Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Part III Mental Firewall

Part III Mental Firewall

Ratings: (0)|Views: 27 |Likes:
Published by HRC
TI - Targeted Individual - is a person being targeted with OSEH by a group of individuals called "perps" for the purpose of human experimentations.

OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a specific person for the purpose of inducing harm and possibly death.

DEW - Direct Energy Weapon - are device used for OSEH purposes, weapons can be microwave with pulp frequencies, v2k or other electronic and hearing devices.

V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies. Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K can also use to induce or manipulate dreams or to deprived TI sleeps.

FAIR USE NOTICE: This site contains copyrighted materials the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, & social justice issues. We believe this is not an infringement of any such copyrighted materialsas in accordance to the the fair dealing clauses of the Canadian Copyright Act, that allow users to engage in certain activities relating to research, private study, criticism, review, or news reporting. We are making an exerted effort to mention the source of the material, along with the name of the author, performer, maker, or broadcaster for the dealing to be fair again in accordance with the allowable clause. For more info visit: Wikipedia: Fair Dealing Canada
TI - Targeted Individual - is a person being targeted with OSEH by a group of individuals called "perps" for the purpose of human experimentations.

OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a specific person for the purpose of inducing harm and possibly death.

DEW - Direct Energy Weapon - are device used for OSEH purposes, weapons can be microwave with pulp frequencies, v2k or other electronic and hearing devices.

V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies. Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K can also use to induce or manipulate dreams or to deprived TI sleeps.

FAIR USE NOTICE: This site contains copyrighted materials the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, & social justice issues. We believe this is not an infringement of any such copyrighted materialsas in accordance to the the fair dealing clauses of the Canadian Copyright Act, that allow users to engage in certain activities relating to research, private study, criticism, review, or news reporting. We are making an exerted effort to mention the source of the material, along with the name of the author, performer, maker, or broadcaster for the dealing to be fair again in accordance with the allowable clause. For more info visit: Wikipedia: Fair Dealing Canada

More info:

Categories:Types, Research, Law
Published by: HRC on Dec 18, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

12/30/2012

pdf

text

original

 
Part III: Mental Firewalls
 Allen Barker, Feb 17, 2002This is the third of a three-part series of essays on mind control. As the earlier essaysexplained, "mind control" is the term commonly and historically used to describe clandestineoperations to alter human behavior and thought. The series focuses mainly on high-technology techniques involving, for example, surveillance devices and electromagneticweapons -- though victims of all sorts of mind control techniques have common experiencesand sequelae. The first essay of the series, "Motives for Mind Control," dealt with some of the reasons that mind control harassment, torture, and exploitation happens and why itcontinues. The second part, "Resisting the Mind Control State," dealt with ways to protestand resist mind control abuses in a supposedly "free" society. In this final part, I exploresome of the methods and techniques that victims have developed to help them resist theseongoing human rights atrocities committed every day against their bodies and minds. In asense we are going to have a look at mind control torture from the torture victim's point of view, from "inside" the mind of the victim. This essay is written from the point of view of someone experiencing real torture fromexternally induced mind control phenomena, including induced voices in the head,surveillance, harassment from various sources, and nonlethal aversive jolts. While I makeno secret of the fact that I have personally been subjected to a similar sort of mind controltorture, this is not my story. Of course it is influenced by events I have experienced, but theessay is a composite from my interactions with many mind control victims (andprovocateurs) over the past few years. I will save the actual details of my own experiencesfor my lawyers or for prosecutors when that time comes, or perhaps for other writings Imight choose to make public. Thus, in keeping with the earlier parts of the series, you donot even have to believe me about my having been tortured -- though it all happened.There are
many 
people in the world, including many American citizens, who haveexperienced very similar things. You can even think that
all 
of those people made it all up,and
still 
have to be concerned despite your Holocaust denial. The technology undoubtedlyexists right now to carry out the sorts of torture operations described in this essay, and willonly become more advanced with time. I cover a lot of different techniques and possibilities in this essay, but keep in mind that thetruth is bad enough. What we already know and can document is bad enough, and is onlythe tip of the iceberg. In the spirit of mentioning all the possibilities, though, let me brieflydiscuss mental illness here. There truly are some people with mental illnesses which occurnaturally. There are also people with mental illnesses which were externally and purposelyinflicted, for example by harassment operations. And there are mind control victims who arecompletely normal except that they have undergone years and years of some of the mosthideous torture imaginable -- in a lying, despicable society that denies it, ignores it, andfurther tortures the victims. We know this from documented sources; what the governmenthas admitted is bad enough. I hope this essay will prove helpful even to victims who sufferfrom true mental illness. I call them victims also because the cowardly U.S. government hashidden behind the skirts of the mentally ill to commit some of the worst atrocitiesimaginable, and the truly mentally ill are victimized by this as well. The mentally ill are also
known
to have been used as guinea pigs in mind control experiments precisely because theywould tend to be disbelieved and are relatively powerless victims for torturers to experimenton. Some victims may have been poisoned by drugs engineered to cause thempsychological problems -- and I do not mean ordinary street drugs. Others have hadpsychosurgery, microwave harassment, etc., which can cause organic problems in addition
 
to psychological problems. And of course, the mind is really not separate from the body andpsychological
torture
is just as bad as direct physical torture. Most people are still free to think what they want -- to the extent that that still meansanything -- and some will try to second guess the victims and provide armchair diagnoses of the victims' problems. People who try to dismiss true torture victims as just mentally ill willreceive and deserve the utmost contempt from the victims and from those decent peoplewho know what is really going on. And we will remember. For the reasons described in PartII, the psychiatric and psychological "communities" cannot be trusted, except for a fewactual healers here and there. Much of this essay contains a sort of analysis that it is fashionable among the pseudo-intelligentsia to dismiss as just black-and-white thinking. These people have their sixth-grade epiphany that not everything is black-and-white, and for the rest of their lives goaround justifying anything convenient with this amoral relativism. They never realize (or it just does not suit their lies) that while nothing is black-and-white, some things are closeenough that they might as well be. I will be writing about Nazi pigs, and I mean this in thesense of "Mengele the Nazi pig," not any other cultural pig association. Those who dismissthis sort of thinking perhaps would think differently if they had ever experienced real tortureor were capable of the slightest bit of empathy. There is no doubt that this sort of thinkinghas been misused and misapplied at various times, but I cannot worry about how everymoron might misunderstand or misapply what I write. People may well misapply things Ihave written here, or use them to create some propaganda distraction from what I amactually writing about, but I am describing it the way it is. If you don't call a Nazi a Nazi youend up with Nazism by some other name. Every victim has had to develop his or her own method of coping with the torture. I am nottrying to impose my methods on anyone. A religious person under torture finds strength inhis or her religion, so some Zen Buddhist philosophy may necessarily be apparent in mywriting. In the ignorant U.S. there are still people who will blame a victim for beingBuddhist, a major world religion. Of course Mengele the pig tries to justify and rationalizehis acts of torture in any and all ways possible. There are the usual myriad ways of blamingand smearing the victims and rationalizing away the acts of the torturer. I hope that this essay will help some victims. I know that I have benefited from the work of other victims who had the courage to speak out about their experiences. Much of this essaydeals with the mental "game" of mind control, which is of course not a game at all to thetorture victims. You can compare it to having to face mock executions each day. There isalso the physical intimidation many victims experience. As a victim might put it, if it is all inmy head then who harassed me on the highway? Why did my mail all arrive opened? Whydid my phone regularly ring twice a day with hang-up calls? Why did many of my internetposts stop propagating anywhere? Why did a police car pull up beside mine every time Italked about China, on the drive to my honeymoon? The unfortunate reality is that thevictims have to develop their own methods to deal with the constant, credible physicalthreats of death or worse. I wish I could help there, but I do what I can. This is a barbaricand savage nation. 
What is a Firewall?
For the purposes of this essay, let me digress a bit here and describe the concept of afirewall. A firewall, in the historical sense, is a wall built between connected buildings andspecifically constructed so that a fire in one unit of the structure will not spread to the otherunits. In a more recent sense, a firewall is a device on a computer network that keepsnodes of the network separated, for instance so that a hacker attack on one node of thenetwork cannot spread to connected nodes of the network.
 
 For our purposes, we can consider all the computers on a network to be like houses on astreet. (Network engineers, please bear with me.) Each house has several doors into it,which correspond to what are called ports on a networked computer. A computer actuallyhas thousands of ports, but the principle is illustrated by considering a house with severaldoors. All the houses have inhabitants in them, who send out messengers to the otherhouses: But some houses send out the equivalent of burglars also. When the inhabitants of one house want to communicate with the inhabitants of another, they send a messenger toa particular door of the house they want to communicate with. The messenger knocks onthe door.Now, the inhabitants of the house can either open the door and let the messenger in orignore the knock. If they let the messenger in, they can restrict what he is allowed to dowhile in the house. The messenger may, for example, pick up a piece of paper and carry itback to his house. This would correspond to a file transfer over a network. If the inhabitantsof the house accidentally leave a door open, though, a messenger may be able to come inthe house without permission and do whatever they like, again without permission. (Thereare many doors because a messenger occupies a particular door the whole time he is "in thehouse.") A firewall, in this analogy, would correspond to a complete facade built around a house (orgroup of houses, to be picky). The actual house is not even visible from the street. Thedoors of the original house are only visible to messengers
if 
the inhabitants of the housebuild corresponding doors in the facade. To enter the house in this scenario, a messengerwould have to first knock at some visible door of the facade, be allowed in, and then knockat and be allowed into the actual door of the house. In this way the security of the house isgreatly increased from unwanted intrusions. (And you can have a collection of trustedhouses "inside the fort" which are less protected from each other.) The title of this essay, "Mental Firewalls," comes from an article by Timothy L. Thomaswhich appeared in the Army War College journal
Parameters
in Spring 1998. It was titled"The Mind Has No Firewalls." The Army has an often honorable tradition going back to theRevolutionary War, the minutemen, and so forth. But it also has had and still has sometreason in its ranks. This is just the "ground truth," the "facts on the ground." An army thattortures the domestic population is an occupation army. Treasonous Nazi pigs, in this realsense rather than some spin machine crap or some pathological liar's bullshit, must be dealtwith accordingly. This holds for all branches of the military. This holds for law enforcementas well. It holds for all intelligence agencies also. It holds even when they pretend thetorture devices "don't exist." Even if the victim does not realize what is happening to him orher, it is still torture. Informed consent must be truly informed. Torturing an Americancitizen is
at least 
as treasonous as selling the nation's top secrets to a foreign power. Thomas' article was in fact entered into evidence as part of a lawsuit by Harlan Girard of theInternational Committee for the Convention Against Offensive Microwave Weapons. Thearticle's central metaphor is that human beings are like the computers on a network, exceptthat they do not have the ability to control the information traffic entering and leavingthem. Their ports, or doors, are wide open. This sort of analogy was prevalent during themilitary "information warfare" buzzword phase, and illustrates the sort of thinking that wasgoing on at the time. [On a note of caution, not all of Thomas' article should be takenliterally; whether purposefully or not there is some likely disinfo there.] 
Deception Operations Against the Human "Biocomputer"
What is it that corresponds to your reality? What do you perceive, and how do you makeyour decisions? You receive information through your eyes, ears, and other senses. You

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->