As regards the following post found in the alt.mindcontrol news group:  I admit that I could not entirely follow all of the headings and subheadings to make logical sense of their order.  I felt compelled to add or delete a line break here and there in order to promote understanding of the text.  Yet I found many passages intrinsically interesting, coming as they do from a purported employee of the National Security Agency-- possibly a distressed one.   C.P.



From: abemarf@aol.com (Abemarf)
Newsgroups: alt.mindcontrol
Subject: The NSA and Mind Control--Pt. 1
Date: 20 Aug 1999 08:50:21 GMT


NSA mind control and psyops

The following was sent to me by Will Filer <Esur4@aol.com> on July 27, 1999. It
offers a new explanation for government mind control. Will has stated to me
that he is a former consultant to the U.S. National Security Agency and asked
me to post this information immediately. He also believes he is in immediate
danger because of this information.

If you have comments on this document, feel free to post them to the
MINDCONTROL-L list.

- Wes Thomas, moderator, MINDCONTROL-L list

Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically
Delivered and Phonetically Accelerated Posthypnotic Commands without
Somnambulistic Preparation in the Subject for Intelligence and
Counterintelligence Applications by the United States National Security Agency.



1.INTRODUCTION:
1.The following information is an overview of one area of NSA Intelligence
Technology and Applications. A Technology Title, Applications, Technology
Description, case history summaries and the NSAís Behavioral Modification
Procedure Outline documented for the non-technical person.



2.TECHNOLOGY TITLE:
1.Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically
Delivered and Phonetically Accelerated Posthypnotic Commands without
Somnambulistic Preparation in the Subject for Intelligence and
Counterintelligence Applications by the United States National Security Agency.
"Computer Simulated Subconscious Speech Language".



3.APPLICATIONS:
1.Intelligence:
1.Used on foreign and domestic diplomats, spies, and citizens to gather
intelligence, steal advanced technology for US Defense applications. Surveys of
citizen's opinions to government events and propaganda. Heavy survey use during
times of war, economic strife and political elections. War against drugs. Used
to identify investments that have high yield to support clandestine operations.
Used to direct field agents without the agents having to carry communications
hardware and encryption devices.
2.Counterintelligence:
1.Used on foreign and domestic diplomats, spies, and citizens to identify
intelligence operations; scope, participants, communication methods, and
weaknesses in individuals, systems, equipment, or signals that can be
exploited. Additional applications include misinformation dissemination,
confusing and confounding leaders during critical decision moments, distorting
significance of various facts to sway decisions and actions in US favor,
behavioral modification of foreign spies to betray their loyalties, self
initiated executions (suicides).
3.Behavior Modification and Accelerated Resocialization:
1.This technology is used to develop and control spies, political candidates,
and other public figures through psychological intimidation, fear and
extortion. 2.The NSA uses this technology to resocialize (brainwash) the US
civilian voting population into "Giving their lives to Christ" (giving up their
personal will and civil rights to the NSA). Each subject is required to
maintain a "Personal Relationship with Jesus Christ" (following the precepts of
the Bible and doing what is ordered by the NSA). The technology is also used to
monitor and optimize NSA employee performance and loyalty.



4.DEFINITIONS AND ACRONYMS:
1.Age Regression: The act of bringing back past memories in a subject though
the use of hypnosis. The memories can be very vivid and real in the mind of the
subject. 2.Hypnoamnesia: Temporary loss of memory due to a posthypnotic
suggestion. 3.NSA: United States National Security Agency, Fort Mead, Maryland.
4.ODO: On-Duty Officer, or officer-on-duty. 5.Posthypnotic Command: Same as
Posthypnotic Suggestion. This term "Command" is more commonly used when the
hypnosis is forcibly given to the subject and when the subjectís will has been
broken down though the use of REM Sleep Deprivation and Suggestibility Index
increasing drugs like CNS and Cardiovascular Stimulants. The exposure to
extreme REM deprivation and select chemical stimulants cause the subject to
have no ability to resist the "Suggestion" any longer thereby making it a
"Command". 6.Posthypnotic Suggestion: A subconscious suggestion or command
resident and potentially active in the subject following a hypnotic trance or
period of direct access to the subconscious mind. 7.Posthypnotic Suggestibility
Index: An index or rating of a subjectís susceptibility and sensitivity to
hypnosis. 8.REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation.
A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein
synthesis, black circles around eyes, loss of short term memory, confusion,
impulsiveness, anger, frustration, diminished self-esteem, increased
suggestibility, reduced productivity, apathy, and depression. Long term REM
Deprivation results in death. 9.Script: A carefully constructed series of words
arranged in the form of a posthypnotic suggestion. The script will generally
consist of four separate parts; (1) an identifier (subjectís name, description,
or other identifying factor), (2) trigger activation condition or conditions
(when, what or how the suggestion will trigger), (3) the content (what the
trigger will precipitate in the perception of the subject), (4) and a duration
(when or under what conditions will it stop or finish). Additional reinforcing
scripts are usually added to "strengthen" or reinforce the central posthypnotic
command. 10.Somnambulatory State: An abnormal condition of sleep in which motor
acts (like walking, running) are performed. This state is typically achieved
and a prerequisite to traditional hypnosis. 11.Subliminal Implant: A
posthypnotic suggestion successfully delivered to the subjectís subconscious
mind. 12.Transceivers (NSA): Nearly microscopic electronic surveillance devices
that collect and transmit encrypted audio, color video, and location
coordinates collected at the subject site to NSA Satellites that in turn
forward it to NSA central intelligence operations. The devices also receive
encrypted audio scripts from NSA central intelligence operations through the
satellites and deliver it to the subjectís site in the form of a subliminal
posthypnotic suggestion. These devices are approximately the size of the head
of a straight pin and can be concealed in houses, offices, automobiles, planes,
and street corners.



5.TECHNOLOGY OVERVIEW:
1.In addition to the ability to see and hear what is going on inside people's
homes, vehicles, and businesses through the use of nearly microscopic digital
surveillance technology, the NSA is able to interrogate and influence a person
subconsciously without the knowledge or consent of the subject.

2.Thought Labels (Response Labels):
1.Have you ever watched a baseball game? Did you see the catcher and pitcher
communicate using a series of itches, baseball cap rearrangement, and clothing
tugs? An elaboration of this communication technique is used by the NSA to
detect a fleeting thought in a subject or "read minds" so to speak. 2.Lets
discuss how an itch, clothing tug or even an innocent sneeze can be used to
label a thought. For simplicity, we will call itches, clothing tugs, sneezes,
coughs, or involuntary muscle spasms that are performed during subconscious
interrogation "thought labels".

3.Post-Hypnotic Delivery Method:
1.The NSA combines hypnosis and thought labels to interrogate people without
the subject being aware of it. "How can hypnosis be used?" you might ask. The
subconscious mind operates at a speed of about 1200 to 1400 words per minute.
This is many times faster than the conscious mind that operates at 250 to 450
WPM (words per minute). The posthypnotic script can be spoken at fast
conversational speed approximately 250 WPM and a recorder or a computer speeds
up the message up to approximately 1200 to 1400 WPM. Remember what happens when
you play a 33 rpm record at 78 rpm? The resulting voice sound like the old
American cartoon characters the Chipmunks. This is only slightly past doubling
(2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound
like a high pitched chattering whine. Remember when the words "Drink Coca Cola"
were written on one frame of a movie in a theatre back in the 1960s? The frame
rate in movies is played at 30 frames/second. At 1/30th of a second the
conscious mind could not recognize the message but the subconscious mind could
read it clearly. The audience increased their Coca-Cola consumption by 65% that
night resulting in the Federal Government prohibiting subliminal advertising.
The following probable reasons for not achieving a higher percentage of
subliminal delivery effectiveness (> 65%) are described as follows. In that
1/30th of a second some people were blinking, some people were looking around
the theatre, looking at spouses, children, candy, popcorn, etc. or they had
sufficiently poor eyesight that they could watch the movie but could not
distinguish the small writing clearly. 2.In the early years of this technology,
the NSA originally recorded a spoken posthypnotic suggestion message into a
tape deck and sped it up by speeding up the tape. This process was labor
intensive, required each officer to have excellent diction and mastery of the
language and dialect required, and was of poor quality due to background noise
and the delay in timing during recording and processing. It also required
extensive training to assure that each officer spoke at the same rate of speed
so that the resulting "sped-up" script was delivered at the correct speed. Now
computers are used to append digitized samples of optimized, ideal phonemes
together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3.Currently, to optimize efficiency and accommodate the variety of languages on
the planet, phonetic elements from each language and distinct dialect are
sampled, digitally edited to optimize them, and appended during delivery to
form words and words arranged to make sentences in the from of scripts that
resemble hypnotic suggestions. The empty space between words is minimized and
pitch rise is compressed and filtered. Repetitive sine waves are also removed
from the phonetic elementís acoustic wave train thus reducing the actual number
of sine waves making up a word by 50% or more. This reduces the actual length
of the time it takes the phoneme to be delivered prior to accelerating
(speeding-up) the delivery (like fast forward). This helps the message to be
played at higher speeds and reduces the subjectís ability to recognize it as
accelerated speech. The technique of using optimized digitally sampled and
edited phonemes appended together to for words and then sentences structured as
hypnotic suggestions can be termed "computer simulated subconscious speech
language". 4.The subconscious mind is also very sensitive. It can hear things
that the conscious mind ignores. If you have watched television, you have
probably noticed that there are many "subliminal tapes" on the market to
program your subconscious mind. These tapes have their "messages"
recorded/hidden in the sounds of ocean waves, music, or other sounds but they
are not sped-up to subconscious delivery speeds and are therefore not very
effective. The subconscious mind can hear and discern the message even when
there is background noise like waves, cars, planes, or even when someone else
is speaking to you in normal conversation. Your conscious mind won't hear
anything unless it is very quite in the house. If you are very attentive you
may hear what sounds like a low-pitched tape on fast forward, and played at low
volume. This is the sound of the NSA's high-speed audio subliminal message.
5.This modification of the phonetic elements, played at low volume, combined
with the environmental background noise makes it very difficult for a subject
to record the NSA message. Even if the subject were to effectively record the
message, it is very difficult to filter (separate) the NSA's message from
background noise. Then, reconstructing the missing sine waves from the acoustic
wave train and slowing the message down to discern the actual content of the
"posthypnotic" script with the conscious mind would be nearly impossible for
the average citizen. To briefly summarize, the subject would have no chance in
analyzing a NSA message without the following items:
1.Professional state-of-the-art technology recording equipment. 2.Digital
acoustic wave editing equipment. 3.Advanced engineering knowledge of acoustic
wave science. 4.Phonetics and linguistics expertise. 5.Hypnosis theory and
scripting. 6.Ideal environmental conditions for recording. 7.NSA ignorance of
the subject's intent and ability to capture a message.
6.This technology is the perfect intelligence tool. It is nearly impossible to
detect or measure, difficult to trace back to the NSA. The symptoms that the
NSA can "program" or inflict into the subject can cause fear that they might be
thought to be insane if they were to report the NSA activities. The subject
does not know the source of the technology or the technology itself, the
subject has no proof or evidence, only their perception, suffering, and
isolation. Additionally, potential recourses that are available to the subject
can be interrogated out and preventative actions taken by the NSA to further
isolate or disable the subject.

4.Using the Post-Hypnotic Delivery Method with Thought Labels:
1.The NSA technique is simple; they transmit their human programming message
through the audio-visual electronic surveillance equipment installed in your
home, car, or office to you. The subliminal message delivered to you could be
"Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time
you have cheated on your taxes and that you are worried that the IRS might find
out in an audit. If you have never cheated on your taxes and have nothing to
fear you will feel an itch on your right-hand ear lobe that will go away when
you scratch it. If you can be caught by an IRS audit, you will feel an itch in
the left nostril of your nose that will disappear after you itch it twice."
From your perspective, you have just had a fleeting thought about your past tax
returns and had an innocent itch (thought label). To the NSA Officer On Duty
(ODO), you have just communicated to him whether you have ever: 1) cheated on
your taxes, and: 2) If the IRS could catch you in an audit. 2.This is a very
oversimplified example of a typical NSA interrogation. Actual interrogation
messages may consist of several hundred words and be very complex and
sophisticated. Most messages consist of several dozen words. Yes indeed, the
NSA has exceeded the wildest expectations of the book "1984". As you can
imagine, the spy world has reached a new plateau that directly affects every
person in the USA and abroad. This electronic surveillance system extends down
through Mexico, Central America, and deep into populated regions of South
America. It also has been installed in Australia, Africa, and the free-world
countries in Europe. 3.The NSA's goal is to have the whole world under its
electronic eye by the year 2000. They are almost there now, but are having
difficulties with high-tech countries that have the counterintelligence
resources to identify the high frequency bursts of microwave transmission from
the transceivers. The system also has the ability to take a "voice print" from
any person and place it on file. This file can be used to locate the subject
later by comparing it to real-time surveillance audio samples received from the
field as long as the subject is speaking in close proximity to a transceiver.
If the person is aware that the NSA has this capability and remains silent, the
NSA can transmit a periodic worldwide subliminal message that addresses the
person by name and causes them to dream and talk in their sleep. After the
person talks, the voiceprint would be eventually identified and the person's
location can be identified nearly anywhere in the world. Yes, it is a small
world, and getting smaller all the time. 4.This technology was originally
conceived under CIA studies and fascination with the power of hypnosis in the
late 1950ís and perfected by very early 1960s and implemented with unlimited
resources to all areas of vital national security interest first. Originally,
after noting the behavioral effects in visual subliminal effects like the
highly publicized event where stating "Drink Coca Cola" on a single movie frame
"delivered a higher rates of speed than normal movie viewing raised the obvious
question, "Does the human hearing work as good as eyesight accepting subliminal
messages?" Preliminary theory work was transferred to Fort Mead NSA who had
expertise in characterizing language in analog domains where a sampled phoneme
could be edited (shortened by removing excess sine waveforms from the "acoustic
wavetrain") and electronically reconstructed back into shortened words of
language. Some of the early experiments included "Remote Viewing at NSA where
the Viewer would relax, open their mind and explain the clarity of images that
were described by the NSA using this technology. These early experiments
allowed the NSA to refine the specifications of the "Computer Simulated
Subconscious Speech Language" and the scripting formats to maximize the ability
to deliver an accurate "vision or picture" into the subject. Pictures already
seen by the subject could simply be recalled using "Age regression" script
variations.



6.OTHER REFERENCE MATERIAL:
1.Please refer to the book "Inside America's Most Secret Agency, The Puzzle
Palace" by James Bamford, Published by Houghton Mifflin Company, 1982. This
book contains extensive information and references on the NSA's history and the
NSA's first surveillance system that originally only eavesdropped on telephones
and is now expanded to audio-visual.



7.NSA CASE HISTORY EXAMPLE SUMMARIES:
1.NSA Self-Initiated Execution (Suicide):
1.Bamford's "The Puzzle Palace" references one of the NSA's first
self-initiated execution (suicide) with this "Thought Control" technology they
developed. The NSA employee reportedly ran off NSA property saying demons were
in his mind and he killed himself.

2.NSA Initiated Execution to Cover-up in the News:
1.A University of California at Berkley student that went into a bar on or
around November 27, 1990 took hostages and insisted to the police that the CIA
Director talk with him so that he could get relief from the suffering. The
young man had sent letters to the president and the CIA but the requests had
fallen on deaf ears. After the young man panicked and shot a customer in the
bar, a SWAT team fatally shot him, the San Jose police found copies of the
letters written to the President referring to people that could "read minds"
and that he had learned how they do it. The NSA had been unsuccessfully
brainwashing him and had no alternative but to terminate him to assure their
security. It is interesting that what was originally broadcast on the news "The
gunman was demanding to talk with the Director of the CIA" etc. disappeared
quickly (suppressed?) from later news accounts.

3.NSA Initiated Execution to Cover-up in Music:
1.Curt Cobain of the musical group "Nirvana" was another victim of NSA
brainwashing and was terminated by NSA. Cobain had started writing clues to the
NSA activities into his music to communicate it to his music followers. He
referred in music to the NSA as the "Friends inside his head". Once the NSA
puts on the highest level of brainwashing pain, the subject expires quickly.
Cobain used heroin to numb and otherwise slow the effect of the brainwashing.

4.NSA Initiated Executions in Overseas Defense Project:
1.Some years back several employees of the United Kingdom's Government working
on a top secret Radar Project committed suicide with no apparent penetration by
a hostile government, drug abuse or any other commonality other than working in
a secured government project. They were not "Staged" suicides (murders) because
some of them happened behind doors that could not be opened from the outside.
These men were subjected to the same technology and processes that the U.C.
Berkley student, the NSA officer, Curt Cobain, and thousands of others have
experienced.

5.Musical references of NSA Technology:
1.Talking Heads; a music group popular in the eighties, wrote a song explaining
the scientific process of the NSA's brainwashing technology in a song called
"Wild Wild Life". The song gave an example of what the audible transmission
sounded like at the end of the song (like a tape on fast forward). They
mentioned in the song that "They (NSA) talk so fastÖ" and that the musical
group had spent "All their time and moneyÖ" unsuccessfully trying to find a
place that the NSA would not be able to harass them. The Talking Heads exposed
the technology, gave an example of what it sounds like, scenarios of how the
NSA might select you for the brainwashing, and the scope of the electronic
surveillance system.

6.NSA Counterintelligence Experiments:
1.Many experiments were performed by the NSA to determine the conditions and
procedures that would be required to turn spies that were trusted by US enemies
into assassins that we could invisibly manage. In early experiments, the
resulting NSA experimental subjects would get extensive attention in the news
because of the horror and unusual nature of the atrocity.
2.One example that comes to mind happened several years ago and created much
news. A man became obsessed with his son, poured gasoline on him and ignited it.
He had planned to do the same to himself but his desire for survival overpowered
the NSA's behavioral conditioning. After he was imprisoned, he spoke about how
all of a sudden his mind became clear and he couldn't figure out how he could do this
crime. The hypnosis was simply removed and the subject was allowed to sleep so
that experts studying the file would not find out anything if the subject would
have been subjected to traditional hypnotherapy or other psychoanalytical
techniques. Another successful counterintelligence experiment completed with no
liability or traceability to the NSA.
3.Perhaps ten years ago I read of several elderly people died of sleep
deprivation in Florida. The doctors tried everything they could do but could
not stop the sleep deprivation that resulted in a 100% effective termination
yield. The NSA had developed the right combination of delivered anxiety scripts
combined with muscular tension and delivery schedules optimized according to
decreasing post hypnotic durability over time as the subject's health degraded.
4.David Koresh of the Branch Davidians spent many hours talking with FBI
negotiators about God and the Bible and finally waited for "God" to tell him
what to do in the final hours of the siege. The compound probably had numbers
of Personal Journals (required for subjects by the NSA during brainwashing)
that could lead to questions about how this cult came to this level.
Additionally, just like other loose ends the NSA had to secure, "God spoke to
them and said to commit suicide" and they did securing another one of the NSAís
great experiments in mind control and social pathology. 5.A friend of mine,
David Sautter and I worked at Singer, Kearfott Division, producing government
weapons where we worked under a multi-tier security system; Company Security,
FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I
discussed the NSA's technology with Dave and a few months later, I heard he had
committed suicide inside of a locked room. This theme should familiar by now
and the details of the case will be destroyed or rewritten by NSA influences to
preserve national security.

7.The cases of NSA activities go on and on. With access to the FBI's Crime
Information Center (CIC), we could find several thousand files having the
characteristic patterns where the NSA had experimented on the individuals with
their "Thought Control" technology. 8.Currently, the NSA has many subjects in
the field (our society) that need only a series of "triggers" (carefully
constructed posthypnotic scripts) to send them over the edge and on a mission
to kill. The NSA calls them "Shooters on a Shelf". A recent example was Russell
Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26,
1998. He was diagnosed with schizophrenia, had delusions that he had an
affiliation with the CIA or FBI and thought a radio-tracking device was planted
in his tooth. He was a product of NSA brainwashing. He did not have the ability
to recognize the advanced technology even though he knew that "someone" (CIA,
FBI, etc.) was communicating with him and that this communication ability
spanned across the USA leading him to believe that he had a tracking device
planted on him. Because of the real effects of the NSA hypnosis treatments, he
therefore reasoned that the schizophrenia medication would not help and so he
quit taking it. This was a man desperately trying to alleviate the suffering
the NSA inflicted on him.

 

Continue:  The NSA and Mind Control--Part 2


Back to Previous Page

Return to Main Page