How to Tame a Demon: a short guide to organized intimidation stalking, electronic torture, and mind control



Download 0.59 Mb.
View original pdf
Page9/58
Date26.08.2022
Size0.59 Mb.
#59389
1   ...   5   6   7   8   9   10   11   12   ...   58
Robert Duncan - How to Tame a Demon - A Short Practical Guide to Organized Intimidation Stalking, Electronic Torture, and Mind Control
the silent massacre electronic torture and mind control in the united states of america max h. williams, monroe, louisiana, usa, 2008 kipdf.com
Frequently Asked Questions:
The following questions are typically asked from TIs. The answers to many of these questions are still unclear, but fora quick understanding of the options a TI has, and to understand the consequences of their decisions, this format and summary answers provide a concise foundation for new people brought into the program.
What is a TI (Targeted Individual)?
A TI is an abbreviation for targeted individual. A TI will experience defamation of character in their community, harassment, electronic torture, directed energy attacks, break-ins, organized stalking,
gas lighting, or a combination of the previous.
There are many reasons a government targets a particular person. If you have ever worked for the government with a security clearance, you will periodically get spied upon and tested to see if you will speak about secrets that you know or if you are still aligned with that country’s values. You will beset up,
discredited, or killed if the answer is not what they want. The US is the epicenter of the thrust for world domination and absolute control (Many other people are just mind control test victims who provide practice for the armature spies and data points for these newer technologies to control society, economics, and world politics.
Why me Did I do something wrong?
This is usually the first question asked by a target for these high tech projects. There are many answers. In the s, the gifted children who were intelligent and creative were brought into the programs. These qualities are probably still used but in any covert program the patterns must be hidden from the general public and independent researchers. Counterintelligence must be considered to hide the development and use from US. enemies and the progress made in mind control for enhancement or deprecation of the targets.
There seems to be certain sectors and classifications that are outliers in the data that we have collected on the population of targeted individuals. People, who have a drug abuse history, live alone in an apartment complex, whistle blowers, enemies of the state like peace protesters and so called dissidents become statistical outliers in the study. The government agencies try to make it as diverse as possible throughout the social strata for data collection.
New TIs get the “shame game” and think back to who might have the power to put them on a torture and slow kill list. It is a distraction of the truth. Do serial killers have a pattern The US
government is like a serial killer in terms of collecting data on every walk of life to understand the kill capabilities and disablement of individuals when they use these programs in war and peacetime. The
“shame game is used to extract secrets and blackmail on the target. The world is always at war. The databases are huge like the human genome projector the human mind project but this is important for the next generation of cognitive warfare.
Some researcher say the intelligence agencies involved in mind control are only looking for unusual minds for their cognitive databases and how to reeducate the target for conformity of thought and

as away to hide their experimentation on the fridge elements of society, those that are awake.
Practical advice One of the primary tactics of these mind control programs is to lead the TI
down a false path of blame of themselves, a particular group or person leading them to believe that that group or person is behind their misery and harassment. Don’t jump to conclusion right away. Remember voices can be transformed and mimicked and thereby false correlations created.

Download 0.59 Mb.

Share with your friends:
1   ...   5   6   7   8   9   10   11   12   ...   58




The database is protected by copyright ©ininet.org 2024
send message

    Main page