Mind Control is a criminal life
control system, and much more like an
advanced digital concentration camp scenario that slow-kills an individual
psychologically, physiologically, emotionally, financially and socially with
brutal sadistic deprivation in all sphere
..
The electromagnetic technology works on the theory that the mind and the body are an
electro-magnetically mediated biophysics system and the electromagnetic signals
from outside sources can mimic the mind and body's electromagnetic signals and
can alter it in weird ways. The electromagnetic waves (radio waves, microwaves,
sound & ultrasound waves) manipulate and alter brain frequency, way of
functioning of neurotransmitters and hormones and causes immense
damage to the whole system including, mental sanity and the whole nervous system.
Please visit the Scalar Wave to Subjugate TI's link for some details about the degree of subtlety involved in here...
It's like slowly getting ruined and murdered in a lawless situation ...Even in it's most primitive form, it's like staying in an Organized Crime Wave Soup, that is "penetrating" you non-consensually and affecting your brain , body, mind , air , water and sky even ..You don't see this because this is all invisible waves, rays and radiations stuffs , that can get you murdered also very easily ..Hence it's a big crime and criminal conspiracy all the way ...
Please visit the Scalar Wave to Subjugate TI's link for some details about the degree of subtlety involved in here...
It's like slowly getting ruined and murdered in a lawless situation ...Even in it's most primitive form, it's like staying in an Organized Crime Wave Soup, that is "penetrating" you non-consensually and affecting your brain , body, mind , air , water and sky even ..You don't see this because this is all invisible waves, rays and radiations stuffs , that can get you murdered also very easily ..Hence it's a big crime and criminal conspiracy all the way ...
Mind reading and mind
control sometimes is referred to as mind rape. The reason is that in general
mind reading is not used to observe but instead to control a person in illegal
ways or to inflict maximum damage (including death) to a person.
From Operation Mind Control (excerpts from) by Walter H. Bowart:
Mind control is the most terrible imaginable crime because it is committed not against the body, but against the mind and the soul. Dr. Joost A. M. Meerloo expresses the attitude of the majority of psychologists in calling it ‘mind rape,’ and warns that it poses a great ‘danger of destruction of the spirit’ which can be ‘compared to the threat of total physical destruction . . .’ … [p. 23]
--------------
Gang stalking and electronic harassment are tools that are used to murder a person mentally or physically. Not in a moment of rage but systematically, like turning pages in a book, we are talking about premeditated murder here. The mind of the target is forced into such a a state that he/she will do everything to get rid of this mental and/or physical torture. Gang stalking and electronic harassment are used to rape the mind of a target over and over again until the target collapses mentally or physically..
--------------
Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. The criminal network has at its deposal plentiful first class technical know-how and high quality equipment."
From Operation Mind Control (excerpts from) by Walter H. Bowart:
Mind control is the most terrible imaginable crime because it is committed not against the body, but against the mind and the soul. Dr. Joost A. M. Meerloo expresses the attitude of the majority of psychologists in calling it ‘mind rape,’ and warns that it poses a great ‘danger of destruction of the spirit’ which can be ‘compared to the threat of total physical destruction . . .’ … [p. 23]
--------------
Gang stalking and electronic harassment are tools that are used to murder a person mentally or physically. Not in a moment of rage but systematically, like turning pages in a book, we are talking about premeditated murder here. The mind of the target is forced into such a a state that he/she will do everything to get rid of this mental and/or physical torture. Gang stalking and electronic harassment are used to rape the mind of a target over and over again until the target collapses mentally or physically..
--------------
Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. The criminal network has at its deposal plentiful first class technical know-how and high quality equipment."
The Effects and Symptoms of Mind Control
1). Microwave hearing and torture with intense loud electronic sounding noise
2). Visual disturbances, visual hallucinations
3). Manipulation of will, emotions, feelings, perceptions
4). Manipulation of human behavior: forced speech, involuntary body movements, transmission of specific commands into the subconscious, compulsory execution of these commands
5). Reading thoughts remotely, retrieving memories, implanting personalities
6). Debilitation of mental acuity, inability to concentrate, disruption of ability to think rationally and independently
7). Loss of memory and knowledge
8). Inadequate states, which targeted individuals have never experienced before (states of narcotic intoxication, depression, obsessive desires and so on)
9). Control of sleep patterns: sleep deprivation or uncontrollable sleep
10). Blurred vision
11). Cramps, seizures and spasms
12). Excruciating artificial pain in any part of the body, for example, heart attacks and other symptoms.
Reported mind control symptoms and
descriptions include: “a slow death,” “unbelievably sophisticated,” “vicious,
amoral, sadistic, and cruel,” .
Symptoms can be depression,
befuddled thinking, loss of memory, stress, not being able to cope, manic
behavior, schizophrenia, nervous breakdowns, physical collapse, brain and
nervous system damage, heart attacks, cancer... Precisely modulated microwave
radiation is used to influence brain function. Human behavior and reactions can
be entirely controlled by using pulse modulated microwave EM radiation.
Victims
from all over the world have contacted Mind Justice with reports of being
targeted with mind control technologies, although approximately 75% of victims
are American and Russian. The following
is a description of symptoms most commonly reported by victims.
Victims are subjected to
various kinds of harassment and torture, twenty-four hours a day, seven days a
week, for years on end. Most believe that some type of technology can remotely
track, target, and control every nerve in their bodies. Heart and respiration
rate can speed up and slow down, and stomach and bowel functions are regulated.
Illnesses and all types of pain can turn on and off in an instant. Microwave burns are
reported. Sleep deprivation is common and dreams are manipulated. Victims say, “They [whoever] is targeting
them] can see through my eyes, what I see.” Sometimes victims describe seeing
the images of projected holograms. Thoughts can be read. Most victims
describe a phenomenon they call “street theater.” For example, people around
the victim have repeated verbatim, the victim’s immediate thoughts, or harassive
and personalized statements are repeated by strangers wherever the victim may
go. Emotions can be manipulated. Microwave
hearing, known to be an unclassified military capability of creating voices in
the head, is regularly reported.19 Implanted thoughts and
visions are common, with repetitive themes that can include pedophilia,
homophobia and degradation. Victims say it is like having a radio or TV in your
head. Less frequently, remote and abusive sexual manipulation is reported.
Almost all victims say repetitive behavior control techniques are used and
include negative, stimulus-response or feedback loops.
Some
type of outside force can strike heavy blows to any object, or set any object
including the body into strong vibration while nearby objects are not vibrating
at all. Wrenching of house/building structures cause loud snapping or crackling
noises, often heard at precisely the point where a victim is starting to doze
off to sleep. Victims regularly report
many types of bizarre and harassive remote manipulation of electrical
equipment, phone, car, TV, and computers. Mail tampering is reported as
well. Black bag intelligence tactics--tire slashing, break-ins without burglary
but at times including sabotaged, modified items also appear on the list of invasions.
Victims agree: the
experience of mind control phenomena is vicious, amoral, sadistic, and cruel.
Most victims describe the experience as very debilitating and compare it to
mental rape, an electronic prison, or total destruction of the quality of their
lives.
Many have been labeled mentally ill and live with financial ruin, loss of
health, social life, and career. Victims theorize that the goal of the
experiments would appear to be the development of weapons to neutralize the
enemy, without killing them. All say the technology is unbelievably
sophisticated and effective. To them, it
is like a slow death.
Biological Effects Of
Electromagnetic Radiation (Radiowaves and Microwaves) Eurasian Communist
Countries, show that microwave frequencies similar to those of
the cellular phones can cause health problems in the following areas:- Blood.
- Cardiovascular System.
- Cells.
- Central Nervous System.
- Digestive System.
- Glands.
- Metabolism.
- Reproduction.
- Visual System.
- Internal Sound Perception.
Please clink on this link to get some more idea about TI symptoms and all..
How the brain targeting works?
"The EMF emissions from the brain can be decoded into current thoughts, images and sounds in the subject’s brain. It sends complicated codes and electromagnetic pulse signals to activate evoked potentials inside the brain, thus generating sounds and visual images in the neural circuits. With its speech, auditory and visual communication systems, RNM allows for a complete audio-visual brain to brain link or a brain-to-computer link."
"Of course, the mechanism needs to decode the resonance frequency of each specific site to modulate the insertion of information in that specific location of the brain. RNM can also detect hearing via electromagnetic microwaves, and it also features the transmission of specific commands into the subconscious, producing visual disturbances, visual hallucinations and injection of words and numbers in to the brain through electromagnetic radiation waves. Also, it manipulates emotions and thoughts and reads thoughts remotely, causes pain to any nerve of the body, allows for remote manipulation of behavior, controls sleep patterns through which control over communication is made easy.
Violation of Privacy Issue
Article 17 of the
International Covenant on Civil and Political Rights of the United Nations of
1966 protects also privacy: "No one
shall be subjected to arbitrary or unlawful interference with his privacy,
family, home or correspondence, nor to unlawful attacks on his honour and
reputation. Everyone has the right to the protection of the law against such
interference or attacks."
"Invasion of privacy is the intrusion into the personal life of another, without just cause, which can give the person whose privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded."
"An otherwise non-public individual has a right to privacy from:
"Invasion of privacy is the intrusion into the personal life of another, without just cause, which can give the person whose privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded."
"An otherwise non-public individual has a right to privacy from:
a) Intrusion on one's solitude or into one's
private affairs;
b) Public
disclosure of embarrassing private information;
c) Publicity which puts him/her in a false light to the public;
d) Appropriation of one's name or picture for
personal or commercial advantage."
-----------------------------------------------------------------------------------
-----------------------------------------------------------------------------------
"The Central Information Commission has tried to create a
plausible definition of ‘privacy’ to assist lawmakers who might enact a clear
law against ‘invasion of privacy’.
“One who intentionally intrudes, physically or otherwise, upon the solitude of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person,” the CIC picked up the definition from the US Restatement of the Law on Torts."
------------------------------
Intentional infliction of emotional distress (IIED) is a tort claim of recent origin for intentional conduct that results in extreme emotional distress. Some courts and commentators have substituted mental for emotional, but the tort is the same. Some jurisdictions refer to IIED as the tort of outrage.
---------------------------------
In most civil law jurisdictions, defamation is dealt with as a crime rather than a tort
---------------------
INTERCEPTION OF PRIVATE COMMUNICATION
Section 184(1) of the Criminal Code sets out the general rule that it is illegal to willfully intercept a private communication:
Everyone who, by means of any electro-magnetic, acoustic, mechanical or other device, willfully intercepts a private communication is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years. This involves wiretapping and second lines.
Everyone who, fraudulently and without colour of right,
UNAUTHORIZED USE OF A COMPUTER
(a) obtains, directly or indirectly, any computer service,
(b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system,
(c) uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system, or
(d) uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or (c)
is guilty of an indictable offence and liable to imprisonment for a term not exceeding ten years, or is guilt.
“One who intentionally intrudes, physically or otherwise, upon the solitude of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person,” the CIC picked up the definition from the US Restatement of the Law on Torts."
------------------------------
Intentional infliction of emotional distress (IIED) is a tort claim of recent origin for intentional conduct that results in extreme emotional distress. Some courts and commentators have substituted mental for emotional, but the tort is the same. Some jurisdictions refer to IIED as the tort of outrage.
---------------------------------
In most civil law jurisdictions, defamation is dealt with as a crime rather than a tort
---------------------
INTERCEPTION OF PRIVATE COMMUNICATION
Section 184(1) of the Criminal Code sets out the general rule that it is illegal to willfully intercept a private communication:
Everyone who, by means of any electro-magnetic, acoustic, mechanical or other device, willfully intercepts a private communication is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years. This involves wiretapping and second lines.
Everyone who, fraudulently and without colour of right,
UNAUTHORIZED USE OF A COMPUTER
(a) obtains, directly or indirectly, any computer service,
(b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system,
(c) uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system, or
(d) uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or (c)
is guilty of an indictable offence and liable to imprisonment for a term not exceeding ten years, or is guilt.