived from the organized temporal/spatial activity of different areas of the brain – there is no one specific place in the brain that elicits any particular P300 signal. This is important to understand when considering how mind-control technologies might read or influence brain activity.
Note: It shouldn’t be assumed that the P300 signal can be read from a single point anywhere on the scalp, but instead requires the overall array of electrodes that was described earlier, incorporating the combined signals from these electrodes, which are placed at various points across the scalp. Decoding the P300 signal from these combined readings requires the application of certain mathematical formulas called ‘Fourier transforms’, which will be explained further on.
The P300 signal far more readily allows for the detection of emotional states, etc., than it does for the reading (and understanding) of actual word-thoughts. As I said earlier, certain types of lower-level brain activity, such as emotional states, are more similar between individuals than is higher-level brain activity, such as word-thoughts. This is due to the greater differences in higher-level neural structuring from person to person, as well as certain other factors. Although certain brain activity related to word-thoughts might originate from the more easily readable neocortex, because they’re more differentiated from person to person, they’re that much harder to decode.
Decoding any of the information that might be contained in the P300 signal first requires a ‘learning’ phase, in which desired responses (such as specific words, emotions, motor commands, etc.) are elicited from the subject while the P300 signals are recorded. By comparing many recorded samples, extraneous noise can be filtered out and a more refined signature signal can be acquired. By applying Fourier transforms (see next section), this signal can be broken down into its composite frequencies, each of which has a correlation to specific brain activity. Analyzing these frequency combinations reveals the basic elements of the signal and offers a higher degree of definition. For instance, certain frequencies or frequency combinations might signify specific areas of the brain (such as the auditory cortex or the motor cortex), which will correlate to specific brain functions. This would help in developing a dictionary of P300 signal definitions through the computer-aided analysis of cross-correlations, not just between multiple signal samples from one individual, but also between individuals. This would allow both universal and individualized brainwave-pattern dictionaries to be compiled. Individualized patterns will have the same unique qualities as a specific individual’s normal brain activity, while universal patterns will have qualities that are generic to all of us. Thus, an individualized pattern, such as for a word-thought, will not have the same effect from person to person, while a universal pattern will.
Like other EEG signals, the P300 signal is extremely weak, which makes reading it from even a short distance (several feet at most) beyond the scalp very difficult without extremely sophisticated equipment (see further on), and longer distances than this are impossible under normal environmental conditions. To get around this, electronic implants would have to be used to read, amplify, and retransmit the signals to a remote receiving station, where they can be decoded.

Fourier Transforms

To understand how the P300 signal can be decoded into information that correlates to specific brain activity, a mathematical procedure called a Fourier transform is applied. Every type of activity in the brain will be composed of one or more frequencies (discussed earlier) that occur together to make up the evoked potential of a P300 signal, giving each evoked potential that correlates to that specific brain activity its own unique signature pattern. These different frequencies arise from the different areas of the brain that operate in conjunction to generate the specific activity and its correlated evoked potential. To put it another way, the complex wave patterns that make up an evoked potential are comprised of simpler waves of different frequencies and amplitudes. The specific combination creates a specific modulated wave pattern. A Fourier transform is a mathematical method for breaking down any wave pattern, no matter how complex, into those simpler composite waves.
With respect to electromagnetic waves, wavelength and frequency are always correlated, so that by knowing one, it’s a simple procedure to calculate the other. With a complex wave pattern comprised of multiple combined frequencies, the length of the overall wave pattern will equal the longest wavelength (lowest frequency) involved in creating that wave pattern. By canceling it out with it’s opposite wave pattern (the same wave but 180o out of phase), which can be done mathematically, you end up with a series of two or more identical wave patterns strung together in a repetitious fashion. The number of these identical wave patterns within that string will equal the frequency of the next longest wave, and their wavelengths will be the length of the initial complex wave pattern divided by this number. By doing this simple calculation and applying the same cancellation procedure again and again, you can eliminate each composite wave from the overall complex wave pattern until you are left with a series of identical sine waves that reflects the last remaining wave frequency involved. (This description is simplified for ease of understanding, but it gives a good idea of how a Fourier transform can take a complex wave pattern and break it down into its composite frequencies)
By knowing the frequencies of each of these composite waves, it’s possible to reconstruct the original complex wave pattern. When you see the readout of an EEG machine, it shows the brainwave patterns broken down into its four basic frequency ranges –delta, theta, alpha, and beta – plus a possible fifth readout representing their combined pattern. The four basic frequency patterns (plus the gamma, epsilon, and lambda waves) make up the fifth readout pattern. It’s this fifth readout that shows the P300 evoked potentials as small spikes, and these spikes are caused by the combined amplitudes of the combined frequencies, showing that the amplitudes of each of these basic frequencies plays a part in creating it.
Now let’s look at the technology that might be used for remote mind-reading.
SQUIDs (Superconducting Quantum Interference Device)
A SQUID is a device that provides the ability to measure extremely weak magnetic fields (on the order of microteslas), such as brainwaves. These devices are so sensitive that they can detect a change in an electromagnetic field that’s a hundred billion times weaker than the energy required to move a compass needle. These devices are used in MEG (magnetoencephalography) machines, which are a step up from the MRI machines commonly used in hospitals for taking brain scans. In MEG machines, an array of SQUIDs are used to read the electromagnetic activity of the brain, and their extreme sensitivity offers much better temporal resolution than an MRI machine,iii providing almost real-time feedback with much greater resolution. However, SQUIDs still have certain major drawbacks that make them impractical for remote mind-reading over distances greater than a foot or two. Foremost is the fact that for reading brainwaves, they rely on a carefully controlled damping of the electromagnetic field around the brain. In a MEG machine, this controlled field is accomplished by using a ring of superconducting material around which an array of SQUIDs are placed. Any perturbations of the electromagnetic field outside the ring will affect the readings of the SQUIDs as much as those inside, thus requiring the addition of a pair of magnetometers used in conjunction with each SQUID to measure the magnetic fields both inside and outside the ring, and the SQUID is used to measure the difference between them. Adding to these complexities is the fact that the superconducting material of the ring must be constantly cooled to temperatures near absolute zero Kelvin, using either liquid nitrogen or liquid helium.
Because of the need for a controlled electromagnetic field around the brain for SQUIDs to be able to read brainwaves, this field must be kept as contained as possible, so that even though SQUIDs might offer remote mind-reading capabilities, they must still be within inches of the head to detect changes in the controlled electromagnetic field caused by brain activity.
In spite of the limitations of SQUIDs for remote mind-reading applications, their use in MEG machines provides the ability to monitor brainwave activity with much greater informational detail than an EEG machine does, offering greater refinement in interpreting brainwave activity than can be achieved through the P300 signal.
As we’ve seen above, both MEG and EEG machines provide a means to record brainwave activity so that it can be analyzed and decoded into meaningful signal patterns that relate to specific brain functions and mental impressions, allowing for the development of a ‘dictionary’ of signature brainwave patterns that correlate to specific brain activity. Over time and with an ever-greater number of samplings to compare and analyze, this dictionary will only expand and become more accurate. However, these two technologies each have their own particular limitations, as we’ve seen, making them impractical for long-distant remote mind-reading. Nonetheless, they can still be used in this capacity to a certain extent when they’re coupled with other technologies, such as electronic implants (see further on).
Some people claim that masers are being used in mind-reading technologies. I have studied all such claims that I can find, but I can see no scientific basis for their accuracy. Masers might be being used for beaming signals at a person’s head and thereby affecting their brains (such as in V2K), but it’s very doubtful that they can be used for any sort of remote mind-reading applications.
Masers are similar to lasers but they emit a microwave beam rather than a photon beam. Both lasers and masers output waves of energy that are coherent, meaning that the waves in the beam have identical characteristics (frequency, amplitude, phase, direction of propagation). For this reason, they allow for a very narrowly focused beam that can be aimed with pinpoint accuracy.
The concept behind using a maser for reading electromagnetic emissions is relatively simple. The coherent waves of energy in the beam are all uniform and propagating in a long chain like soldiers marching in perfect step. until they’re interfered with by something in their path, which changes the state of the waves that are affected so that they will be out of step with the others. In terms of mind-control applications, the beam is expected to be interfered with by the target person’s brainwaves, and then reflected back to a receiver where the interference patterns are analyzed, and from these can be determined the brainwave patterns that caused them. All this is simple enough in theory, but there are several problems that would need to be overcome before they could ever be used for this purpose, making them very impractical:
1) Locating and locking onto the target
2) Accurately determining spatial orientation of the target
3) Accurately reflecting the beam from the target to the receiving station
4) Eliminating extraneous environmental interference
For any remote device to be able to accurately locate and lock onto its target, there would first have to be a way to identify the target and keep a precise position on it. The only conceivable way to do this would be to use an electronic implant such as an RFID chip, which offers the guarantee of precision if it is implanted in or very near the target’s head. Such a device would also allow for determining the target’s orientation (which way they are facing), thus allowing for proper readings to be taken that will correlate to specific areas of the brain. However, this still doesn’t make this a very practical means to remotely read brainwave signals, since there is no easy way for the maser beam to be accurately reflected back to a remote receiver without refracting into a scattered beam due to the curvature of the target person’s head, which it would necessarily bounce off. The scattering not only spreads the returning beam into a much wider trajectory, but its strength is also greatly reduced in the process, and most of the overall signal information will be lost as well. When you consider what was said earlier about how the P300 signal (the best bet for decoding the brainwave patterns of word-thoughts) is derived from the combined signals from an array of electrodes placed around the entire scalp, you should be able to understand how this isn’t at all practical to do with a narrow maser beam, and one with a larger beam circumference would still be ineffective due to the greater amount of scattering from refraction. While a receiving station (or even a number of them) could pick up some of the reflected beam, the majority of it would still be lost.
If this wasn’t enough to make this whole concept impractical, it becomes a virtual impossibility when you consider the extraneous interference that would be caused by all the electromagnetic noise that’s constantly bombarding the atmosphere between the maser transmitter, the target, and the signal receiver. The maser beam would require a very clean propagation path devoid of any such interference, otherwise this would destroy the very weak interference patterns created by the brainwaves.
Electronic Implants
Electronic implants can be as advanced and as functional as almost any other electronic device can be, but might be constructed through nanotechnology to make them so small that today they can be quickly and easily inserted into a person through the end of a hypodermic needle, thus eliminating the long and messy surgery such an operation once required.
These devices are used with mind-control technologies to receive, analyze, encode or decode, amplify, and transmit electromagnetic signals to and/or from an implanted person’s brain or nervous system. The most crucial aspect of them beyond their functionality is their placement in the body, which must be in a location that will allow them to do their intended objective. In the case of mind-reading applications, this means that they’ll need to be placed in very close proximity to the brain, which can be accomplished in a number of ways, including:
a) through the nasal cavity
b) through the ear canal
c) behind the eye
d) through the base of the skull
e) under the scalp
For reading a person’s thoughts, it’s very likely that multiple implants might have to be used, in order to act as remote EEG electrodes as discussed earlier. However, it’s not unlikely that the relevant classified science and technology is so advanced that a single implant might be able to do the job, as long as it’s located somewhere in the brain where it could pick up the proper signals, and this will probably be a very specific location that would require a complex insertion procedure so that it’s properly attached to specific neural clusters, and more than just one neural cluster will probably be involved. It’s impossible to say for sure what level of advancement these devices have reached, but there are some claims that, with the use of nanotechnology, they are now capable of relocating themselves or even growing appendages that work their way deeper into the brain and attach to specific neural structures. However, this is almost pure rumor and speculation.
There is at least one minor limitation to these devices that needs to be considered here. This is that their power requirements must remain relatively small, which means that their transmitted signal will still be quite weak, otherwise they’ll need constant recharging. However, the short-term signal output can probably be just as strong as that of a cell phone, so they can be designed to transmit their signals using the same communications infrastructure that cell phones relay their signals through. Some newer implants use batteries that can be recharged remotely, and the more advanced designs are reportedly able to generate their power from the implanted person’s own body. Neither of these possibilities are beyond current technological capabilities, so there is little doubt that this is true.

[The remainder of this document is unfinished, so the explanations may not be entirely clear to the reader at this point, but it should give a good idea of what might be involved.]

Learning the Patterns

If full-blown mind-reading applications that can read word-thoughts are being used on a person, then implants are probably involved in some way. The only other way around this would have to be through a more complex method of mental interrogation, which would include certain other mind-control techniques such as hypnosis, subliminals, and/or V2K. I believe that what many people are reporting as mind-reading is really being done through this latter method, so they should carefully consider what’s said here.
With or without the use of implants, for mind-control technologies to be able to determine a person’s word-thoughts so that a dictionary of correlated signature brainwave patterns could be compiled, a preliminary learning period will be necessary. This will involve some form of ‘prompting’ for specific responses, and there might even be a certain degree of ‘guessing’ involved. For those people who suspect that their full-blown thoughts are being read, whether or not they’re implanted with electronic devices, the mind-control perpetrators would first have to acquire an entire vocabulary of thought-patterns by trying to prompt the target to think certain specific words or syllabic patterns in order to establish a dictionary. There would undoubtedly be some room for guessing, which, over time and with a multitude of attempts for each word-pattern, they would eventually have enough collected data to compare and determine the underlying brainwave pattern for specific words. Even still, full understanding of a person’s thoughts that have any degree of complexity would first require the establishment of a very large vocabulary dictionary for each individual. This poses difficulties, and might take a great deal of time, depending on the situation.
To speed up this process, the perpetrators might rely on a greater degree of guessing, and for those people being targeted with V2K, the perpetrators can use this to influence the responses in such a way that the likeliest responses will be known and expected. It will also help them by engaging the target in ‘conversation’, which, although it’s really one-way (the target hears them but they don’t actually hear the target’s thoughts), they can use this to elicit mental or verbal responses (the latter which they can hear through normal surveillance devices) and match them with the recorded brainwave activity (provided they have a means for reading the weak signals, such as with implants) to determine the word-patterns. For this reason, targets should avoid engaging in giving the same uniform responses to the invasive voices of their perpetrators for the same promptings. The perpetrators will probably have a standardized method of eliciting specific word-thoughts, which will be used to establish a basic ‘language dictionary’ that can aid them in eliciting further specific responses that will add to this ‘dictionary’, one word or phrase at a time. For instance, stating false information about the target (through V2K) that will prompt the target to correct it will help the perpetrators to refine their dictionary.
Once such a dictionary has been compiled, the mind-control perpetrators would still not be able to use this to construct simulated word-thoughts and beam them into the target’s head to affect V2K that would seem to be the person’s own thoughts. The problem with this is that although such external signals might be projected into a person’s head, they would have to simulate the original brainwaves exactly the same way that the brain first produced them, with all the different brain areas with their different frequencies being matched perfectly. Even a slight displacement in the position of the head would throw off the signal completely.
Even if it were possible to beam these recorded signals back at the person, it would not be possible to covertly override the person’s thoughts that are going on at the same time, and at best, the signals would only cause a certain amount of interference, which would be detectable, and less than effective. What would be the point of using this method if it ca be detected? V2K is much more efficient.
So then, what method would be most effective to prompt for specific brainwave patterns? The answer is subliminals.

V2K and Subliminal Suggestions

With more advanced applications, V2K can implement subliminal suggestions or even hypnotic suggestions to facilitate this learning phase (or for other purposes). This might be noticed by the target when they have spontaneous and seemingly unsolicited thoughts, which will be of a nature that would facilitate the perpetrators in developing a dictionary of word-patterns. For instance, sudden compulsions to think a certain word or phrase repeatedly for a short time might indicate that this is going on. Of course, the words or phrases would start with the most commonly used words and phrases, and slowly develop into a larger word-base until a full dictionary of word-patterns was established.
There are certain limitations to the effectiveness of subliminals, and this is to the target’s advantage. First of all, although subliminals actually work very well under the right conditions, they’re not powerful enough to be resist being defeated, once a person suspects that they’re being used. Nor will subliminals be very effective where the suggestions are in conflict with a person’s already established beliefs or desires. Therefore, by simply affirming to yourself on a regular basis that your subconscious will not acknowledge any subliminal suggestions, you effectively defeat any attempts to use them. Of course, having doubts about this will defeat your own attempts to defeat any subliminals. That’s the nature of the subconscious mind.
I suggest to all targets that they take the time to study the mechanics of the mind (I don’t mean the brain), not just for the sake of overcoming certain forms of mind-control, but for your own general benefit. Just understanding the differences between the conscious and subconscious aspects of mind and how they work together can provide you with the ability to achieve things you didn’t think you could, and to be more in control of yourself and your life. You’ll understand the power that symbols have (which is why they’re used in many mind-control programs), and you’ll be all the more able to recognize and defeat their (subliminal) effects. You will also become more in tune with your intuitive faculties, and your psychic potential will develop more easily. I know this sounds like a Tony Robbins infomercial, but it’s absolutely true (This may be why I haven’t been hit with V2K or worse).

Current Technological Capabilities

Although there are many technologies that can interfere with a person’s brain activity in various ways to induce internal sounds and voices, there are none that are known to be capable of reading thoughts from a distance without the use of some sort of amplifying device (such as an electronic implant) in very close proximity to the person that is to be targeted. Many people assume that the available literature indicates that such capabilities exist, but a close examination reveals that it is only speculative at best, and overly suggestive at worst.
Research into brain activity resulted in the discovery of what is referred to as the P300 signal. The P300 signal is an EEG signal that can be read from the scalp using electrodes, like with normal EEG readings. The P300 signal reflects a person’s thoughts and other mental activity in a way that allows them to be decoded. This signal arises as an ‘evoked potential’ in the EEG readout, and this evoked potential carries the encoded patterns of every thought, reaction, motor command, auditory event, and visual image that arises in the target’s brain.
Decoding the P300 signal first requires a learning phase, in which the syllabic word-patterns derived from the P300 signal that correspond to the subject’s thoughts are recorded. This means that there must be some initial time taken to do this before any accurate mind-reading can take place. It might be possible that a generic dictionary could be compiled that contains the averaged EEG patterns from a wide range of test subjects, making this learning phase unnecessary after a certain point, but there will undoubtedly be complications, as explained earlier. The P300 signal more readily allows for the detection of emotional states, deceptive intentions, anticipation of movement, etc., than it does actual word-thoughts.
The P300 signal is very weak (30-50 Hz, 0.5 milliwatt), which makes reading it from a distance impossible without extremely sophisticated equipment, or unless the signal transmission is aided by an electronic implant. This signal is what has become the basis for ‘Computer to Brain Interface’ technology that is being developed by computer hardware manufacturers and medical prosthetics companies to aid in ‘non-contact’ operation of devices (such as the ‘Cyberlink Mind Mouse’). However, these developments rely on electrode attachments or very short-range transceivers to detect, amplify, and relay brainwave signals.
Technologies that can penetrate solid objects, such as that developed by Patriot Scientific Corporation (the Patriot ‘Ground Penetrating Radar’ system), might be assumed to be applicable as a mind-reading technology, but this is not the case. These ‘through-the-wall’ technologies can only detect the vibrational frequencies of material substances, and not those of the more subtle and fluid emissions of electromagnetic waves. They rely on bouncing their transmitted signals off of the solid objects to be detected, which cannot be accomplished with the more fluid EM waves, such as brainwaves. These technologies must be calibrated to the specific substances they seek to detect, which emit steady frequencies of a specific narrow range corresponding to the oscillations of the atoms in the material to be detected. Brainwaves cannot be ‘bounced off’, and so these technologies do not offer the capability to detect electromagnetic waves that are propagating in the air. Even if they could, there is still the problem of reading and decoding the four-dimensional emanations of the brain matrix, which in normal situations is not stationary.
The most advanced technology that is known to exist for reading brain activity is what is known as MEG (magnetoencephalography), which is a step up from MRI (magnetic resonance imaging). MRI can only take ‘snapshots’ of brain activity, and these are limited to one snapshot every few minutes at best, and they don’t reach very far into the brain matrix. MEG speeds this up tremendously (a snapshot every second or so) and reaches into very the center of the brain, but it’s still impractical for real-time monitoring and has certain hardware requirements that make it completely useless for remote mind-reading applications – specifically, the giant electromagnets that are used must encircle the brain completely and must be within centimeters of it in order to pick up its EM activity. Also, these electromagnets use superconductive materials that must be kept at near absolute zero temperatures, which makes this even more impractical for the purposes of remote mind-reading applications. MEG uses SQUID technology (Superconducting Quantum Interference Device), which some people mistakenly think can be applied to remote mind-reading technology, but this is not the case, for the reasons just explained.
The only technology that I know of that might exist that would allow the sort of abilities necessary for mind-reading is scalar-wave technology, but this is still speculative as to whether it exists beyond theory. However, if it does exist, it promises to offer all of the functionality required for remote mind-reading, and then some. If it does exist as described by its leading authority (Lt. Col. Thomas E. Bearden), then a full replication of the EM activity of a person’s brain can be acquired in real-time and recorded for analysis, eliminated the time constraints of pattern learning that known technologies would require. But at the same time, the greater functionality of scalar-wave technologies would suggest that far broader applications would also be experienced by targets, including simulated sensory data (full sensory hallucinations involving sight, sound, taste, touch, and physical feeling), to name the likeliest.

Concluding Comments

The intent of this document is to help targeted individuals who suspect or believe that their thoughts are being read in order to better assess their own situation, and hopefully see how ‘mind-reading’ might only be at a superficial level or even faked by the perpetrators, and where V2K might be being used in an attempt to prompt certain predictable responses in order to create a ‘dictionary’ of word-patterns correlating to their thoughts.
If nothing else, two things can be ascertained:
1) Electronic implants are almost certainly required for mind-reading capabilities, due to the weakness of brainwave signals.
2) Projecting voices into a person’s head is far easier than reading their thoughts.
Since I’ve never experienced V2K myself, and I certainly don’t have access to the technology involved, I can only offer insights based on what I know from researching the functioning of the human brain, wave mechanics, computer engineering, and science and technology in general, so there may be things I’ve said that those who do suffer from V2K might disagree with. If so, I’d really like to hear your comments or opinions on what I’ve said here, in order to better understand the actual situation, and to correct any errors I’ve made in my understanding.
I would also be interested in being directed to any documents that would reveal that the technology is more advanced than I realize, provided it isn’t based on mere speculation by the author or is only discussing future prospects in science and technology.
I am open to discussing anyone’s experiences with these sorts of technologies, to help them in assessing their situation and coming up with ideas and methods that might be used to learn the true extent and limitations of their perpetrators abilities and how to combat them. Sometimes we need an outside perspective to determine whether or not things are as they seem, and what might be done about them. I’ll always respect your beliefs and opinions and certainly won’t question your sanity or reasoning abilities. And of course I’ll respect your situation and the difficulties you face. You can reach me at, and all correspondence will be held in strict confidentiality.
i Similar capabilities were actually known about as far back as the late 1940s, when Andrija Puharich was designing hearing-aids for the deaf, which used a tooth implant to receive the electromagnetic signals (patented in 1961; US Patent #2,995,633).
ii Due to their small size, implants can still only transmit signals a very short distance, making it necessary for an amplifier/retransmitter to be located within 10 to 20 feet of the target. Specially rigged cell phones or computers offer a possible means for this retransmission, but would only be useful while they were within range of the signals from the implants. Still, people who suspect they are targets of mind-reading technologies should take this into account as a possible means of outgoing signal transmission.
iii An MRI machine is completely impractical for reading brain activity in any way that would make it useful for mind-reading purposes.
Conocimiento, Consciencia, Educacion

Electromagnetic and Informational Weapons: The Remote Manipulation of the Human Brain.


This important article first published by GR in August 2004 brings  to the forefront the role of Psychotronic weapons as an instrument of modern warfare.

It should be understood, that Electromagnetic and Informational Weapons are fully operational and could be used by US-NATO in their ongoing wars in the Middle East. 

In October 2000, Congressman Denis J. Kucinich introduced in the House of Representatives a bill, which would oblige the American president to engage in negotiations aimed at the ban of space based weapons.

In this bill, the definition of a weapons system included:

“any other unacknowledged or as yet undeveloped means inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person)… through the use of land-based, sea- based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations“(15).

As in all legislative acts quoted in this article, the bill pertains to sound, light or electromagnetic stimulation of the human brain.

Psychotronic weapons belong, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments has been presented in a meaningful way to World public opinion.

That it is feasible to manipulate human behavior with the use of subliminal, either by sound or visual messages, is now generally known and acknowledged by the scientific community.

This is why in most countries, the use of such technologies, without the consent of the individual concerned, is in theory banned. Needless to say, the use of these technologies is undertaken covertly, without the knowledge or consent of targeted individuals.

Devices using light for the stimulation of the brain constitute another mechanism whereby light flashing under certain frequencies could be used to manipulate the human psychic.

As for the use of sound, a device transmitting a beam of sound waves, which can be heard only by persons at whom the beam of sound waves is targeted, has been reported in several news media.  In this case, the beam is formed by a combination of sound and ultrasound waves which causes the targeted person to hear the sound inside his head. Such a procedure could affect the mental balance of  the targeted individual as well as convince him that he is, so to speak, mentally ill.

This article examines the development of technologies and knowledge pertaining to the functioning of the human brain and the way new methods of manipulation of the human mind are being developed.

Electromagnetic energy

One of the main methods of manipulation is through electromagnetic energy.

In the declassified scientific literature only some 30 experiments have been published supporting this assumption (1),(2). Already in 1974, in the USSR, after successful testing within a military unit in Novosibirsk, the Radioson (Radiosleep) was registered with the Government Committee on Matters of Inventions and Discoveries of the USSR, described as a method of induction of sleep by means of radio waves (3), (4), (5).

In the scientific literature, technical feasibility of inducing sleep in a human being through the use of radio waves is confirmed in a book by an British scientist involved in research on the biological effects of electromagnetism (6). A report by the World Health Organisation (WHO) on nonionizing radiation published in 1991 confirms that:

“many of biological effects observed in animals exposed to ELF fields appear to be associated, either directly or indirectly, with the nervous system…” (2).

Among the published experiments, there are those where pulsed microwaveshave caused the synchronization of isolated neurons with the frequency of pulsing of microwaves. Ffor example, a neuron firing at a frequency of 0.8 Hz was forced in this way to fire the impulses at a frequency of 1 Hz. Moreover, the pulsed microwaves contributed to changing the concentration of neurotransmitters in the brain (neurotransmitters are a part of the mechanism which causes the firing of neurons in the brain) and reinforcing or attenuating the effects of drugs delivered into the brain (1).

The experiment where the main brain frequencies registered by EEG were synchronized with the frequency of microwave pulsing (1,2) might explain the function of the Russian installation Radioson. Microwaves pulsed in the sleep frequency would cause the synchronization of the brain’s activity with the sleep frequency and in this way produce sleep.

Pulsing of microwaves in frequency predominating in the brain at an awakened state could, by the same procedure, deny sleep to a human being.

A report derived from the testing program of the Microwave Research Department at the Walter Reed Army Institute of Research states

“Microwave pulses appear to couple to the central nervous system and produce stimulation similar to electric stimulation unrelated to heat”.

In a many times replicated experiment, microwaves pulsed in an exact frequency caused the efflux of calcium ions from the nerve cells (1,2). Calcium plays a key role in the firing of neurons and Ross Adey, member of the first scientific team which published this experiment, publicly expressed his conviction that this effect of electromagnetic radiation would interfere with concentration on complex tasks (7).

Robert Becker, who had share in the discovery of the effect of pulsed fields at the healing of broken bones, published the excerpts from the report from Walter Reed Army Institute testing program. In the first part “prompt debilitation effects” should have been tested (8). Were not those effects based on the experiment by Ross Adey and others with calcium efflux?

British scientist John Evans, working in the same field, wrote that both Ross Adey and Robert Becker lost their positions and research grants and called them “free-thinking exiles” (6). In 1975, in the USA, a military experiment was published where pulsed microwaves produced, in the brain of a human subject, an audio perception of numbers from 1 to 10 (9). Again the possibility to convince an individual that it is mentally ill is obvious. The testing program of American Walter Read Army Institute of Research, where the experiment took place, counts with “prompt auditory stimulation by means of auditory effects” and finally aims at “behavior controlled by stimulation” (8).

Let us assume that the words delivered into the brain were transcribed into ultrasound frequencies. Would not then the subject perceive those same words as his own thoughts?

And would this not imply that that his behavior was being controlled in this way through the transmission of ultrasound frequencies? In this regard, the American Air Force 1982 “Final Report On Biotechnology Research Requirements For Aeronautical Systems Through the Year 2000″ states:

“While initial attention should be toward degradation of human performance through thermal loading and electromagnetic field effects, subsequent work should address the possibilities of directing and interrogating mental functioning, using externally applied fields…” (10).

Several scientists have warned that the latest advances in neurophysiology could be used for the manipulation of the human brain.

In June 1995, Michael Persinger, who worked on the American Navy’s project of Non-lethal electromagnetic weapons, published a scientific article where he states:

“the technical capability to influence directly the major portion of the approximately six billion brains of the human species without mediation through classical sensory modalities by generating neural information within a physical medium within which all members of the species are immersed… is now marginally feasible“ (11).

In 1998, the French National Bioethics Committee warned that  “neuroscience is being increasingly recognized as posing a potential threat to human rights“ (12). In May 1999 the neuroscientists conference, sponsored by the UN, took place in Tokyo. Its final declaration formally acknowledges that :

“Today we have intellectual, physical and financial resources to master the power of the brain itself, and to develop devices to touch the mind and even control or erase consciousness…We wish to profess our hope that such pursuit of knowledge serves peace and welfare” (13).

On the international political scene, in the last few years, the concept of remote control of the human brain has become  a matter of international and intergovernmental negotiation. In January 1999, the European Parliament passed a resolution where it called  “for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings.“ (14)

Already in 1997, nine states of the Commonwealth of Independent States (CIS) addressed the UN, OBSE and the states of the Interparliamentary Union with the proposal to place at the agenda of the General Assembly of the United Nations, the preparation and adoption of an international convention “On Prevention of Informational Wars and Limitation of Circulation of Informational Weapons” (16), (3).

Informational Weapons

The initiative was originally proposed, in the Russian State Duma, by Vladimir Lopatin (3). V. Lopatin worked, from 1990 to 1995, in sequence, in the standing committees on Security respectively of the Russian Federation, Russian State Duma and of the Interparliamentary Assembly of the Commonwealth of Independent States (CIS), specializing in informational security.(3). The concept of informational weapon or informational war is rather unknown to the world general public. In 1999, V. Lopatin, together with Russian scientist Vladimir Tsygankov, published a book „Psychotronic Weapon and the Security of Russia“ (3). There we find the explanation of this terminology:

 ”In the report on the research of the American Physical Society for the year 1993 the conclusion is presented that psychophysical weapon systems…can be used… for the construction of a strategic arm of a new type (informational weapon in informational war)…”

Among many references on this subject, we refer to Materials of the Parliament Hearings “Threats and Challenges in the Sphere of Informational Security”, Moscow, July 1996, “Informational Weapon as a Threat to the National Security of the Russian Federation” (analytical report of the Intelligence Service of the Russian Federation), Moscow, 1996 and a material “To Whom Will Belong the Conscientious Weapon in the 21st Century”, Moscow, 1997. (17).

In 2000 V. Lopatin introduced, after two other authors, the third in order bill on the subject of  “Informational and Psychological Security of the Russian Federation“. Lopotin’s findings were reviewed by the Russian newspaper Segodnya:

“…Means of informational-psychological influence are capable not only of harming the health of an individual, but, also of causing, according to Lopatin, ‘the blocking of freedom of will of human being on the subliminal level, the loss of the ability of political, cultural and social self identification, the manipulation of societal consciousness, which could lead to   the destruction of a sense of collective identify by the Russian people and nation’“ (16).

In the book “Psychotronic Weapons and the Security of Russia”, the authors propose among the basic principles of the Russian concept of defense against the remote control of the human psyche not only the acknowledgement of its existence, but also the fact that the methods of informational and psychotronic war are fully operational (“and are being used without a formal declaration of war”) (18). They also quote the record from the session of the Russian Federation’s Federal Council where V. Lopatin stated that psychotronic weapon can

“cause the blocking of the freedom of will of a human being on a subliminal level” or “instillation into the consciousness or subconsciousness of a human being of information which will trigger a faulty or erroneous perception of reality” (19).

In that regard, they proposed the preparation of national legislation as well as the establishment of legal international norms “aimed at the defense of human psyche against subliminal, destructive and informational manipulations” (20).

Moreover, they also propose the declassification of all analytical studies and research on the various technologies. They warned that, because this research has remained classified and removed from the public eye, it has allowed the arms race to proceed unabated. It has thereby contributed to increasing the possibility of psychotronic war.

Among the possible sources of remote influence on human psyche, the authors list the “generators of physical fields“ of “known as well as unknown nature” (21). In 1999 the STOA (Scientific and Technological Options Assessment), part of the Directorate General for Research of the European Parliament published the report on Crowd Control Technologies, ordered by them with the OMEGA foundation in Manchester (UK) (22, ).

One of four major subjects of the study pertained  to the so-called “Second Generation“ or “non lethal” technologies:

 ”This report evaluates the second generation of ‘non-lethal’ weapons which are emerging from national military and nuclear weapons laboratories in the United States as part of the Clinton Administration’s ‘non-lethal’ warfare doctrine now adopted in turn by NATO. These devices include weapons using… directed energy beam,…radio frequency, laser and acoustic mechanisms to incapacitate human targets” (23) The report states that „the most controversial ‚non-lethal‘ crowd control … technology proposed by the U.S., are so called Radio Frequency or Directed Energy Weapons that can allegedly manipulate human behavior… the greatest concern is with systems which can directly interact with the human nervous system“ (24). The report also states that „perhaps the most powerful developments remain shrouded in secrecy“ (25).

 The unavailability of official documents confirming the existence of this technology may be the reason why the OMEGA report is referencing, with respect to mind control technology, the internet publication of the author of this article (26 ).

 Similarly, the internet publication of the director of the American Human Rights and Anti-mind Control Organization (CAHRA), Cheryl Welsh, is referenced by the joint initiative of the Quaker United Nations Office, United Nations Institute for Disarmament Research, and Programme for Strategic and International Security Studies, with respect to non-lethal weapons (27).

On September 25th, 2000, the Committee on Security of the Russian State Duma discussed the addendum to the article 6 of the Federal law On Weapons. In the resolution we read:

“The achievements of contemporary science… allow for creation of measured methods of secret, remote influencing on the psyches and physiology of a person or a group of people“ (28). The committee recommended that the addendum be approved. The addendum to the article 6 of the Russian Federation law “On Weapons“ was approved on July 26, 2001. It states:

“within the territory of the Russian Federation is prohibited the circulation of weapons and other objects… the effects of the operation of which are based on the use of electromagnetic, light, thermal, infra-sonic or ultra-sonic radiations…“ (29).

In this way, the Russian government made a first step to stand up to its dedication to the ban of mind control technology.

In the Doctrine of Informational Security of the Russian Federation, signed by president Putin in September 2000, among the dangers threatening the informational security of Russian Federation, is listed

“the threat to the constitutional rights and freedoms of people and citizens in the sphere of spiritual life… individual, group and societal consciousness“ and “illegal use of special means affecting individual, group and societal consciousness” (30). Among the major directions of the international cooperation toward the guaranteeing of the informational security is listed „the ban of production, dissemination and use of ‘informational weapon‘ “ (31).

The foregoing statement should be interpreted as the continuing Russian commitment to the international ban of the means of remote influencing of the activity of the human brain.

Similarly, in the above mentioned report, published by the STOA, the originally proposed version of the resolution of the European Parliament calls for:

“an international convention for a global ban on all research and development… which seeks to apply knowledge of the chemical, electrical, sound vibration or other functioning of the human brain to the development of weapons which might enable the manipulation of human beings, including a ban of any actual or possible deployment of such systems.“(32)

Here the term “actual” might easily mean that such weapons are already deployed.

Among the countries with the most advanced military technologies is the USA which did not present any international initiative demanding the ban of technologies enabling the remote control of human mind. (The original version of the bill by Denis J. Kucinich was changed.)

All the same, according to the study published by STOA, the US is the major promoter of the use of those weapons. Non lethal technology was included into NATO military doctrine due to their effort:  “At the initiative of the USA, within the framework of NATO, a special group was formed, for the perspective use of devices of non-lethal effects” states the record from the session of the Committee on Security of the Russian State Duma (28).

The report published by STOA states: “In October 1999 NATO announced a new policy on non-lethal weapons and their place in allied arsenals” (33). “In 1996 non-lethal tools identified by the U.S. Army included… directed energy systems” and “radio frequency weapons” (34) – those weapons, as was suggested in the STOA report as well, are being associated with the effects on the human nervous system.

According to the Russian government informational agency FAPSI, in the last 15 years,U.S. expenditures on the development and acquisition of the means of informational war has increased fourfold, and at present they occupy the first place among all military programs (17),(3).

Though there are possible uses of informational war, which do not imply mind control, the US Administration  has been unwilling to engage in negotiations on the ban on all forms of manipulation of the human brain. This unwillingness might indeed suggest that the US administration intends to use mind control technologies both within the US as well as internationally as an instrument of warfare.

One clear consequence of the continuation of the apparent politics of secrecy surrounding technologies enabling remote control of the human brain is that the governments, who own such technologies, could use them without having to consult public opinion. Needless to say, any meaningful democracy in today’s world could be disrupted, through secret and covert operations.  It is not inconceivable that in the future, entire population groups subjected to mind control technologies, could be living in a “fake democracy” where their own government or a foreign power could broadly shape their political opinions by means of mind control technologies.

Mojmir Babacek is the founder of the International Movement for the Ban of the Manipulation of the Human Nervous System by Technical Means,  He is the author of numerous articles on the issue of mind manipulation. 


1) Handbook of Biological Effects of Electromagnetic Fields, 1996, CRC Press Inc., 0-8493-0641-8/96, – pg. 117, 119, 474- 485, 542-551, 565 at the top and third and last paragraph

2) World Health Organization report on non-ionizing radiation from 1991, pg. 143 and 207-208

3) V. Lopatin, V Cygankov: „Psichotronnoje oružie i bezopasnost Rossii“, SINTEG, Russian Federation, Moscow, ISBN 5-89638-006-2-A5-2000-30, list of the publications of the publishing house you will find at the address

4) G. Gurtovoj, I. Vinokurov: „Psychotronnaja vojna, ot mytov k realijam“, Russsian Federation, Moscow, „Mysteries“, 1993, ISBN 5-86422-098-1

5) With greatest likelihood as well the Russian daily TRUD, which has organized the search for the documents, Moscow, between August 1991 and end of 1992 6) John Evans: Mind, Body and Electromagnetism, the Burlington Press, Cambridge, 1992, ISBN 1874498008, str.139

7) Robert Becker: “Body Electric: Electromagnetism and the Foundation of Life”, William Morrow and comp., New York, 1985, pg. 287

8) Robert Becker: “Cross Currents, teh Startling Effects of Electromagnetic Radiation on your Health”, 1991, Bloomsburry Publishing, London, Great Brittain, ISBN 0- 7475-0761-9, pg. 304, Robert Becker refers to Bioelectromagnetics Society Newsletter, January and February 1989

9) Don R. Justesen, 1975, Microwaves and Behavior, American Psychologist, March 1975, pg. 391 – 401

10) Dr. Nick Begich and Jeane Maning: “Angels Don’t Play This HAARP, Advances in Tesla Technology”, Earthpulse Press, 1995, ISBN 0-9648812–0-9, pg. 169

11) M. A. Persinger: „On the Possibility of Directly Lacessing Every Human Brain by Electromagnetic Induction of Fundamental Algorythms“, Perception and Motor Skills, June1995,, sv. 80, str. 791-799

12) Nature, vol.391, 22.1.1998,str.316, „Advances in Neurosciences May Threaten Human Rights“

13) Internet reference at the site of the United Nations University and Institute of Advanced Studies in Tokyo does not work any more, to verify the information it is necessary to find the document from the 1999 UN sponsored conference of neuroscientists in Tokyo, you may inquire at the address 14) . click at Plenary sessions, scroll down to Reports by A4 number –click, choose 1999 and fill in 005 to A4 or search for Resolution on the environment, security and foreign policy from January 28, 1999

15) and search for Space Preservation Act then click at H.R.2977

16) Russian daily Segodnya, 11. February, 2000, Andrei Soldatov: „Vsadniki psychotronitscheskovo apokalypsa” (Riders of Psychotronic Apokalypse)

17) See ref. 3), pg. 107

18) See ref. 3) pg. 97

19) See ref. 3), pg. 107

20) See ref. 3), pg. 108

21) See ref. 3) pg. 13


23) see ref. 22 pg. XIX or 25

24) see ref. 22 pg. LIII or 69

25) see ref. 22 pg. XLVII or 63, aswell pg. VII-VIII or 7-8, pg. XIX or 25, pg. XLV or 61

26) see ref. 22) pg. LIII or 69, note 354

27) CAHRA and Cheryl Welsh are listed at the page 24

28) Document sent by Moscow Committee of Ecology of Dwellings. Telephone: Russian Federation, Zelenograd, 531-6411, Emilia Tschirkova, directrice

29) Search , there “poisk” (search) and search for “gosudarstvennaja duma” (State Duma) (it is necessary to type in Russian alphabet), at the page which appears choose “informacionnyj kanal gosudarstvennoj dumy” (Informational Channel of the Russian State Duma), there “federalnyje zakony podpisanyje prezidentom RF” (Federal laws signed by president of the Russian Federation), choose year 2001 and search 26 ijulja, è. N 103-F3 (July 26, 2001, number N 103- F3) , “O vnesenii dopolnenija v statju 6 federalnogo zakona ob oružii” (addendum to the article 6 of the Federal law on weapons)

30) Search and then (type in Russian alphabet) “gosudarstvennaja duma”, next “informacionnyj kanal gosudarstvennoj dumy” (informational channel of the State Duma), next search by use of “poisk” (search) Doktrina informacionnoj bezopasnosti Rossii” “Doctrine of the Informational Security of the Russian Federation) there see pg. 3 “Vidy informacionnych ugroz bezopasnosti Rossijskkoj federacii” (Types of Threats to the Informational Security of the Russian Federation)

31) See ref. 30, pg. 19, “Mìždunarodnoje sotrudnièestvo Rossijskoj Federacii v oblasti obespeèenija informacionnoj bezopasnoti” (International Cooperation of the Russian Federation in Assuring the Informational Security”

32) See ref.22, pg. XVII or 33

33) See ref.22, pg. XLV or 61

34) See ref.22 pg. XLVI or 62

Conocimiento, Consciencia, Educacion

‘MK-Ultra Walt Disney and how it affects you’

Walt Disney, unbeknownst to most of the world is actually a military industrial complex — a corporation that programs children for warfare, which was shown dramatically in their early renditions in film….back when the military took over Disney studios…and started producing war time propaganda.

Need a refresher?

Well in 1941, when the Japanese attacked pearl harbor and the US officially entered World War 2 — the next day, Walt Disney returned to work to find it had been commandeered as a primary defense station to guard against the near by Lockheed plant as a possible air strike — and all his film equipment was replaced by anti aircraft weapons. The parking lot was filled to capacity with crates of ammunition and jeeps. Disney was outraged when he learned that his studio was the only studio turned into a makeshift military base — and during this occupation the studio became a virtual war factory with well over 90% of its production in the service of government training and education in propaganda films.

Yes, you can watch Disney cartoons and learn how to load your anti tank weapons.

Disney often boasts how Donald Duck did more to get people to pay their income taxes than all the propaganda combined. The Nazi’s were so taken by Disney’s ability to program people to do all things necessary for war. Joseph Goebbels, the Nazi propagandist actually adopted Walt Disney’s methods and started making cartoons of their own to program the Nazi children for warfare.

There is a classic 1943 Chicken Little cartoon where you can clearly see the outline of modern day mind control at work in the story. You are introduced to a coup of chickens that mirror human society. They have the lead…big man on campus as the rooster cocky locky
– he is the main chicken inspector , supervisor — and they have the other classes of society too…like the knitting birds, the gossipers and the birds that love to go to the bar … and then there is chicken little, he is the naive new egg…that’s generally a good egg.. and then there is foxy loxy…he’s the sly hungry fox who ponders the best way to catch a chicken. Well, he’s put off by this tall fence — so he decides why should he jump in the coup to risk his life to catch one chicken when he could use psychology to get all of them where he wants them to go. So, he has this little red book that he pulls quotes out of… and the first tenet is — if you tell them a lie don’t tell them a little one, tell a big one. Notably, this is straight out of mind comp.

As the story progresses the fox steals a piece of wood …which has a five pointed pentagram painted on it and he throws it over the fence and hits chicken little in the head leaving him a bit dazed… and the fox whispers through the fence, “this is the voice of doom…the sky is falling” and so chicken little rushes to warn all the other chickens to show them the proof …the star and the bump on his head …he’s got evidence…ya know. So the chickens are all frightened…well Cocky Locky appears as the voice of reason and identifies the star as just a piece of wood and the sky’s not really falling. The fox is temporarily foiled but he has other techniques up his sleeve and goes back to his book…and his books says undermine the faith of the masses and their leaders. So the fox infiltrates their social groups, speaking to the defenseless voices in their head, spreading rumors, provoking the chickens to fight amongst themselves…and eventually they demote cocky locky as the king of the roos because he got them believing all the propaganda…so then the fox goes back to his books and it says “by the use of flattery insignificant people can be made to look upon themselves as born leaders,” the fox then convinces chicken little that its his turn now..that cocky locky has lost his favor and he should be the one to step up and lead the chickens. So he yells to the congregation…so to speak… that he is their new leader and begins to debate about the validity of his claims that the sky is falling. (remind you of anything??)

Then the fox throws another star over the fence and it hits cocky locky in the head and all the chickens witness this event..kinda like a false flag — and they all run to chicken little for guidance. The fox counsels him to rush everyone to the caves and break down their secure fences — out of the protection of the farmer and his shot gun…and he leads them all down a pathway set up by the fox. The moral of the story at the end is, don’t believe everything you read.

The sly fox whispers, “you didn’t really think everything was gonna turn out good…did you?

Some of the other things that Disney has brought to the forefront has been the killing and total annihilation of the mother figure… and the psychological effect this has. Look at Finding Nemo and how the barracuda comes and eats his mom in the first 5 minutes of the show. You can actually guarantee if you are going to turn on a Disney horror film such as the little mermaid or even tangled …you will find the mom is killed immediately.

What we are looking at here is the destruction of the family unit ..because the family unit is the first best offense against dark forces. Your mother is the chief of that and when you look at all these princesses…the main ones they promote like, Snow White, Bell, Ariel, Princess Jasmine, Sleeping Beauty and Cinderella. What do all these girls have in common? They don’t have a mother! Snow Whites mother is actually the evil step mom that is trying to kill her cause Snow Whites so beautiful. Belle does not have a mother, she is just omitted from the story, Ariel does not have a mom, she has 7 sisters but they suck in the story. Jasmine has no mother, Sleeping Beauty is not raised by her mother ..she is raised by 3 fairies. Of course we have Cinderella who is also raised by a evil step mother and her sisters are awful. What they are doing is destroying every type of feminine instinct and bond that we have. Instead of sisters we are now seeing rivals …instead of loving, mother, sister, daughter relationships all we have is competition and rivalry.

And what this does is leave these girls with nothing…but of course this is great for Hollywood because now they can produce shows like Bridezilla.

Bridezilla comes from a schism in the mind that happens when the girls who have been watching all these fairytales their whole life… comes of age. Trying to live their existence as a princess — but they have no role models for the full moon phase of their life which is motherhood, womanhood. The most powerful part of a woman’s life. In the fairytale the curtain ends after she says “I do” — and once she produces a child… she is pretty much dead — and so all these women going through this phase in their life where the wedding is the highlight of their entire life and they have nothing else after that because its just a blank slate — they have no programming…and the one programming they may get in this phase is Sex In The City, which is all scripted by homosexual men.

Something is seriously wrong with our girls and women… I guess we are ‘crazy’ because of the programming and its happening before our eyes —trauma based mind control.

Have you noticed all the lyrics of songs with word crazy in it?

Britney Spears, You Drive Me Crazy, Hanna Montana sings, Lets Get Crazy, Taylor Swift, You Make Me Crazy, Beyonce sings, You Got Me Looking So Crazy Right Now, Madonna belts, Crazy for You, Rihanna singing, Whats Wrong With Me, I’m Going Crazy Right Now. All of it has tons of esoteric meaning for these girls… deeper than just being a little crazy because they were actually traumatized and programmed. When they reach about 27, 28 years old…the world starts to make sense to them and they realize whats been happening and they start deprogramming…and guess what — we see things like Britney Spears attacking paparazzi with umbrellas and being rushed to the hospital because she’s got multiple personalities, she’s shaving her head…she’s going crazy. And its not just the women…a lot of male musicians at that age have committed suicide.

We need to wake up now before it is too late. Families need to have more child interaction…the whole family union…needs to flourish..again. We must regenerate innocence, creativity and imagination. Yes we can finagle our way out of this… because all of us are victims of trauma based mind control.

Conocimiento, Consciencia, Educacion


“Supertramp Breakfast In America 2010” –

Follow Us. or our mirrored website at,
Twitter: ‪#‎GMACAG‬ @GMACAG

‪#‎ExposingClimateGate‬ ‪#‎LookUp‬ ‪#‎GetMad‬ @ ‪#‎ToxicSkies‬ ‪#‎ClimateEngineering‬ #Geoengineering ‪#‎HAARP‬ ‪#‎SRM‬ ‪#‎Climate‬ ‪#‎Weather‬ ‪#‎WeatherModification‬ #‎Chemtrails‬ ‪#‎ClimateGate‬ ‪#‎Agenda21‬ ‪#‎SolarRadiationManagement‬ ‪#‎SPICE‬ #‎GMO‬ ‪#‎Monsanto‬ ‪#‎Bangeoengineering‬ ‪#‎Stopgeoengineering‬ ‪#‎Strangeclouds‬ #‎Chemtrailskill‬ ‪#‎Fakeclouds‬ #‎Sickofchemtrails‬ #ClimateModification #AlbedoModification #Chemsky #OpChemtrails #OfficialIPCCLies #NWO #Newworldorder #Illuminati #Contrail #Secretsocieties #Agenda21 #Agenda2030 #Chemclouds #Aluminum #‎ItsNotWaterVapor‬

Conocimiento, Consciencia

Psywar – Full Documentary



Por Suzanne Maher


Excelente 01:40 documental sobre la manipulación de la evolución y la mente de la percepción y la opinión pública a través de la propaganda.

Las élites gestionan la percepción del público con técnicas de relaciones públicas, comunicados de prensa, y llevan a cabo sesiones de fotos con la eficiencia y la planificación. Promoción de los juegos de guerra, el dogma religioso y prácticas de la industria corruptos son todos una mentalidad y la ideología cuidadosamente construida usando la información como un instrumento de guerra y el arte de vender.

La idea de que los ciudadanos han de ser “observadores pasivos” y los espectadores interesados de la acción, pero no más. Para asegurar que el público se mantiene distraído con una campaña masiva de; la felicidad = consumo. Dando a la gente sólo “un poquito”.



September 8, 2016

By Suzanne Maher


Excellent 1:40 documentary on the evolution and mind manipulation of public perception and opinion through propaganda.

The elites manage public perception with public relations techniques, press releases,  and staged photo ops with efficiency and planning.  Promotion of war games, religious dogma,  and corrupt industry practices are all a carefully constructed mind set and ideology using information as an instrument of war and salesmanship.

The idea that citizens are to be “passive observers” and interested spectators of action, but no more.  To ensure the public is kept distracted with a mass campaign of; happiness = consumption. Giving people only “just a little bit”.

The documentary also discusses the tactics of Edward Bernays who was called the “Father of Modern Public Relations” who would take propaganda techniques and apply them to commercial issues.  For example, smoking was portrayed as a positive thing to do for women; women who smoked were said to be liberal, strong minded and independent.

This is the manipulation of public opinion and “engineering consent”.

Conocimiento, Consciencia, Educacion

Online Psyops and Perception Management in the Targeted Community

by Anthony Forwood
Copyright 2013 © All Rights Reserved
You are free to copy and distribute this document, provided that it is kept intact and no changes or omissions made.
January 28, 2013
(Updated December 11, 2013)
If you know the enemy and know yourself,
you need not fear a thousand battles.
If you know yourself and not the enemy,
for every victory, you will suffer a defeat.
But if you know neither yourself nor the enemy,
then you are a fool and will meet defeat in every battle.”
Sun Tsu


Before you believe anything you might ever read, hear, or see in the media (including TV, radio, movies, books, magazines, newspapers, and the internet), or from anyone else (family, friends, acquaintances, employers, strangers, etc.), you need to read this very important information. You, and the public as a whole, are constant targets of extremely well-planned and executed psychological operations (psyops), and there are any number of these media-facilitated programs taking place at any given time. They are so numerous and varied that you and those around you are bound to fall prey them sooner or later. They can target an entire population, an identified group within a larger population, or even a single individual. Being aware of what psyops programs are, how they’re executed, and how to detect and avoid them is crucial to maintaining an accurate perception of reality in today’s world, so as not to become misled about your situation as a targeted individual and drawn deeper into the clutches of those who seek to take advantage of you.
Even though this might sound like an extreme statement, the powers-that-be are intent on enacting total mind-control on the entire global population. Electronic harassment and the various hardware technologies used in these attacks play a significant part of this, but these are not the only means to this end, although these technologies serve to force the target along a certain intended path of thought or action. Just as significant as these ‘hard force’ methods, but far less recognized, are the ‘soft force’ psychological methods of manipulation and control. Few researchers of the targeting situation give much attention to these aspects, but they’re at least as important as any other – and probably more so. I believe that by understanding the psychological methods that are used in targeting, many of the other methods will be far less capable of working effectively, and in many cases can even be defeated completely. But this first requires learning about the psychological aspects of psyops, and then personally applying certain counter-measures to avoid them. Fortunately, these counter-measures require nothing more than a knowledge of these methods and the ability to spot them in action, which becomes easier with practice to the point that these defenses become habit. The intent of this document is to help you gain the knowledge you need to allow you to start protecting yourself against these psychological ‘soft force’ attacks.
There are many aspects to psyops and the methods used, and this document focuses primarily on those that take place online, since this is where most targeted individuals go to seek help and gain knowledge about their situation, and those who are targeting them know this and obviously don’t want them to succeed, so they are constantly employing various psyop programs to defeat such attempts. This document can’t possibly cover every known psyop method that might be employed or explain any of them in any great detail, and the material provided is strictly based on my own personal understandings as a target looking in on these psyop programs from the outside. I’ve researched various related topics for background information (with some references provided), and although there’s much more that could be said, I’m certain that what I present will benefit all other targeted individuals if they take this information and learn to apply it constantly in their own situations.
What is Perception Management?
First, let me introduce some of the terminology associated with psyop programs and outline their meaning so that you’ll understand what they are, where they originate, and how serious the people are who plan and execute these programs.
‘Perception Management’ is a term that originates with the US military. The US Department of Defense (DOD) gives this formal definition:
Actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives, and objective reasoning as well as to intelligence systems and leaders at all levels to influence official estimates, ultimately resulting in foreign behaviors and official actions favorable to the originator’s objectives. In various ways, perception management combines truth projection, operations security, cover and deception, and psychological operations.”
Although the above definition refers strictly to foreign audiences and describes perception management only in a military capacity, this is a misnomer, since it has long been recognized that domestic audiences are just as susceptible to being targeted by their own governments and other organizations for a wide variety of reasons. We can see this most clearly in advertising, news, and entertainment, which are ideal platforms for implementing perception management.
A ‘Psychological Operations Specialist’ is an information and media specialist who is specifically trained (usually by the military) to assess the information needs of a target audience and then develop and deliver the right message at the right time and place to create an intended result. These specialists are primarily responsible for the analysis, development, and distribution of information that will be used for its psychological effect. They will have a team of people working under them, and will sometimes be working in coordination with other Psyop Specialists running their own teams.
In psyop programs, as opposed to more traditional military warfare, ‘soft force’ methods of covert influence are used rather than ‘hard force’ methods of direct overt attacks. Therefore, psyop programs target a person, group, or population on a psychological level, rather than on a physical level. This means that Psyop Specialists resort to various methods to manipulate a target’s perceptions in such a way that the target’s opinions and beliefs change as a result. If the attackers can alter a target’s perception of supposed facts and information, they can shape or influence the beliefs and motivations that result from those perceptions, and through that, they can control the target.
In military situations, Psyop Specialists engage in programs that are intended to affect the perceptions of a target audience, such as to demoralize an enemy by causing dissension and unrest among its ranks, while at the same time convincing the enemy population to support the side attacking them. Psyop Specialists are also responsible for providing continuous analysis of the attitudes and behavior of enemy forces to tactical commanders in the field, so that they can develop, produce, and employ propaganda in a successful manner. These tactics have proven so effective with foreign audiences that they are being employed more and more frequently on home ground, to manage the perceptions of their own citizens. We see this most dramatically in staged events like the Oklahoma City bombing, the Columbine massacre, the 9/11 tragedy, etc., which were all high-profile psyop programs that were enacted to influence an exaggerated perception of escalating terrorism in our world and particularly at home. The ultimate goal of these orchestrated events has been to influence the targeted population to give ever more power to those within their own government who secretly enact these operations, while thinking that doing so will protect them against the perceived enemy.
These teams can include a variety of people with a variety of specialized skills. According to the Journal of Information Warfare:
Put simply, most of these personnel do not have all the skills and depth of knowledge required to undertake sophisticated Perception Management operations. What they need is a range of skills covering such disciplines as marketing, advertising, journalism, theatrical production and broadcasting. It is not enough to take service personnel or civil servants and send these individuals on Government-run courses. One only has to look at the experts on Madison Avenue, in the news media and in Hollywood to see what is actually required. An undergraduate education in a related topic, followed by a long apprenticeship in the industry, is usually the minimum that is needed to be successful in these disciplines.”
From this quote, you should be able to fathom the range of skills that a psyop team can have at its disposal and the degree of sophistication that can go into a psyop program. Perception Management is not just ordinary military personnel trained in traditional warfare tactics. Those involved in planning and executing these programs might be better classed as psychologists, cognitive and behavioral scientists, marketing experts, public relations experts, special effects technicians, copywriters, etc. Many specialized skills derived from the corporate world are highly suited for psyop programs, and a Psyop Specialist knows how to employ the techniques used in these fields to manage the perceptions of their target audience.
As a targeted individual, you need to always consider yourself an adversary to Psyop Specialists engaging in psyop programs involving a wide variety of sophisticated information warfare techniques to influence your perceptions in order to control you and further weaken your ability to defend yourself or fight back. You need to recognize that your perceptions of your situation as a target are always being carefully managed through ‘soft force’ methods in order to keep you off balance by presenting you with information that is inaccurate enough to effectively limit or misdirect your perception of reality, while at the same time limiting your access to accurate information as much as possible. I will discuss how this is achieved within the following sections, but first, let me expand on what information warfare consists of.

Information Warfare

Information warfare is an aspect of all psyop programs and relates closely to perception management. In this regard, information warfare can be defined as “a class of techniques, including collection, transport, protection, denial, disturbance, and degradation of information, by which one maintains an advantage over one’s adversaries.” This definition of information warfare can be applied in any competitive situation, public or private, civilian or military.
The first step in any psyop program involves data collection and analysis. This includes collecting information on the intended target – whether a person, group, community, or entire population – and assessing such things as their knowledge, opinions, beliefs, motivations, habits, routines, emotional and intellectual strengths and weaknesses, information sources, interests, capabilities, dependencies, uncertainties, etc. The more information about a target that can be gathered, the higher the situational awareness of the attacker, which will give them greater ability to create the most effective plan of attack on the individual or group. Conversely, the less accurate the information a targeted individual or group has, the easier it will be to thwart their attempts to defend or protect themselves against an attack. Therefore, the control of information is a very important aspect of any psyop program.
In today’s digital world, data collection by a Psyop Specialist is extremely easy and can be very sophisticated, since almost every means of communication and information storage is potentially accessible and exploitable, and the powers-that-be who initiate these psyop programs have the means to easily do so without detection. Everything you might say or do, online or off, can be monitored and analyzed in order to provide whatever information might be desired. After enough data has been collected, a person or group’s actions can be predicted with a very high degree of precision. With the ease of computer automation, data collection and analysis can be conducted in real-time, and prescribed responses can be decided and initiated instantaneously or precisely timed for the greatest effect.
This leads to the second step in information warfare, which involves information protection through denial and disturbance. One of the main aspects of information warfare is the need to minimize the amount of useful or accurate information to which a target has access. As a targeted individual, your attackers will therefore want to minimize the amount of useful and accurate information you have access to that might enable you to understand the true nature of your attacks so you can defend yourself or fight back. This might involve limiting your sources through ‘denial of service’, by which you are denied access to certain sources (particularly online) through apparent communication breakdowns, but more commonly (in order not to raise suspicions) it is just as easily affected through ‘information overload’, where you are provided access to an overwhelming amount of information, where much of what seems useful is actually false or misleading, while the majority of it is useless in that it is irrelevant and/or overly repetitive. A large amount of information that is made available to a targeted individual or group can thus keep them from learning anything useful or relevant to their needs by bombarding them with excessive amounts of useless and distracting information, wasting their time and keeping them from acquiring what they need to know in a timely fashion.


The third step in information warfare is information manipulation through degradation. The ultimate goal in information warfare and perception management is to degrade the opponent’s perception of reality by way of inaccurate information, so manipulating perceptions through the continual denial or distortion of accurate information is employed rigorously. Again, this can be achieved largely through computer-automated systems that alter or filter information content before it reaches a target, but, as stated, it is also achieved through the heavy dissemination of inaccurate information where it will most likely be picked up by the targeted person or group it is intended for. The growing degradation of accurate perceptions leads to the incapacitation of the target to properly understand their situation so that they become less and less capable of defending or protecting themselves against their attackers. Over time and with the continued manipulation of information that the target receives, and by continually monitoring their responses to what they have so far acquired, this degradation can be increased until the target is completely incapacitated and their perceptions are totally misaligned with the reality of their situation. They become intellectually isolated more and more and incapable of properly dealing with their situation or making sound judgments. This forces them to seek out sources that might better provide the information they need, and in the online community, this will lead them into groups with common needs and interests. However, these groups are also susceptible to being targeted, and might even be set up for the purpose of drawing these targeted individuals in and identifying them, thereby gaining further control over them. I’ll discuss online groups in more detail in the sections ahead.
Although some forms of perception management might be achieved through a single well-placed piece of information such as a heavily disseminated report from a highly trusted source, there is actually a far greater likelihood of achieving it through the cumulative effect of many iterations of that information coming from many apparently separate (and far less reliable) sources over a long period of time. This is commonly seen within the targeted community where many people will make the same or similar claims, thus seemingly giving weight to the believability of the information. The old adages of ‘strength in numbers’ and ‘say it long enough and loud enough and eventually it will be believed’ both apply here. In this case, the reliability of the sources of the information is not nearly as important as when it derives from a single source, which must be already perceived as highly reliable in order for the information to be accepted as true. When the information comes from multiple sources and repeated over a long period of time, no matter the reliability of the sources, the effect is just as good, and often better. It just takes more time to have its cumulative psychological effect.
Whatever the information might be that is intended for a target audience, it must have maximum appeal in order to be accepted by them. Therefore, it must be entertaining to their interests in order to capture their attention long enough to deliver the underlying message. This does not preclude the employment of the entertainment industry to inject messages into the storylines, dialogues, and imagery of movies and TV shows. Again, the cumulative effect is often more successful than a single one-time effort, so that conditioning an audience to perceive reality in a certain way through the use of entertainment media is likely to be a part of any large-scale psyop program.
Further to all this, the Journal of Information Warfare states:
Whereas IO [Information Operations] operators in the past could focus on relatively limited and well specified targets, they now need to understand many different potential audiences in terms of channels that will reach them and messages that will persuade them. …[T]here may be a need to develop media outlets that are attractive in their right and can compete with local media in quasi-commercial terms; that is by providing content that is attractive, credible and interesting to target audiences.”
This means that every potential media outlet will be taken advantage of, specifically new and developing outlets that are internet-based. Youtube videos and podcasts are two such outlets that are being used to great effect to capture target audiences and disseminate carefully crafted information that is designed to manage audience perceptions. They thrive by promoting certain front-line ‘spokespeople’ who act as leaders and information sources in the online community. I’ll discuss these leadership roles in a later section.
It’s human nature to fall into the routine of always going to the same places for information and entertainment, and of following the same interests over a long period of time. Worse, it’s human nature to fall into the habit of avoiding what we aren’t familiar with. This means that we tend to be drawn to the same sources and the same subject material to the exclusion of all others. It is very common in the targeted community to keep searching through the same type of material on the same subjects in the hopes of coming across any new nuggets of information among the repetition. Targeted individuals need to be aware of doing this, and to vary their sources and take a wider interest in information that might be only partially related to their current interests or focus. A broader understanding of related material will allow you to compare your current beliefs against other possibilities to gauge their accuracy and allow you to make necessary adjustments.
One more thing that needs to be understood is that whatever version of the truth we hear first will have a strong effect on what we believe, even after we hear other more accurate versions later on. For instance, if you hear about something for the first time, what you hear will tend to be already accepted when you hear later versions, and the first version will influence how you interpret those later versions. This is taken advantage of in psyop programs whenever possible by introducing a credible sounding false version as soon as possible and before more accurate versions can be disseminated. If the first version can be introduced through a source that is already highly trusted by the target audience, it will be all the easier to affect their perceptions in spite of later, more accurate versions. Even where a target might have a negative reaction toward any given first version, that predictable reaction will likely be calculated into the attacker’s plans, leading the target to believe the opposite.
As a targeted individual, you need to always bear these facts in mind when considering any piece of information related to your targeting.

Manipulation Through Words and Images

PSYOPS targeting in today’s age can be precise – mass PSYOPS need no longer be the primary means to conduct information dissemination. The Internet, email, personal computers, paging systems, cellular telephones, CD-ROMs, allows the modern PSYOPS practitioner to target specific segments of the population – even individuals. Today’s marketing firms still use mass mailings but with the message modified to correspond to the changing incomes, ethnicity, family situations, etc., of specific population segments. Many today seek information through hundreds of television channels, radio stations, the Internet, or printed media. Specific PSYOPS targeting, exploiting the diffusion of information dissemination can be more effective than older methods and lessen potential ‘information collateral damage.’” – Journal of Information Warfare
Words and images are the fundamental weapons used in information warfare and perception management. They can be crafted in a variety of media formats using a variety of styles and a variety of techniques to influence the perceptions of a target audience in a variety of ways. As part of a psyop program, words and images are used to alter or reinforce particular opinions, attitudes, or beliefs in a target audience. A Psyop Specialist knows that a message that is stated often enough and loud enough and soon enough will have its greatest effect on an audience, and so part of their job is to get that message before their target audience in as many ways as possible and as often as possible for the greatest possible effect.
Since the purpose of psyop programs is to induce or reinforce thoughts, beliefs, attitudes, and behaviors favorable to the originator’s objectives, whatever can help to achieve this end will likely be employed in a ‘soft force’ psychological attack of words and images. Perception management starts with key facts and ideas that provide the foundation for an alternate version of reality, and applies a number of psychological techniques to change perceptions and sway an audience into believing that version of reality. Words and images are crafted to encapsulate ideas, and there are a wide variety of techniques that can be used to present these in order to influence an individual or group to think in certain terms and to believe certain things while disregarding others. We’ll be looking at some of those techniques throughout this document.


New words or phrases are created to symbolize specific ideas, attitudes, opinions, etc. They simplify our ability to talk about things by encapsulating the information they represent. As they become more familiar with repeated use, they tend to influence our thoughts and perceptions by the way we interpret and apply them, and this is routinely taken advantage of in psyop programs. Through their repetitive use in specific contexts, they can be used to mold and influence the thoughts and beliefs of a target audience. Over time, they can become part of a larger lexicon used within that group.


Certain words and phrases can be introduced in specific contexts so as to give them specific meanings – usually with the effect of limiting or distorting their original and more accurate definition. Some examples of these crafted words and phrases that we regularly encounter in today’s world are ‘terrorist’, ‘mentally ill’, ‘politically correct’, ‘national security’, ‘conspiracy theory’, ‘UFO’, etc. Each of them conjures up in our minds a specific image or idea that has an effect on formulating our opinions about whatever material they’re inserted into and associated with. The effect of their use is very often completely unconscious, so we don’t usually recognize how they mold our thoughts and limit our ability to communicate ideas. These specially created words and phrases distort the meaning of any information an audience receives once that audience has been conditioned to think in terms of them. Psyop Specialists know all this and will use this knowledge to their advantage in managing the perceptions of their target audience.


For example, when most people hear the term ‘UFO’, they automatically think of it in terms of extraterrestrial craft, and rarely consider the proper, more general meaning of ‘unidentified flying object’, which could refer to any airborne object whatsoever – from a plane to a bird to a helium balloon – as long as it’s airborne and what it specifically is remains unidentifiable to those seeing it. This misinterpretation of the term (through both innocent and purposeful misuse) has been hugely taken advantage of by the military and their media assets for a long time, in order to build up a false understanding in the public mindset so that its use automatically leads to the assumption that extraterrestrial craft are being referred to when such is not necessarily the case.


This applies as much to any of the examples given above. At the same time that they’re first introduced to an audience, these words and phrases are usually presented in a specific context in order to further add to the perceived meaning for the intended effect. In the case of the term ‘conspiracy theory’, this has been largely applied to influence the public to ridicule anything that suggests government conspiracy. The term ‘terrorist’ has been used to create the image of bomb- or gun-wielding mercenaries or ‘lone nuts’ who target people violently, indiscriminately, and without warning. The use of the term ‘mentally ill’ has effectively led the public to think only in the context of people who are out of touch with reality and incapable of thinking for themselves. The term ‘politically correct’ has been applied in order to limit what can and can’t be said or discussed in formal public dialogues, and the term ‘national security’ has come to be nothing more than an excuse for excessive government secrecy. But these are only a few of the endless number of words and phrases that are constantly being created and introduced into the public mindset to narrow and alter thoughts and perceptions. This serves to control our thinking and communications within a limited predefined context that avoids the consideration of other possibilities.


Images are another tool for manipulating perceptions. As with words and phrases, images can be used to great effect in psyop programs. An image can be made to convey a specific meaning when it’s repeatedly presented in a specific context until such a point that it takes on that context. When it reaches this point, it has become a symbol (just as words and phrases are), and has far more specific meaning than it would otherwise. For instance, the image of the Twin Towers in New York, with (or even without) heavy smoke pluming out of them, conveys a much stronger and more specific message than it would if the 9/11 tragedy had never happened. With the added image of Osama bin Laden associated with it, the meaning is extended and certain deeper contexts are conveyed. In the same way, an image of a hovering flying saucer in all its physical detail (whether real or faked) conveys a much stronger sense of realness than a tiny spot of light in a dark sky, which in turn is better than just the description of such a scene. Images can be far more powerful than words and bring a greater sense of realism to an issue when presented in the right context at the right time. Today’s computer software allows digital mages to be easily created or altered so that it’s virtually impossible to differentiate between what’s real and what’s fake. In order to counter the effects of words and images, you need to become more consciously aware of how they can influence our thoughts and perceptions by paying attention to how you react to the things that you hear and see. The more you understand the techniques used and how you’ve been reacting to them, the better you can defend yourself against them in the future.*
As with all psyop programs, the resulting effect of words and images is what’s important, and the manner used to introduce them is of secondary concern. There are many ways to use words and images to manage perceptions, not limited to what is described above. Some of these are far more sophisticated and involve more carefully crafted presentations that manipulate the target audience’s thinking processes so as to insert information directly into the subconscious at the right moment, while the logical processes are temporarily suspended and right-brained thinking is dominant (this isn’t referring to subliminal inserts, although they have a very similar effect). Many of these more sophisticated methods are far more commonly used in visual presentations, rather than in written material, but in many cases they can be incorporated into either.


There are two particular things you need to always be cautious of in the presentation of any information, in any media format whatsoever. These are its emotional content and its suggestive content. I’ll elaborate on these further, but let me first provide a few actual examples that I’ve selected randomly but which should be familiar to many targeted individuals:
Example 1:
People are suffering and dying! They are being attacked by invisible forces and they have no way to protect themselves! This is a slow-kill attack against innocent people! It’s cruel and inhuman! Little children are suffering! The authorities will do nothing about it, and if you complain to them they’ll just label you as psychotic! There is nothing you can do and no way out!”
Example 2:
Please help me. For years I have been stalked and tortured by agents who have always and inexplicably remained out of reach. They have been attacking me from behind the walls or ceilings of the apartments or hotel rooms that I have had over the years, by directing some form of energy pulse at me, as well as seemingly causing my bed to subtly vibrate. They mainly bolster their attack when I’m trying to sleep, but they’re here, 24/7.”
First, let’s consider emotional content. Simply put, this is anything that causes an emotional response in someone reading or viewing particular material. It’s used to elicit certain specific emotional reactions that will lead a person to have certain perceptions or draw certain conclusions with little or no logical justification. Material such as in the above two examples (particularly the first one) will elicit certain mental images and emotions in its readers that will have a psychological effect on their reactions, molding their perceptions of the situation – the more so if they can already relate to what’s being stated. Although the statements might be the complete truth or they might be a pack of lies, the reader really has no way to be sure either way, and worse, the excessive emotional content does nothing more than exacerbate a targeted individual’s own emotional state by amplifying their sense of reality about their targeting. There is absolutely no useful information contained within the first example. Its purpose is purely to influence through the emotions with its excessive alarmist content. This tactic works because it causes the person who receives the information to react through the emotions, rather than the intellect.**
Now let’s consider suggestive content. This refers to information that is not provided by the source and must be assumed by the reader. Suggestive content refers to what isn’t being said. It’s where the meaning is implied, where the reader or audience must fill in the gaps, draw inferences, make associations to derive meaning, etc. It’s where facts must be extrapolated, generalizations must be made, or where something is likely be taken as fact or meaning a specific thing when it may not. In both of the above examples, there’s a lot of suggestive content that most readers won’t even realize because we’re already conditioned to one degree or another to fill in what’s missing by making automatic assumptions. The first example leaves the reader to fill in a great deal in order to be able to understand and relate to the message, while the second example gives more detail, but still leaves out a great deal of information that must be assumed by the reader.


I’ll focus on the second example here because its suggestive content is less obvious. First and foremost, as targeted individuals who can relate to the experience described, we’re left to assume that the writer is being totally honest in describing his attacks. Second, we’re left to assume that he has somehow verified the method of his attacks, i.e. energy pulses. Third, we’re left to assume that he somehow knows that his attackers are at the location he claims, and that they are, for whatever reason, out of his reach. The message is filled with suggestive content, which is left to the reader to make assumptions and trust is accurate.


Further to all of this, the tendency to believe a complete stranger is always much higher if what they state closely matches to what we already believe. This makes it easy for us to become grounded in certain beliefs by being constantly presented with many claims by different people suggesting similar things to what we’re already familiar with or what we already believe. Always keep this in mind when you’re visiting online forums where you’ll come in contact with a large number of posts from strangers who make claims that you can already relate to. A Psyop Specialist and his team can generate a large number of posts in these forums to make a targeted individual feel that they are among like-minded people who believe similarly, and this can be used to slowly lead the targeted individual further off track as they come to accept these posts as confirmation of their own perceptions.


Although the two examples above might still be somewhat limited in their emotional content or suggestive content, they provide good examples of the sort of influential information that’s used to manage the perceptions of a targeted audience. Remember what was explained earlier, that Psyop Specialists have access to everything you might do or see in your daily digital activities, including the amount of exposure you might have to material similar to the examples above and how you react to it, and this can all be automated through computerized monitoring and analysis systems.


With the repetitive introduction of material containing a similar message to a target over time, the information in the message becomes grounded into their beliefs and perceptions. With the continual refinement of informational material supplied to a target based on their specific individual habits, routines, beliefs, interests, attitudes, and developing body of knowledge, and with the elimination or reduction of any contrary information by controlling their sources and what those sources disseminate, their perceptions can be managed and they can be led further and further away from the reality of their situation until they’re in a position where they’re completely defenseless against their attackers and fully under their control. I’ll delve deeper into this aspect of psyop programs in the sections ahead.


There are many tricks that are used to present a false perception of reality, and another one that you need to be especially careful about is the use of personal experiences to legitimize perceptions. Very often in the online targeted community, people will present an interpretation of their personal experiences based on their own personal beliefs and perceptions. They will use their experiences as reason to justify their beliefs, and worse, will expect others to see their experiences in a similar way. Any suggestion that their perceptions are off will be taken as an insult. As innocently naïve as they may be, they do damage to the perceptions of anyone else who has similar experiences or beliefs, and who might justify this as further evidence that their own perceptions and beliefs are valid. The problem with all this is that these are subjective interpretations that lack any objective analysis (at least where none has been provided), and depends on the infallibility of the experiencer’s judgments. No amount of agreement about how they are interpreted will make that interpretation any truer, although many people think that volume (number of people believing something) equals weight (believability) when it really doesn’t at all. Psyop Specialists will take advantage of these sorts of personal experience stories by seeking ways to encourage targeted individuals to read and/or post them. This not only has an effect on the perceptions of others, but it serves to give Psyop Specialists a great deal of information about the individual’s beliefs and perceptions, which can be further taken advantage of.


Another thing to watch for is information that’s almost entirely supported by established fact (such as the known laws of physics), but then goes a step further and introduces material that’s beyond anyone’s ability to verify, or doesn’t actually match the facts when we look more closely. This false piece of information will be presented in such a way that it can be easily assumed to be fact, and so it will likely be overlooked. This is most common when the source of the information is highly trusted and has been relied on heavily for information in the past, and where that information is believed to have always been good. When such a trusted source is found to be passing false or questionable information, it signifies that past information from that source has probably been tainted also, and you should reconsider everything that you have received from that source in the past.


Some other things to watch for:
Alarmist content/excessive intensity
Using extremes, ignoring grey areas
Using rhetoric or opinion as filler material
Drawing unwarranted conclusions
Using false analogies
Remember that psyop programs will involve the management of perceptions through the employment of a skillfully crafted presentation of words and images using a variety of styles and methods to convey a consistent theme that will lead to an intended result. These words and images will be consistently repeated again and again over time so that the target audience will begin to think in terms of a certain version of reality and accept that version as true. This will often take place over an extended period of time while continually manipulating the target audience’s beliefs and perceptions to put them more in line with a version of reality that’s completely out of sorts with the truth. The task of establishing a supportive foundation for an alternate version of reality is another important aspect of perception management, and will be discussed in the next section.
* Note: The advertising industry has developed many techniques over the years to influence consumers, and these techniques have come to be applied and adapted to all forms of media for all sorts of influential purposes. By studying how advertisers, the news media, and the entertainment industry influence our perceptions, you can learn a great deal that will assist you in deflecting these ‘soft force’ attacks. But most importantly, be aware of their use in any information that is directed specifically at the targeted community.
** The human brain evolved in three stages, with instinctive mechanisms being the earliest and which deal strictly with survival responses (i.e. fight or flight), followed by the emotional mechanisms that deal with a wider variety of situations but are still highly automated responses, followed by the intellectual mechanisms, which evolved in order to provide better responses to complex situations that entail a broader number of conditional considerations. The brain is wired in such a way that the intellect can override an emotional response and allow a person to better deal with a situation through calculated thought and planning. This means that when you respond to something based on emotion, you are not always responding in the best way possible.

Information Plants

Early on in most psyop programs is the careful preparation and placement of key pieces of information that will be used as the foundation for establishing certain beliefs within a particular target audience. These key pieces of information are used as props to give legitimacy to what will be introduced later on. They are often planted in advance, sometimes as part of a prior psyop program that doesn’t appear to be directly related to a later one. This is best understood through some real-life examples.


Soon after the start of the war in Afghanistan, the Al Jazeera TV network was set up, presumably as a local effort by the Afghanis to keep their people informed in the face of the war. The US military and intelligence arms allowed it to continue to exist while publicly voicing concerns in the US media that it was a propaganda outlet of the Al Quaida network and it needed to be taken out. This had the effect of managing the perceptions here at home that it wasn’t under covert control by the US because they were begging to take it out. After this false perception among the targeted US audience had been achieved, Al Jazeera TV happened to present a videotape of Osama bin Laden confessing to the 9/11 attack, which was presumably intended for the Afghani people, and more specifically, for Al Quaida, in order to incite them. The response by the US government to the video was to pretend that it wanted to suppress it, using the excuse that it might contain hidden messages to terrorist ‘sleeper agents’. This led to it being immediately broadcast by western news outlets, conveniently using the (false) pretext that the democratic media only seeks to present the truth, no matter what. So the video ended up being released to the US public and accepted as a piece of information that had all the credibility needed for the effect it was intended to have on its target audience – the American people – to lead them to believe inarguably that the 9/11 tragedy could only have been orchestrated by Osama bin Laden and no one else. Case closed. After all, who can argue the audio/visual presentation of Osama bin Laden himself admitting to the act? Only later, after this planted material had already achieved its intended purpose, did the questions of possible media manipulation finally begin to be heard. These questions weren’t on most people’s minds at the time that they saw the tape. They weren’t thinking in terms of look-alike actors or audio dubbing or digital morphing technologies. But these things are fast becoming the ordinary tools of the trade in modern-day psyop programs, and they use them primarily to create key pieces of information that will be used as props in the management of perceptions during a psyop program.


The 9/11 tragedy that led to the war in Afghanistan was itself a psyop program, and key pieces of planted information can be found throughout the evidence that supports the ‘official’ story regarding this tragedy. One of these was the ‘discovery’ among the building rubble of a passport belonging to one of the alleged hijackers/terrorists who supposedly flew one of the planes into the towers. This came at a moment when questions were being asked about the quick conclusions that were being drawn about the identities of the presumed attackers. It was an information plant that served to provide evidence that the ‘official’ story was accurate and those who were presenting it were to be trusted, thus helping to nullify the consideration of any alternate possibilities.


The UFO/ET phenomenon is another case study of how planted information is used to build a foundation for false perceptions, and although detailing it in terms of a psyop program would take far too much space within this document, it should be fairly clear to most readers how various key pieces of information related to it – innumerable reports of sightings in the media, alien abduction reports involving apparent cloning, hybridization, and implants, reports of cattle mutilations and crop circles, the MJ-12 documents, and a great deal of other supposed evidence in the form of declassified government documents, photographs or videos of UFOs, and other artifacts – have cumulatively led to the greater belief in an extraterrestrial presence and the existence of alien technologies that surpass our known physics. Many aspects of this UFO/ET phenomenon that were developed through various psyop programs have since been incorporated into various more recent psyop programs centered on certain subsets of the larger ‘alternative’ community that has emerged over the years. For instance, the belief that many people are being implanted with electronic microchips has its roots in the alien abduction phenomenon, which developed out of the UFO phenomenon. As well, the belief that people are being cloned, that many of our government leaders are shape-shifting reptilians, that back-engineered alien technologies can explain the otherwise unexplainable aspects of many target’s experiences, etc., have all served to allow psyop programs to develop as offshoots of earlier programs based on the same general foundation of ‘proof’. A psyop program will take advantage of the most popular errant beliefs and misconceptions that have already been established among a target audience, as well as through the use of skillfully crafted and well placed pieces of information that will help to give these beliefs the appearance of legitimacy.
Other examples of key information plants exist that are more relevant to many targeted individuals. I’ve rooted out a number of these in the course of my research, and it’s certain to me that there are many others to be discovered as well. One of these that I’ve identified, which many targeted individuals rely on to support certain beliefs about the technologies used in their targeting, is the 1976 Robert G. Malech patent (and others similar to it), which describes a method of remotely reading and altering a person’s brainwaves. The technology described in this patent has been referred to time and again as ‘proof’ that satellites are being used to read people’s brainwaves, when in fact this patent is only describing a conceptual idea and was never a tested invention. The truth is hidden in the details, and most people will tend not to look very deeply into the details of something, especially when those details seem too complex for them to understand. I’ve researched the details of the Malech patent and the technology described in it and have explained in other documents (see the reference section) that the patent only describes a conceptual invention and that the technology will not actually work as described. But the patent is a key piece of information that was very possibly planted in the patent records so that it could be used in various psyop programs to manage the perceptions of targeted audiences by making it appear that such technologies exist.


Another likely information plant, which relies on the Malech patent to support it, is the 1992 lawsuit testimony of John St. Clair Akwei, which has also helped to manage the perceptions of many targets into believing that certain technologies exist and can do as is often claimed, and this has served to lead people in the wrong direction and into deeper traps. In the case of Akwei, because he had allegedly worked for the NSA, and because he claimed that the NSA was targeting him with similar technologies to those described in the Malech patent, and because he went so far as to take his case to court, many targets automatically assume that the technology he describes and everything else he claims in his testimony must be legitimate. But the details show that his case was indeed frivolous, as the judge presiding over it had declared. Akwei’s written testimony, which is available online, is filled with little more than emotional and suggestive content and offers no supporting facts or evidence that would give him some legitimacy. It’s far more likely that Akwei was playing a part in a psyop program, and the intention of the lawsuit was for no better reason than to put certain information into government records in order to give seeming legitimacy to that information that would help to mold certain false beliefs and give them a stronger foundation of legitimacy.


All media formats are routinely used to circulate carefully crafted and purposely planted information that can act as props in innumerable psyop programs that each serve to instill false perceptions in a targeted audience. Over time, and with the layering of further supportive information and props, these perceptions become ever more believable. A skilled Psyop Specialist can apply a myriad of tricks and techniques to nurture the development of various distinct belief systems that suit particular predilections within a target audience, and the use of planted information is the primary method of building the foundation to support that belief system. They have developed a number of ongoing belief systems, and these belief systems diverge from each other and separate a larger target audience into various subgroups based on individual beliefs, interests, preferences, etc., all of which can be determined by various sophisticated profiling systems that a Psyop Specialist has within his arsenal of ‘soft force’ weapons. This is also where a Psyop Specialist will take advantage of his knowledge of group dynamics. Let’s consider profiling systems first, and then we’ll look at group dynamics.


Data Collection and Profiling

In the business world, the subjective is determined using focus groups, surveys, sales- force feedback, competitive analysis and even industrial and market psychologists and profilers. The same tools can work just as well in the IO [Information Operations] environment. […] Developing audience analysis and profiles is both an art and a science. It is also absolutely critical. Information Warriors, like marketing professionals, are looking for anything about the group psyche of each different audience that will help them to get inside their heads. […] Each of these audiences is important. Each is radically different. Yet you must understand each; you must understand that the message that appeals to one group may well be a turn-off to the other; and you must get that message inside their heads in a way that will get them to follow through with your desired response. […] The goal of audience analysis is to create a profile of people so that you can determine what messages will be needed. In short, you have to find their ‘hot button’, their passion, or – to be cynical – their price. Once you have developed profiles of each of your audiences and determined these ‘hot buttons’, it’s time to get inside their heads. You do this with messaging.” – Journal of Information Warfare
The above quote reveals a lot about what’s involved in information warfare in our modern age. It’s important for Psyop Specialists to understand as much as possible about their targets, both individually and as a group. For this reason, it’s important to understand the power that automated data collection and profiling systems give to a Psyop Specialist, since this is a key aspect of all psyop programs. Computer technology and digital communications provide the ability to monitor both individuals and groups and analyze the information gathered in order to determine how best to manipulate their perceptions for whatever purpose desired.


Profiling starts by collecting a large body of data on the targeted individual or group. This will include their opinions, beliefs, level of knowledge, what motivates them, their habits and routines, their emotional and intellectual strengths and weaknesses, the information sources they rely on, their interests, likes and dislikes, capabilities, dependencies, fears, expectations, uncertainties, etc. This information is analyzed using sophisticated software algorithms that help a Psyop Specialist to determine the best methods of attack in managing the perceptions of a targeted individual or group to lead them in a desired direction to achieve a certain end. The means to accomplish this can include all of the techniques described in this document, and these techniques rely on the ability to understand the target, particularly on a psychological level. The sophisticated data collection and analysis systems available to a Psyop Specialist are able to reveal far more about a target than the target will even know about themselves.


At the heart of the data collection process are systems like the NSA’s ECHELON surveillance system, which monitors all global communications in real time and stores selected information based on certain given parameters such as key words and phrases, specific sources or destinations of communications, etc. This information can then be analyzed more closely using more complex software algorithms that look for specific patterns.


Further analysis of this information using various other computerized systems will be performed, and a constantly updated file of useful data can be compiled on any group or individual. These computerized logic systems can filter out whatever information might be desired, and very accurate profiles can be compiled on every targeted individual, allowing them to be classified into various groups based on specific characteristics.


Another very powerful weapon in a Psyop Specialist’s arsenal is the Psychological Assessment System (PAS), which was developed over many years by the CIA’s behavioral psychologist Dr. John Gittinger. PAS is based on IQ test scores, and allows a wide variety of personality traits and predictable behaviors to be accurately defined. The PAS was designed specifically for determining how to compromise a person and take advantage of them. It has been used very extensively over the years, from assessing the aptitudes of university students, to selecting and managing corporate employees, to selecting police officers, military personnel, and intelligence operatives for recruitment and assignment to specific positions or tasks, to identifying and handling individuals for specific mind-control programs. An extensive database of test scores has been compiled over the years so that the system is able to chart all aspects of human behavior and individuals can be profiled and categorized into groups based on matching their known personality characteristics to the accumulated test scores. The information derived from these comparisons define categories that include such things as what a person’s greatest fears are, what motivates them, if they’re good role-players, if they’re easy to hypnotize, if they’ll be loyal or if they might pose a threat, if they have sexual or criminal deviancies or if they are morally rigid, if they can be influenced to act a certain way and how it can be influenced, etc. Almost anything can be determined about an individual’s personality with this system, to an amazing degree of predictability. The prime objectives for using this system are control, exploitation, or neutralization, making it an ideal tool for use in psyop programs. The database of accumulated test scores in the CIA’s possession has become large enough and refined enough over the years that individuals who haven’t taken any formal tests can still be accurately assessed by analyzing their behavior under various circumstances and looking for specific patterns that correspond to those determined by the PAS tests.
With sophisticated computerized systems like those described here, data collection, analysis, and profiling become easy and a great deal of insight can be acquired on any individual or group. Virtually any type of data can be collected and predictable behaviors can be determined and vulnerabilities can be exploited. These systems are very useful for determining audiences to target by categorizing people by their profiles.


The Targeted Community and Group Dynamics

All the goal-setting, audience analysis and strategic message development is worthless unless you undertake an aggressive dissemination campaign. This means you have to get your message out, get it to the right audiences, and to do it with ‘reach’ and frequency.” – Journal of Information Warfare
In order for a Psyop Specialist to effectively manage the perceptions of a target audience, they often will first need to identify their audience using data collection and profiling systems. Once a large target-base has been identified that shares certain desired profile characteristics between its members, more refined selection processes can be employed in order to narrow down the primary target-base to a core group that will be the most exploitable. A large target-base can contain numerous distinct subgroups that will share some profile characteristics but diverge on others, so that different psychological profiles might be used to classify people into different groups that can be targeted and exploited in different ways for different purposes.


Being able to isolate a targeted group is crucial to a psyop program, and this makes the internet particularly useful for their purposes. People with similar beliefs and interests tend to gravitate into distinct groups, and all groups follow certain known dynamics that can be exploited by a Psyop Specialist. In the online community, where groups form very easily around any common interest, this poses serious dangers for people who are already targeted, since their targeting will likely follow them online.


As targeted individuals become aware of their situation and begin to seek to better understand it, they’ll soon discover the larger community of targeted individuals that exists online. At the same time, they’ll begin to discover an overwhelming amount of information related to targeting that proliferates among this community. Naturally, they’ll want to know how to make sense of their targeting (what to believe) and how to deal with it (what to do) and they’ll seek out people and places where they can get advice and support. Online support groups for targeted individuals abound, and targeted individuals seeking information and support are therefore naturally drawn to them. These groups give the participants a social identity and a sense of empowerment through a sense of ‘strength in numbers’. This is something that targeted individuals need due to the isolation that has already been imposed on them. This coming together into a group based on common interests is the first stage of group dynamics, and leads to situations that a Psyop Specialist can take advantage of.
One thing that is common about online groups is that their members tend to rely on the same or similar sources for information that relates to their common interest, and these sources tend to become focused on by the group to the exclusion of most others. This can be taken advantage of by a Psyop Specialist if they can manipulate the source in order to control the information that is disseminated. How this can occur will be described in more detail further on.
Once a group forms around a common interest, the next stage of group dynamics sets in. When a number of people come together around a common interest or cause, one of two things can eventually happen: either the group will agree on most or all of the major issues related to their cause, or there will be significant dissent that forces the group to split or disintegrate. But if the group is cohesive and the participants agree on most issues and hold the same beliefs, they’ll begin to stifle any opposing views because these opposing views threaten the harmony of the group. This is known as ‘groupthink’, and when it sets in it poses certain dangers that a Psyop Specialist can exploit. The most common danger of groupthink is that it can easily lead to impulsive decisions by members of the group and a failure to identify and/or properly consider all sides of an argument before drawing conclusions. In the case of targeted individuals, this often equates to impulsively going along with what the majority of the group believes about their targeting experiences – what technology is being used on them, what it is capable of, who the perpetrators are, what information sources are reliable, etc. – while neglecting alternative possibilities.
At this point, group polarization is setting in, which refers to a group’s tendency to lead itself into extreme positions. A group will get so focused and energized about their activities (what they believe, what they’re doing about their situation, the people they’re involved with, etc.) that it creates an internal fuel that pushes the group forward faster than it would normally and usually in ways that will result in unreasoned thinking or action. In terms of a psyop program, this makes online groups ideal places for leading targeted individuals into extreme positions regarding their beliefs, serving to coalesce them into an even tighter group. Groupthink causes the group to shut out any alternative ideas or opinions, making it ever harder to bring any of the participants back around to a more realistic perception of their situation and experiences. In extreme cases, and with the right direction, such polarization can easily lead the group into forming into a full-blown cult. I’ll talk about this in a later section.
Group cohesion relies on another principle of group dynamics. Once a group of people forms around a common belief or interest, there’s an opportunity for leadership roles to be established that provide the motivating force needed to carry the group forward to some perceived end. Without some form of leadership, any group will degenerate as fewer and fewer participants are motivated to take part in its activities. This need for group leadership increases as the group gets larger, since group dynamics naturally tend towards less participation by each individual as the group’s size increases and activity becomes spread out between more participants. Individual contributions lessen as group size increases. Therefore, as the group grows, some form of leadership becomes more and more necessary to hold the group together and keep it focused on its common interest.
This is when a Psyop Specialist will introduce someone who can take the leadership role in the group, or otherwise co-opt whoever already serves as its leader. In the online targeted community, these leaders usually take the form of high-profile spokespeople who often claim to have professional qualifications and/or special knowledge related to the interests of the group. The people in these sort of leadership roles also manage to get heavy publicity and develop large followings rather quickly. They produce a continual stream of material for dissemination among their followers, often in the form of lectures, interviews, and articles, and they’re the predominant source for most of the information that their followers receive and use to form their beliefs. Unfortunately for their followers, but ideally for a Psyop Specialist, these high-profile leaders remain almost completely out of reach of their audience and it’s therefore hard to ever question them directly about the information they present. They rely on their credentials, popularity, and ability to continually spew out a never-ending flow of material that keeps their target audience captivated. More than anything else, people are drawn to these sort of leaders simply because everyone else seems to be, and because they seem to be very knowledgeable and up-to-date on subjects of interest. At the very least, they serve to entertain the interests of their audience, and many people are subconsciously attracted to them for this reason as much as any, which a Psyop Specialist knows.
These high-profile leadership roles are best suited for disseminating information that will influence the beliefs of their audience, but due to group dynamics, the large followings they tend to generate eventually cause distinct subgroups to develop, which can disrupt the cohesion of the larger group if things aren’t managed properly. The most obvious thing for a Psyop Specialist to do is to filter members into separate groups based on their divergent beliefs and opinions, with new leaders developed or introduced for the new groups. Thus, we see many different high-profile spokespeople arising online, and new ones arriving on the scene as old ones fade out of the picture as the climate changes and new psyops are implemented.
Studies of group dynamics reveal that group leaders will usually only be accepted if they first conform to the group’s standards (their rules and belief system), thus gaining the full trust of the group. Only then will they have earned the group’s confidence enough that they can begin to introduce new ideas that will lead the group in a desired direction without much thought or questioning. Consider this in terms of the purposeful introduction of false information that’s intended to further lead the group away from reaching any solutions. Perception management will be very effective at this point, and virtually any information that a trusted leader might introduce will be accepted with very little further consideration.
Currently, there are innumerable groups that exist online that cater to the targeted community. They are all at various levels of existence with each having its favored leaders and its own level of cohesion that reflects the uniformity of the participant’s beliefs. Many other groups are very loose and participants regularly come and go and there’s little uniformity of belief among the participants beyond a certain level, although there will still be many commonalities between their beliefs that reflect a certain level of cohesion. Loose groups don’t have any real leadership roles, so the activities within these groups are usually minimal and unorganized and they have no momentum to achieve anything beyond being a place to share information and give mutual support. From a Psyop Specialist’s perspective, these loose groups will be used primarily for monitoring targets and collecting data on them. This data collection can include testing responses to various ‘soft force’ methods of attack.
The degree to which a group is successful depends largely on the number of members who hold certain common beliefs between them, but the more specific the beliefs become defined within the group, the likelier they will begin to diverge. Think of this in terms of the high-profile personalities that exist in the targeted community in the form of spokespeople and the large audiences they attract through the information they disseminate. Although they don’t generally promote a very specific belief system, they serve to gather an audience with a broad set of beliefs that contain many similarities, and this audience acts as a target-base that can be exploited further. If you follow one of these online personalities (i.e. Alex Jones, Dr. John Hall, Jesse Beltran, etc.) and gobble up every word they say, and you buy into it because it comes across as very professional and because so many others are giving them attention and seem to believe them, then you’re falling into the group dynamics that leads to the potential for further exploitation. This is why these high-profile personalities are out there, getting lots of special publicity that a person can’t ordinarily get, always busy disseminating information that keeps their audience captive and supports the beliefs most common to the entire group. These front-line spokespeople are used in psyop programs to identify a more refined target audience that’s more likely to be influenced by certain types of information and believe certain falsehoods, and these people are sought out from within this larger audience and targeted more selectively to lead them deeper into the trap, drawing them into groups more aligned in their beliefs where they can be worked on more thoroughly while isolating them from other information sources. So although high-profile online personalities might act in the leadership role to create a large target-base that serves to control and neutralize its members by keeping them captive with a continuous flow of slightly tainted information, a Psyop Specialist can scour this audience for people with the right traits that will allow them to be exploited. Obviously, not everybody will be exploitable to the same degree, but anyone who can be exploited will be exploited as much as possible, with the intent to recruit as many targets as possible into more cult-like groups that exist online and operate as part of one or another psyop program.


Although high-profile leaders develop large audiences, those audiences break down into smaller subgroups with their own distinct differences. These smaller subgroups will often continue to follow the same high-profile leader as before, but with smaller groups the dynamics change and the group becomes easier to manage and manipulate. New leaders can surface who are more intimately involved with the group than a high-profile leader can be. Where larger groups naturally tend towards breakdown and division as they get bigger, these smaller groups can lead far more easily to groupthink and polarization. With certain types of leaders, this can develop into a much worse situation.

Follow The Leader

Leaders such as I’ve described above – or anyone else, for that matter – don’t have to be knowingly involved in a psyop program, and they’re just as likely to be used unwittingly for this purpose. But nevertheless, human weaknesses are exploitable, so these people, if they are involved, will probably have some knowledge that what they are doing is a deception. The desire for money, sex, popularity, or power can be used to coerce them into taking part in psyop activities. Some people are far more corrupt and willing to be used in these schemes, and anyone with the right qualities can be molded into leaders of smaller groups where they have tight control over its members.
These smaller online groups with their own leaders are often less visible, but they’re there and they can become quite dangerous. These groups can develop when there’s very strong cohesion among the participants, and where beliefs are very uniform among them and groupthink is well established. The group will usually rally around a single leader who maintains strict control over the group and keeps participants focused on group activities. There may be an inner core of members who work with the leader to help manage the group. Outsiders aren’t easily accepted, and will usually have to go through a probationary period to prove themselves first, either by informally showing that they understand and follow the group’s belief system and rules, or through a more formal initiation process that might require them to make certain commitments to the group. These sort of online groups can easily tend towards cultism, and as such, they might be part of a psyop program.
Generally speaking, a cult can be defined as a group that exploits its members psychologically and/or financially, typically by making members comply with the leadership’s demands through certain types of psychological manipulation, and through the inculcation of a target’s deep-seated anxious dependency on the group and its leaders. A cult will exhibit excessive devotion or dedication to some person, idea, or thing and will employ manipulative techniques of persuasion and control on its members that are designed to advance the goals of the group’s leaders to the actual or possible detriment of members, their families, or the community.
According to Robert J. Lifton, a leading authority on cults, certain types of people are more susceptible to being drawn into these groups, most notably those who have a negative self-image, tendencies towards guilt, inclinations toward all-or-nothing emotional alignments, and people who have had early problems in life with trust, chaos, dominating parents, guilt, and/or identity crisis. People who have just suffered a crisis such as a divorce or death are also highly susceptible to getting caught up with one of these groups. People with religious leanings and who are seeking answers or spiritual guidance are also susceptible to joining these groups. During late adolescence and early adulthood there is a general tendency towards emotional polarization that makes a person particularly susceptible to them as well. This list is by no means all-inclusive, and there are other characteristics that make a person vulnerable to cult groups as well.
The most susceptible people of all, however, are those who are already aware that they are targeted individuals. After having been stripped of a normal life and without any resources to turn to for help, feeling completely isolated from the rest of the world and desperately needing answers to understand what’s going on, they’re in a very vulnerable position and this makes them ideal candidates for recruitment into a cult group. Targeted individuals also happen to be very easy to find online, since there are many places there where they congregate. Given that a Psyop Specialist can use various profiling and data collection systems to assess a person’s psychological profile, identifying those who are most likely to be drawn into a cult is relatively easy, and the methods used to get people involved in them are highly systematized, making much of the task no harder than following a script. Psyop Specialists seek to recruit targeted individuals and turn them into perpetrators, and they use cults and cult tactics to convert their targets.
A Psyop Specialist, or anyone else who has a grasp of the techniques or is being instructed in them, can use these skills to create a cult-like group of people who can be tightly controlled and compelled to submit to its leader. Psyop Specialists can take advantage of group dynamics and cult techniques to create isolated ‘mercenary’ groups who are under constant control and acting under false perceptions. These groups can serve a number of useful functions in a psyop program, acting as low-level operatives in any number of psychological operations that might be going on within a larger psyop program. For instance, members of these types of groups might be assigned to flood online forums with messages that raise fears in targeted individuals, or that promote certain extreme beliefs related to their targeting. They will also be used to recruit targeted individuals, drawing them into these groups in order to convert them to perpetrators. It isn’t beyond reason to think that those trained in cult techniques will use them for personal gain as well, and there are such people out there who have learned these skills and have successfully applied them against unwitting others for their personal benefit.
According to Robert Jay Lifton, cults can be identified by three general characteristics:
1. A charismatic leader who increasingly becomes an object of worship as the general principles that may have originally sustained the group lose their power;
2. The use of coercive persuasion or thought reform;
3. Economic, sexual, and other exploitation of group members by the leader and the ruling coterie.
Additionally, a cult group will exhibit some or all of these characteristics:
Authoritarianism — Control of the group stems from an absolute leader or a small circle of core members. Often the cult’s leadership is glorified. The leader may be recognized as divine, or even as God.
Milieu Control – The leader will seek to control member’s sources of information and social interaction. Members are encouraged to restrict communication and relationships with outsiders, and to study the group’s internal literature.
‘Sacred Science’ – A cult will teach that its chosen philosophy, beliefs, or experiential panacea forms the only possible truth and path to salvation, enlightenment, higher purpose, etc.
Loaded Language – Cults will have a special in-house lexicon, often creating or redefining words and using glib thought-terminating slogans and catchphrases that are used to condition and control group thought. The words and phrases will symbolize complex ideas that have already been established that relate to the group’s doctrine, and will effectively serve to avoid a deeper consideration of these ideas. They also serve to bond group members who understand the language and can sound impressive when talking in front of others who don’t. Outsiders who don’t know the lexicon are far less able to criticize the logic that the group uses as a foundation for its beliefs.
Chosen Ones – Members of a cult are often encouraged to believe they are special or superior, and in many cases will be encouraged to think that they were meant to join the group and that the group is itself special and on a higher mission.
Secret Doctrines – A cult might claim to possess certain esoteric teachings that must not ever be revealed to the outside world. Only core members of the group will have access to these teachings.
Mystical Manipulation – Cults often ascribe certain types of events to supernatural influences. A new member will often be influenced to believe that they’ve had a supernatural experience (induced by the use of one of a number of scientifically explainable techniques), and the group will use this as proof that higher forces are at work. In other cases, the group leader might be the only member deemed to have supernatural abilities, thus establishing his right to lead the group.
Limited Critical Thinking – Persons who question or challenge what the group offers are ridiculed, denied access, or exiled.
Demand for Purity – Cults have unreachably high standards for the behavior of their members. Higher levels of initiation might be offered to members to motivate them and lead them deeper into cult activities based on their commitment to the group and its doctrine. The polarization of the group around their beliefs will cause a natural motivation towards extreme actions, and the high standards set out for the group to follow will channel this motivation back into the group and anchor members to it further. The more they invest themselves into the group, the less willing they’ll be to give up what they have already invested so much in, should doubt about the group and its beliefs ever enter their minds. The inability to meet the group’s expectations leads to feelings of guilt, which can be taken advantage of by the group leader to control the member further.
Confession – Even minor transgressions must be confessed immediately and thoroughly, usually before the entire group. Regular confession sessions will usually take place, with each member being expected to reveal their faults and sins and receive punishment by the group. Although these sessions might appear to serve as an outlet for members to unburden themselves and share thoughts and feelings, it is actually used as a means to control them through what they disclose. It also acts to bond them more tightly with the group by sharing things they normally wouldn’t with others.
Fire-and-Brimstone – Leaving the cult, or failing at one’s endeavor to complete the requirements to achieve its panacea, will result in consequences greater than if they had never joined the cult in the first place. Threats will be made if there is any sign that a member is thinking of leaving the group.
Shunning — Members are restricted from having any contact with members who have left the group. This keeps them from any influences that might draw them away as well.
You will notice that many of these characteristics reflect what was described earlier in this document, and although not all of these listed characteristics will necessarily be present in a cult group, in extreme cases they are. Beware of any groups that reflect any of these characteristics.
Cult groups are recognizable because they have corralled their participants into a tightly controlled situation that dictates what to believe and how to act. Within these groups, new members will experience certain group dynamics that aren’t usually seen in other groups. In cult-like groups, new participants tend to be treated as outsiders, and until they show that they’re willing to conform to the group by showing that they accept the same beliefs and are willing to follow the rules, they’ll either remain on the fringes of the group, or, more likely, be closed out completely. Usually there will be an initial period where the new participant is first treated very well, but then things soon change and they begin to receive a lot of criticism, ridicule, humiliation, and other psychological abuse from the group. This is a test to see how much the newcomer is willing to withstand, and what sort of fight they put up. This tactic is used to determine how badly the person wants to belong to the group and how quickly they’ll conform to the group’s standards. Anyone who puts up a defense and doesn’t submit will be cast out, since they pose a threat to the group’s cohesion. Any targeted individual who comes across any group that sounds similar to what is described here should distance themselves from it as quickly as possible. It’s either a full-blown cult, or on the verge of becoming one.
Cult leaders feed off of their followers, whether for money, power, or whatever else, and they’re always on the hunt for new recruits to keep their flock large enough to feed their needs. They look for people who show signs of psychological weakness, such as people who’ve suffered a recent crisis, people who are seeking spiritual guidance, people who already hold non-mainstream beliefs similar to their own, people who feel outcast from society, lonely people looking for friends and companionship, etc. Targeted individuals are already in a prime position for recruitment into a cult group. They have been suffering a crisis, they feel outcast and have a strong need for friendship and support due to the isolation that their targeting has already caused, they seek a means to understand their targeting, and due to the nature of their attacks, they very often entertain non-mainstream beliefs about what is going on. The targeted community is filled with potential recruits for these groups.
Cult groups are a part of the trade of a Psyop Specialist, and the online community is an ideal place to create these groups and use them as part of a psyop program to create teams that perform certain functions. The internet offers all the necessary functional aspects for applying the principle methods of perception management to control, neutralize, or exploit a targeted individual or group. Targeted individuals coming online in search of support and information are very susceptible to these psyop programs, since they’re already being targeted and will likely be in a state of psychological weakness that cults typically look for in potential recruits. So, if you’re a targeted individual and you go online, chances are very high that you’ll be continually targeted by people who seek to entrap you in a cult-like setting and lead you off course so as to exploit you. In a worst-case scenario, you’ll be converted into a perpetrator and used in various ways to assist in psyop programs and targeting operations.
Online cults are on-going psyop programs. They will display all of the effects of group dynamics that have been outlined in this and the previous section. They will also employ some or all of the methods of perception management that have been described throughout this document. They don’t have to be as tightly-knit and closed off to outsiders as cults are normally described in the media, and the leaders may not approach the role of charismatic or psychopathic figurehead that is popularly portrayed either, but the signs of cultism will be there nonetheless.


There are a number of important things to look for when you come across anyone at all who has a high-profile presence online. I’ll cover each briefly.
Proof of credentials
The very first qualifier that a leader will often use to establish themselves in that position will be their purported credentials. These need to be established early on in order to win over followers, but once they have been presented and accepted, they are given little more attention and will quickly be set aside as information more relevant to the group’s purpose is offered.
Any person who promotes themselves as a former or current government employee, doctor, scientist, lawyer, or any other sort of professional, and who uses that professional position to give themselves credibility, should be willing and able to provide some sort of proof. To extend this further, anyone who makes any sort of claim whatsoever should be willing and able to provide whatever information is needed to validate it. Taking someone at their word, no matter how legitimate they might make themselves seem, is very risky. Do not make the assumption that because others believe the person that it’s okay for you to do so as well. The majority of people are easy to fool because they don’t know how to think critically, so be the more intelligent person and demand proof of credentials, or go elsewhere for information. This will save you a great deal of trouble in the long run.
Thoroughness in fact-finding
Before you begin to even consider accepting what someone claims, take a close look at how far they go in checking their facts and detailing the finer points. Do they just present information and expect you to accept it, or do they provide a deeper consideration of the details that would support or refute their claims? Be careful if they refer to the work of others, since that work might be at fault, and these same rules must be applied there. Do your own fact-checking on the information whenever possible, and don’t ever assume completely that any particular piece of information is accurate.
Openness to questions and ability to answer them
Anyone who makes claims or puts out information should be willing to answer questions about it from those they disseminate it to. If a person is unreachable or avoids answering legitimate questions, their information shouldn’t be relied on.
Degree of emotional/suggestive content in their material
If a person is including a noticeable amount of emotional or suggestive content in their material (as defined earlier), they’re not playing fair and are relying on psychological tactics to persuade their audience. When presenting accurate information, there is never any need for these sorts of tactics, since the information should be able to speak for itself. Trying to be overly persuasive or leaving it up to the audience to fill in the missing pieces only reveals the weakness of the information being presented.

Degree of publicity

Behind virtually every high-profile persona there is a team working in the background taking care of the production and publicity aspects of their media campaign. No one person has the time and energy needed to create and maintain a large audience within a short period of time, as we see with many high-profile online personalities these days. There is always going to be some fairly skilled help involved, working in the background.

Digging up the Roots of Deception

History provides a lesson, for those who look. So let’s take a quick look at the roots of all of this, when these psyop programs first started being employed on the home front by the US government as they were embarking on their research into mind-control as part of MKULTRA. This is when the biggest psyop program in history – the UFO/ET deception – was first initiated. It never would have grown such strong roots without the careful cultivation of a UFO community and its first leadership roles, and by controlling the sources of information on the subject and giving these leaders the publicity needed to disseminate that information to their target audience, using all of the techniques of perception management outlined in this document.
Most or all of the key pieces of information that served to build the foundation to support the belief in the UFO/ET phenomenon can be seen (if you look at the finer details) to have derived from sources that were either directly connected to intelligence arms of the US government, or were under their influence in some way. From the late 1940s up until the advent of the internet in the late 1980s, the only sources of information on the subject of UFOs were magazine and book writers, and lesser-recognized conference lecturers (usually people describing their personal knowledge or experiences). The subject was kept completely outside of mainstream media as a serious topic of consideration and was only valued as entertainment. A ‘denial of service’ situation existed, and an interested public had few sources of information to go to. The earliest writers and lecturers on the subject of UFOs offered no better qualifications to know the truth about this subject than anyone else, and it was only that they had something to offer at all that they attracted an audience. This audience’s dynamics were the same as with any group, which had the potential to be taken advantage of. These early writers and lecturers acted in the role of group leaders, but as innocent as they may have been in their endeavors, they had human weaknesses that a Psyop Specialist would know how to exploit. These people were targeted and used in various psyop programs that helped to create an alternate perception of reality as a cover for other programs and operations that were centered on the development of post-WWII secret technologies.
After first gaining control over these people (through publishing contracts, etc.) and gaining their confidence, they were then supplied with disinformation to disseminate to the rest of the UFO community. A great deal of this audience’s attention was given to what these people presented based on two important factors: a lack of anywhere else to go for information, and the sheer extraordinariness of what they presented. And what they presented became the foundation for an alternate belief system that would grow and evolve over time. These early writers and lecturers filled leadership roles by keeping the UFO community alive, and they were its only sources of information in the beginning. But it turns out that people with military or intelligence ties were always involved with these people in one way or another, whether they were presenting themselves as whistleblowers with inside information, or playing more covert roles by posing as doctors, scientists, or researchers with levels of knowledge and expertise that gave their opinions some validity. Many witnesses to alleged UFO/ET events were also heavily exploited and led into leadership roles, giving lectures and writing books while receiving special publicity from behind the scenes, their stories of their personal experiences helping to give legitimacy to the alternate reality that was developing. Their stories also helped to build on the detail of this alternate reality and keep the audience captivated. But always in the background pulling the strings were the Psyop Specialists, managing the perceptions of their target audience that they had nurtured into existence, planting information along the way, and using every psychological technique they had in their arsenal to apply ‘soft force’ methods of persuasion to convince this audience of that alternate reality. Among this audience were many targets of other secret government programs that stemmed from MKULTRA who thought they had had UFO/ET experiences, and the perception of reality that they were being led to believe worked as a cover for these secret government mind-control programs.


The UFO/ET phenomenon has since developed in various ways, and the issue of mind-control has always been in the background, an explanation that many purported ‘alien’ abductees reject out of hand as the real cause of their experiences. These mind-control experimentees/abductees are generally caught up in a false belief system that covers the deeper truth, and many of them have been converted into ‘true believers’ who continue to promote the cover story through books and lectures. They are a generation of targeted individuals who were used to build a false reality that has continued to exist and evolve even further. The experiences of many targeted individuals in recent years show telling similarities to many of these abductee cases (particularly the more recent ones), and they often show the same refusal that abductees have shown towards any other explanations for their experiences than those they have attached themselves to. This is a grave concern, because this rejection of logical analysis is a sign that cult techniques have been used on them.
This is something that all targeted individuals need to beware of.

A Few Last Words

This document has provided a great deal of information that will be very useful to targeted individuals as they forage through the online community in search of answers while avoiding the traps that are constantly being set up as part of various psyop programs. Perception management is a key aspect of any psyop program, and as targeted individuals we are already in the sights of Psyop Specialists whose jobs are to lead us into complete control by those they work for.
As targeted individuals, coming to an understanding about our situation and the methods used against us is a never-ending journey that’s full of deceptions and distractions, and there are no quick and easy ways to travel this road to safety. Each avenue we might take leads to new roads that need to be traversed carefully, and it requires a great deal of caution when exploring the territory and those other people we seem to be journeying it with. There is really no one that we can trust completely, and even those people we should be able to trust the most – our closest friends and family – have revealed to most of us that this is so. Even other targeted individuals often prove to be perpetrators in disguise. The only person you really have left to trust is yourself. Therefore, it’s very important that you know how to do that and not be fooled by your own mistakes in judgment, and that’s what this document is intended to help you with. Perceptions are not always as they seem, and piercing the veil of illusion takes skill. But you can learn those skills, and when you do, things become far easier and far safer.
Stay strong, always be alert and aware, and question everything.
* * *


‘Perception Management’ – Dept. of Defense
‘Information Warfare: What and How’ – Megan Burns (1999)
‘Journal of Information Warfare’ (Vol I, Issue III, 2002)
‘Weapons of Mass Perception: The Power and Problems of Propaganda and Psyops’ – Author unknown
‘The Search for the Manchurian Candidate’ (chapter 10) – John Marks
‘Arguments and Persuasion Techniques in Writing’ – Jeanne Curran and Susan R. Takata
‘10 Rules That Govern Groups’ – John M. Grohol, PsyD
‘Characteristics Of Totalistic Movements (Destructive Cults)’ – Paul Morantz
‘Elements of Harmful Cult Activity: An Exit Counselor’s Working Model’ – Joseph Szimhart
See Also (by the author)


Conocimiento, Consciencia, Educacion