<<

OSEH MIND CONTROL TARGETED INDIVIDUALS

BECOME INFORMED COMPILED BY: KAREN CONNELL

EXTENDED LIFE CTM OSEH MIND CONTROL TARGETED INDIVIDUALS

OSEH MIND CONTROL TARGETED INDIVIDUALS

Compiled By Karen E. Connell © 2018

For FREE copies of this report contact: EXTENDED LIFE Christian Training Ministry www.extendedlifeCTM.org [email protected]

1

OSEH MIND CONTROL TARGETED INDIVIDUALS

Contents

Survival Information for Targeted OSEH Individuals ...... 4 Health Issues and the Misdiagnosis of Targeted Individuals – ...... 11 : THE TORTURED LIVES OF ‘TARGETED INDIVIDUALS’ ...... 21 Remote Mind and Behavioral Influence Technology Evidence Report ...... 28 V2K TECHNOLOGY ...... 33 OS TECHNOLOGY ...... 40 OSEH Targeted Individuals 101 ...... 43 Definitions ...... 47 Super-Fast Download Speeds ...... 61 What is 5G? ...... 61 Wireless Cell Antennas Galore ...... 62 MIMO Miniature Cell Towers ...... 63 Low Latency – High Efficiency ...... 63 The Dangers Of 5G – 11 Reasons To Be Concerned ...... 63 #1 – A DENSER SOUP OF ELECTROSMOG ...... 64 #2 – EFFECTS ON THE SKIN ...... 65 #3 – EFFECTS ON THE EYES ...... 65 #4 – EFFECTS ON THE HEART ...... 65 #5 – IMMUNE SYSTEM EFFECTS ...... 66 #6 – EFFECTS ON CELL GROWTH RATES ...... 66 #7 – EFFECTS ON BACTERIA RESISTANCE ...... 66 #8 – EFFECTS ON PLANT HEALTH ...... 66 #9 – EFFECTS ON THE ATMOSPHERE AND DEPLETION OF FOSSIL FUELS ...... 67 #10 – DISRUPTION OF THE NATURAL ECOSYSTEM ...... 67 #11 – MOST 5G STUDIES MIS-LEADING ...... 68 LIVE TESTING ALREADY BEGUN ...... 68 Call to Action ...... 69 WHAT EXPERTS ARE SAYING ...... 69

2

OSEH MIND CONTROL TARGETED INDIVIDUALS

How To Protect Yourself From 5G ...... 70 Endless Possibilities For The Future ...... 70 Other FREE Resources ...... 72

3

OSEH MIND CONTROL TARGETED INDIVIDUALS

Survival Information for Targeted OSEH Individuals

By Karen Connell What is OSEH? It is Luciferian technology using Satan’s messages as weapons against humans: that can infiltrate the human brain. These weapons are known as… Organized Stalking-Electronic . In May of 2015, I received a prophetic word from God regarding this technology that I published in my ministry TRUMPET SOUNDS Newsletter. In that issue I wrote the following:

For the past several months the Lord has been speaking the following things into my spirit. I hear the Lord saying:

There is going to be a ramping up by the antichrist forces worldwide to institute many of their New World Order plans and their horrific means with which to achieve these plans. Many weapons of unspeakable consequences have been developed for instituting this antichrist agenda—especially in the USA. There are weapons that are ready to be used that have ability to control and annihilate segments of the population in this nation—without firing bullets or the use of bombs. These weapons have the ability to manipulate the minds and the emotions of the American public—without their knowledge.

Bear in mind that there will be, as the Prophet Daniel said, an “altering of time and of laws”1—this includes “the appointed laws of time,” which will alter the perception of people’s reality… in order to deceive the masses. You must consider the many strange, but truthful events that the watchmen are revealing—for these events and entities must be understood according to the Word—for this will determine your future.

At the time of receiving this word, I had very little—if any knowledge, of what I am now sharing in this Watchman Report. In fact I forgot about the above prophecy until just recently as I was doing research for this material, when I “accidently” came across it. The WEAPONS mentioned in the above prophecy are now being described in this report.

4

OSEH MIND CONTROL TARGETED INDIVIDUALS

OSEH is a psychological attack that is being performed on innocent people all around the world. There are a significant number of victims, and there are many common links in what they are describing. It is clear to me, as a victim myself who has experienced what I believe to be a very broad spectrum of the techniques used, that this attack is being performed by a centralized The image depicts how a "voice-to-skull" authority (under Lucifarian weapon works. control), whose primary goal is to make public the use of mind control technology. The Army's very strange webpage on "Voice-to-Skull" weapons for instance has been removed. This technology is known as V2K technology, which will be addressed in greater detail in another article in this report. However, it was strange that the Army's webpage on "Voice-to-Skull" weapons was even there at all, and it's even stranger that it now gone. If you Google it, you'll see the entry for "Voice-to-Skull device," but, if you click on the website, the link is dead. None the less, the entry is still available on the ‘Federation of American Scientists' website and it reads:

“Nonlethal weapon which includes (1) a neuro-electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of a person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K in use is an electronic scarecrow to frighten birds in the vicinity of airports.”

The U.K.-based group “Christians against Mental Slavery”1 first noted the change (they also possess a permanent screenshot of the Army webpage as seen below). A representative of the group tells me they contacted the Webmaster, who would only tell them the entry was "permanently removed." Please read an article included in this report entitled, “Remote Behavioral Influence Technology Evidence” by John J. McMurtrey, M. S., which is documented proof concerning the “mental slavery” technology that now exists.

1 http://slavery.org.uk/science.htm

5

OSEH MIND CONTROL TARGETED INDIVIDUALS

Above is a screen shot of the ARMY webpage that is no longer available There have been many struggles before and since I discovered that I am a ‘targeted individual’ (TI). However, I am still here and I am learning a lot more on this demonic strategy being employed by Satan and his antichrist forces. I have no regrets regarding my research or targeting experiences. On the contrary, the Lord has allowed what I have been going through, to awaken me to the REALITY of this current horrific Lucifarian NWO plan. I seriously doubt that I would otherwise have understood how important it is to be aware of and to bring warning regarding this technology to others. Many of God’s servants such as Joseph and Daniel, endured much at the hands of their captures, so that God’s people could be helped. All things truly do… work together for GOOD for them that love God and are called to accordingly fulfill His purposes! (Romans 8:28).

I know there are other targeted individuals out there who are struggling, but are without hope, because they do not know Jesus Christ as their Lord and Savior. However, if you are a sold out consecrated born again child of God—let me assure you that you are going to be targeted! God’s people have been targets of Satan and his Lucifarian antichrist system since the fall of Satan. So be aware that the things mentioned in this article are only going to increase and get worse. Sadly many are unware of what is happening. Even now multitudes are being drugged (by their medical professionals) and are even being

6

OSEH MIND CONTROL TARGETED INDIVIDUALS institutionalized, others are homeless or are at risk of becoming so, because they are being painfully harassed to the point of giving-up.

Jesus warned us that horrible things were going to happen before His return to earth… and now we have mind control and behavior manipulation taking place that is now enslaving people worldwide. People are going to act the way the Lucifarian NWO wants them to behave when they succumb to its’ technological mind control weaponry. People will not feel or act as they “normally would” before becoming captives to this technology.

(Mark 13:12-13) Now the brother shall betray the brother to death, and the father the son; and children shall rise up against their parents, and shall cause them to be put to death... And you shall be hated of all men for my name's sake: but he that shall endure unto the end, the same shall be saved.

Hopefully this information will help you or others who are not aware of what is happening, to so they can become informed and learn how to fight the good fight of faith so they can endure to the end. We are not fighting against natural enemy forces, but supernatural demonic technology from powerful fallen principalities…

(Eph 6:12-13)For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places... Wherefore take unto you the whole armor of God that ye may be able to withstand in the evil day, and having done all, to stand.

Our Armor is our Personal Beliefs: Most of the harassments are mind games, therefore the only source for our protection is to develop and maintain faith in the core foundational Christian beliefs. This is without a doubt the first thing that enemy forces want targeted individuals to lose faith in. Thus, they have planted “tares” or false teachers and prophets among the “wheat” in God’s field of Christianity to bring doubt and confusion. If we are to be protected, our faith must be in the Word of God ONLY, and not in any MINISTER or MINISTRY! We must constantly be renewing our mind through meditating on His Word OF TRUTH, or we will be robbed of our identity and our eternal destiny, if we do not take control of our mind.

The enemy perpetrators’ main goal is to take full control of your whole being, body, soul (mind and emotions) and spirit. They will try to erase what is good about you by playing with your mind and attacking your physical body. If you are an empathetic, compassionate and spiritual Christian, they will slowly try to change you by trying to destroying your true Christian beliefs, and by especially desensitizing you through

7

OSEH MIND CONTROL TARGETED INDIVIDUALS unresolved anger and bitterness issues, thus making you a heartless cold person.2 Make sure your “core beliefs and practices”3 are intact and stay intact because this is the first step in acquiring and maintaining God’s protection against Satan’s onslaught against you.

It is “Your Brain, therefore YOU must discern EVERY thought” – no matter what they put in your mind, you must always keep this in your mind: it is your responsibility to be... Casting down imaginations, and every high thing that exalts itself against the knowledge of God, and bring into captivity every thought to the obedience of Christ (i.e. the truth from the Word of God). (2 Cor 10:5) KJV

Keep the above verse in your head and heart ALWAYS. You will be bombarded with unwanted voices that may sound like your own. No matter what you hear, it is still your responsibility to discern your thoughts, so take charge!

You must be resolved that “Evil will never win! Ever!” – Truly believing this will make your life easier, when (not if) you’re the one who is being harassed, because you are in a spiritual war and must learn how to do spiritual warfare—like it or not. Because you are a child of the true and living God, this makes you are an enemy of Satan. Never forget that Satan’s agenda is to steal, kill and destroy all that is dear to you! Make sure you always keep these things in mind when undergoing harassment.

2 Please request a FREE copy of my book and DVD entitled Downward Spiral into Darkness, which reveals the 9 steps in backsliding due to unresolved anger/bitterness issues. 3 The core beliefs and practices to which I am referring to, are that of being a true born again, Holy Spirit filled believer and follower of Jesus Christ.

8

OSEH MIND CONTROL TARGETED INDIVIDUALS

Also keep in mind, “God is the boss here, He is in control” – You either really believe that or you don’t! If you do—then you must allow Him to take charge. Knowing this will help you discern what God is allowing them to do versus what doors you have opened that gives them the right to do their dirty work.

(Eph 4:27, 29-30) Neither give place (i.e. the right, or a license) to the devil... Let no corrupt communication proceed out of your mouth, but that which is good to the use of edifying, that it may minister grace unto the hearers. And don't grieve the Holy Spirit of God, whereby ye are sealed unto the day of redemption.

Some harassments are unavoidable. For example, one has to take a shower or use the restroom. As you will learn shortly in this report, voices coming out of running water are sometimes unavoidable, you may truly hear them… many people do and think they are losing their mind. That is exactly what these enemies want you to think… (Prov 23:7) For as a person thinks in his heart, so is he... Or with a daily on-going noise campaign, you cannot control them, or stop them, but you can discern the truth and not allow the noise campaign to get to you. We must “brace” ourselves for worsening harassment!

(Isa 26:3-5)You will keep him in perfect peace, whose mind is stayed4 by You, because (of this) he trusts (finds confidence and security) in You... Trust in the Lord forever, For in Yah, the Lord, is your everlasting strength... For He brings down those who dwell on high!

4 The word STAYED Strong's #5564 camak (saw-mak'); means supported or braced (i.e. refers to being prepared for what is unpleasant or difficult).

9

OSEH MIND CONTROL TARGETED INDIVIDUALS

Health Related Issues: Targeted individuals experience a decline in health during the harassments, but especially when they are not taking control of their thought life as mentioned above. There are three types of harassments.

 The first is the preliminary surveillance  The Second… is followed by intense organized stalking/or mind games  The Third… is harmful electronic harassments using direct energy weapons.

Although the second one can commonly result in targeted individuals’ being institutionalized and/or heavily drugged, if they do not discern what is happening, the last stage is the most harmful, and requires God’s divine intervention and protection. Without this, people are subject to the powers that be as mentioned previously in the (Eph 6:12-13) verses.

“A game of chess, a chase for sanity” As one targeted individual recently indicated the whole harassment/targeting is a “mind game.” The perpetrators main goal is to steal your sanity. They want you to know they are there, so you will become fearful and hopeless. They want your undivided and constant attention.

Unless you keep your mind on God’s Word, you will become paranoid and delusional. You have to learn to block them from your consciousness (i.e. by casting down their imaginations and make them subject to the truth). Do not give your carnal mind the gratification of focusing on their inserted thoughts and desires.

Take Charge of your Thoughts – It is your brain, It is your mind. They are going to whisper ideas, commands, visual pictures all masquerading as, (i.e. lies, accusations and doubts) as your own thoughts. They will eventually inform you that it was them who put these pictures, ideas, commands, in your brain. Again, discern these thoughts and cast down what is not according to the truth. While this may take some time to practice, your “core beliefs” and making their lies subject to the truth will help you figure this out. Take charge, Own what will benefit you. And then cast down all the trash, the filth, the negative fearful thoughts that will harm you.

Committing suicide… is the perpetrators’ ultimate prize. Negative thoughts (accusations, lies and doubts) are poison and these are the perpetrators first tactics. To induce negativity in your soul. Control your thoughts, once they start with any fearful negativity, stop! If you find yourself starting to think fearful or negative thoughts, fight

10

OSEH MIND CONTROL TARGETED INDIVIDUALS this with the truth from God’s Word… ask Him to speak to you from His Word. To speak Scriptures into your mind that will combat these thoughts. This is faith and it will dispel all fear! (Rom 10:17) So then faith cometh by hearing, and hearing (God speak to you) from the word of God.

Targeted individuals are being attacked with direct energy weapons. The most common is the radiation coming from everywhere. Most of the time, it is when there is an electrical grid. When it comes to this, use shielding products to minimize the harmful effects (especially the shield of faith).

Following is an article from the blog “Targeted Individuals 101” regarding health issues for those who become targets for mind control:

Health Issues and the Misdiagnosis of Targeted Individuals – 5

“Using the Diagnostic and Statistical Manual of Mental Disorders IV, simply DSM, a person that is harassed 24/7, 365 days a year is under psychological warfare. The harassment target will experience symptoms similar to mental disorder as outlined in DSM like paranoia, delusions, and or schizophrenia. Most of the time, targets will be subjected to misdiagnosis by the health sectors and other people, who are connected and cooperating with organized criminals.

The normal routines are… the targeted person will be intensely stalked resulting in the person to normally act paranoid. Then the targets will be subjected to workplace and smear campaigns resulting in the decline in health issues and social isolation. A psychological misdiagnosis will be the outcome of all the above phases. The targets then will then be subjected to electronic harassments with directed energy weapons (V2K and microwave hearing). Normally, targets will

5 https://sites.google.com/site/targetedindividuals101/health-issues-1

11

OSEH MIND CONTROL TARGETED INDIVIDUALS

be coached to consume alcohol or illegal drugs. The result is the target’s life will be going into a downward spiral.6

By this time, targets would probably lose jobs and relationships. He or she is also in danger of becoming homeless. When targets seeks medical assistance, they will be medicated with psychotropic drugs. The normal “drugging” route is, that many become targets at a young age, as a guinea pig, with being prescribed Ritalin as the initiating drug. Then Paxil7 is introduced, if the targets survive an initial drug induced suicide, then he or she will be medicated with other drugs most probably to counter-act the side effects of the initial anti-depressant medication. The follow-up drugs usually used are Effexor, Olanzapine, Seroquel, Wellbutrin,8 etc. With the decline in health due to misdiagnosis and intentional medication of psychotropic drugs, targets who survive the numerous bouts of emotional and psychological traumas will then have the luxury of discovering his or her true predicament.” -End of Article-

Do Your Part

You can help your body to undo the damage of electromagnetic radiation, with for example the consumption of fruits and vegetables that are rich with Anti-oxidants.

Exercise routinely. Do house chores (avoid using vacuum cleaner if V2K (voice to skull harassments) are intense and try to walk more daily.

If you can avoid it, do not go to psychiatrist. Also if you can avoid it, especially do not take anti-depression pills. Be aware of sudden changes in your mood. Emotions like anger, sadness, shyness, and anxieties are not an automatic sign of mental disorders or

6 Please request a FREE copy of my book and DVD entitled Downward Spiral into Darkness, which reveals the 9 steps involved in experiencing increasing darkness that results in ultimate alienation from the life God. 7 It is indicated for the treatment of depression, obsessive–compulsive disorder, panic disorder, social phobia, generalized anxiety disorder and post-traumatic stress disorder in adults6 and is often used off-label in pediatric population. FDA notified healthcare professionals that the prescribing information for their products is to include warnings about the increased risks of suicidal thinking and behavior in young adults ages 18 to 24 years old during the first one to two months of treatment. 8 These are antidepressants drugs. Wellbutrin (bupropion) is an antidepressant medication used to treat depressive disorder. Antidepressants are neurotoxic, they harm the brain and disrupt its functions. They cause abnormal thinking and behaviors, including mania, suicide and violence. They cause detectable damage to the brain of the child or adult. Antidepressant-induced mania can include bizarre destructive behaviors, impulsivity, sexual acting out, callousness, grandiosity, and very bad judgment. Antisocial behavior is common. Extreme irritability can lead otherwise loving people to become hateful and violent. Loss of judgment can cause ethical people to act like criminals. Antidepressants often cause a worsening of the individual’s condition, with “crashing” into depression and suicide. Suicidality in children and young adults has been demonstrated in short-term clinical trials conducted by drug companies for FDA approval. Source: https://breggin.com/antidepressant-drugs-resource-center/

12

OSEH MIND CONTROL TARGETED INDIVIDUALS chronic depression. These are normal human emotions that come from listening to thoughts we are having.

Learn about “informed consent.” If you are forced to be institutionalized, you have the right to know all aspect of your treatments. You have the right to know about your medications. You have the right to know the reason why you are there.

Be aware of the fact that demonic Lucifarian forces have the ability to induce dreams relating to your past and can create “role-playing” acts while you are asleep. They use information given to them from demonic “familiar spirits” and by ongoing surveillance.9 The main goal is to induce negative thoughts, the feelings of shame or guilt are the most common example. The success of induced dreams are for the most part the demonic negativity that is embedded in one’s brain affecting the person’s mood. A targeted individual wakes up feeling sad, tired, or fatigue. Some have indicated that they felt like they had a hangover. Others have developed colds or allergies due to the lack of “real” natural sleep or rest. Some targeted individual’s say they deal with sleep deprivation with nutrients (eating bran oats) or meditation and find this to be an effective way to induce sleeps naturally. But to just lay in bed tossing and turning or staring at the ceiling in a vegetable state, is not recommended, instead get up and do something. Study the Word, pray and intercede in the Holy Spirit or even cleaning is a way of taking charge. Doing something to counteract any thoughts of how “you cannot sleep.” Once you’re busy doing something, It will eventually tire you out so that physically your body will shut down and hence will make you feel sleepy.

In an article that I wrote several years ago, I talked about some research I ran across at that time, in which a Nasa Scientist addressed the issue of what is known as the Luciferian Technology that is being revealed in this Watchman Report. In that article I stated the following:

“A NASA scientist, who is now said to be deceased, wanted his identity kept secret for possibly fear of what his NASA peers may say or for some other reason due to the nature of what he wanted published after his death. At any rate, it was because of this I was a bit skeptical of what he had

9 Keep in mind Luciferians are cult worshippers which have contact with the demonic spiritual realm, their technology and information comes from the fallen angels and demons. Simply Google “fallen angel technology” to research.

13

OSEH MIND CONTROL TARGETED INDIVIDUALS

to say until I saw the diagram he published. His diagram illustrates how clusters of what he calls “aliens” (and what I call demons) invade and contaminate the brain of humans through language and thoughts. This scientist claimed to discover this invasion of seducing spirits—which he called “interdimensional life forms” or “alien life” that is able to enter a human brain through “language” and manifest as a parasitic life form. See his diagram on “A Nesting Cluster.”

This man spent a lot of time and energy, as he was dying, studying “alien” activity. What he didn’t realize in all of this was that what he refers to as “alien activity” is actually” demonic activity”—which is revealed in the Scriptures. For example as I read this scientists information on how “aliens” (demons) travel through language I was reminded of the following text...

(Isa 59:4-5) (When people don’t) ...call for justice (what is right), or plead for truth… They trust in empty words and speak lies; (why? Because)…They conceive mischief (demonic activity) and bring forth iniquity… They hatch cockatrice’ eggs… He who eats of their eggs dies, And from that which is crushed a viper breaks out KJV.

This NASA scientist claimed that these interdimensional beings (demons) were parasitic life forms that could live in clusters in a human’s brain. As we know a parasite is a life form that feeds off of a “host” body in which it lives on or in. In our Threefold Cord Manual for healing and deliverance10 I teach a similar concept which states that demons gain access to our lives through our agreement with their thoughts, which come to us in the form of accusations, lies and doubts. When these are received by us they create our wrong beliefs and fearful expectations that lead to our making damaging inner vows that keep us bound to what is false or wrong. These ungodly beliefs, ungodly expectations and ungodly inner vows become the food source that feeds and empowers these demonic parasites and keeps them active in our life.

This scientist stated that a cluster of negative thought forms is known as a “psych nest”—in which aliens” exist in ideas. He states they can travel through language (SOUND WAVES) and that some negative thought forms

10 Request a FREE copy of the THREEFOLD CORD MANUAL For Healing and Deliverance from this ministry at: www.extendelifeCTM.org

14

OSEH MIND CONTROL TARGETED INDIVIDUALS

may be a parasitic form of interdimensional life. He goes on to say that many major television stations transfer these beings, by encoding programs with specific frequencies through which these alien beings can travel.”

Financial Attacks: When the enemy succeeds in ruining a targets health, the next avenue of attack becomes their finances. They will encourage you with thoughts and imaginations to accrue debts. They will entice you to have a self-indulgent lifestyle, or manipulate you into vices, such as gambling at your local casino while relaxing with a “glass of wine.” They will encourage you to live a life beyond your means. These enticements are common to everyone, except, targeted individuals are singled out with a pre-meditated, well-planned manipulation of their lives. This includes things like perpetrators using handpicked individuals to become bait who are introduced to you through (planned “chance”) meetings, to make you a “newly acquired friend” who they can manipulate into compromising, undermining and abandoning your core moral and spiritual values. Also the use of devices such as –advertisement pop-ups that are geared to your surveilled internet shopping, offering great “deals” you can’t pass up, which they have found are your favorite “things” that are used to entice you to buy. These and many other tactics are used against targeted individuals.

Knowing these things then, do not accrue debts, if you don’t have the money to spend, don’t spend, and especially—do not apply for credit cards! Do not apply for loans. Do not accrue cash advances and other high interest loans from anyone including your relatives. Be very aware of bank fees and shop around for a better rates and services.

You can neutralize the harassers’ efforts by educating yourself. For example, the tactic of “entrapment.” Targets who previously had debt problems will get several credit card offers via e-mail and other media to get them back on the elevator to occurring debt. Avoid this temptation. Other harassments aimed at those who are Christians, are nasty sex-related junk e-mails, meant to degrade and defile and tempt the recipient. Those who are actively involved in politics get unsolicited e-mail/ about their political views, affiliations or rival organizations. All of this, is there to manipulate your emotions.

Unwary and uninformed targeted individuals easily fall prey to experiencing financial hardship due to loss of income, employment, and debts. This makes it easy to corrupt spiritually bankrupt targeted individuals into cheating and stealing or falling for questionable money making schemes, so be very aware of being manipulated into greed and covetousness. Those who are spiritually strong will work hard and honestly—

15

OSEH MIND CONTROL TARGETED INDIVIDUALS for they know and trust the fact that God will always provide for their NEEDS (and please notice I didn’t say their GREED).

Always be aware of the changes in your workload and your health. An increase in workload because of the manipulated need for more money which leads to anxiety and stress and resulting related illnesses, which are all manipulations of OSEH. Also be aware of frequent intense headaches, a sign of electronic harassments from Directed Energy Weapons (DEW). A directed-energy weapon (DEW) is a ranged weapon system that inflicts damage at a target by emission of highly focused energy, including laser, microwaves and particle beams.

Be aware of the changes in your relationships. If you noticed that one by one your friends are disappearing, this is a telltale sign that your friends are getting infiltrated and are being brainwashed by their mind control forces. A against targeted individuals is a common enemy tactic. However, God uses this to let us know who are true and trusted brethren really are a true Christian friend will not turn their back on you.

Organized Stalking: Stalking is a common noticeable sign of targeting. Its main goal is to induce mental confusion. Paranoia, delusional, anxiety, fear, agitation are the common result of being stalked.

One targeted individual said, “this is a game of chess, a chase to one’s sanity.” So be very aware of the mind games they play. They want you to feel paranoid. They want you to be super sensitive, to be very observant. In other word, they want you to take notice of every aspect of the harassment. So you have to learn to ignore them stalkers. You must take control and not give them the attention they are desperately seeking from you.

Targeted individuals have been known to experience break-ins and home invasions. When this is the case, normal occurrences are to take invaluable items that will disappear and reappear, or furniture being moved or a stove being left on. They leave signs that

16

OSEH MIND CONTROL TARGETED INDIVIDUALS someone was inside your property, such as cigarette butts in your front door. These kind of tactics are mind games, used to induce paranoia and delusions.

All these things are aimed to heighten negative emotions, they want you to feel fear and anger. They want you to become very socially opinionated. The most common is the opinion that your civil/human rights are being violated, causing targeted individuals to be perceived as combative and agitated social or political agitators. This makes it easier for them to label targets as dangerous, emotionally unstable threats to society.

Unless you are spiritually discerning you will not be able to filter out what is disinformation news or propaganda, from that which is authentic information that is going to be vital in surviving what we will be facing in the perilous days ahead.

Electronic Harassment: The third stage of targeting is the electronic harassments. This involves direct energy weapons (electromagnetic radiation), microwave hearing, voice to skull, computer hacking, and other harassments that involves electronics. The perpetrators can access house alarms, air conditioners, heaters, fridges, television shows, alarm clocks, cell phones, landlines, and computers. They can change the display dates and clocks on electronic appliances and reprogram your television or computer. They can also emit radiation from your television or computer.

In my research I have found that targeted individuals’ harassment is broadcast globally to make people worldwide feel angry and frustrated. This needs to be counteracted by using broadcasting as a platform for exposing what they are doing. Always remember that people are not stupid, there are still many decent and sane people out there, people who know what is right and wrong and people who still believe in human freedom and decency. Many targeted individuals experience verbal physical threats through induced sounds. These thoughts or voices must be cast down and made subject to the NAME (i.e. power and authority) of Jesus Christ…

(Phil 2:10-11) That in the NAME of Jesus every knee must bow, in heaven and on earth and under the earth... and every tongue (spoken word) must confess that Jesus Christ is Lord (and not Satan and his Luciferians)!

17

OSEH MIND CONTROL TARGETED INDIVIDUALS

Hearing versus Listening

Hearing is simply the act of perceiving sound by the ear. Unless you are hearing- impaired, hearing simply happens. You cannot help what you hear—but if you are listening to what you are hearing--that is something you are consciously choosing to do. Listening requires concentration and focus—so that your brain can process meaning—from what you are hearing. Listening leads to forming thoughts and ideas that lead to decisions and actions.

Accusing fearful lies and doubts need your concentration or attention, in order for your brain to process these and to form emotions and responses. In order for fearful lies and doubts to remain meaningless, you must choose not to listen to them.

Keep in mind that demons will harassed you by impersonating your own voice, especially while reading important material (especially the Bible), interjecting their accusations, lies and especially doubts—by asking questions you have no answers for. Learn to do meditative reading that is a “slow-read,” and to ‘rewind’ while reading, so you can be listening to God while you are reading. Many times as I have had questions enter my mind, God’s Holy Spirit brought a verse of Scripture to my mind as an answer to a question. It’s your brain, so let the Holy Spirit teach you what you need to learn.

When targeted individuals are being harassed using voice to skull or microwave hearing, known as VK2 Technology, the harassers use tailored harassment protocols. They use the “hearing vs listening” technique and take control of the protocols. Only you can allow those thoughts that you want to “listen to.” Thus, take full control and responsibility for what you think (listen to). It’s your brain, you’re the boss. Without your cooperation your harassers gain nothing. Without you they will not get their way. So take charge.

18

OSEH MIND CONTROL TARGETED INDIVIDUALS

Voice to skull or microwave hearing – requires your passivity to be successful, so DO NOT cooperate by becoming passive! Whatever accusations, cursing, filthiness, and nastiness these harassers use, do not passively LISTEN or REACT to them! Do not give them any attention. Since they are forcing themselves upon your mind, do not give them anything more than silence which is more than enough.

The Lucifarian agenda is to create a perception of you that involves “national security,” “counter-terrorism,” and ‘behavioral modification.” All lies! Unfortunately, the primary motive for this operations is money! Contracts are being developed and paid. Companies and organizers are profiting. Technicians are getting a decent income and other benefits. It’s all about making money and destroying your life.

Unless can afford to buy the expensive anti-electromagnetic fabrics, you can instead use these techniques. Wear several pairs of underwear for protection to radiation attacks in your genitals. Wear thick sweaters and hoods to cover your head and chest area. When sleeping, use several blankets and pillows to minimize the sting of pulse radiation attacks.

Take note of the symptoms of the electromagnetic radiation so that you can lessen the pains. There are regular attack hours and there are some intervals of rest. The whole sequence is to make it sure no one will notice or no one will question the torture. The most common outcomes of the torture are cancer and heart attacks. Daily symptoms are: racing or irregular heartbeat, hard/heavy pumping of heart, fatigue/exhaustion, dizziness, loss of balance, intense headaches, skin dryness, intense body itchiness often followed by scarring.

Disinformation

Disinformation tactics are those activities perpetrated by phony or Lucifarian fake targeted individuals that are visible on all social media networks. They are there to make sure the public gets the impression that most targeted individuals are mental cases, mostly delusional and or paranoid. They are there to make sure that the public will have the impression that most targeted individuals are terrorists, perverts, antichrist, anarchist, anti-government, or anti-this and that.

Their basic functions are to misinform the public, plant seeds of doubts regarding targeted individuals themselves and their groups. Lucifarian plants or fake-targeted individuals are provocateurs, who will initiate fights between targeted individuals so that any event or activism fails or become disorganized. They are also there to instigate hatred within different communities, plant rumor and misinform the public about issues affecting targeted individuals. Knowledge is bliss! They know their actions are a crime

19

OSEH MIND CONTROL TARGETED INDIVIDUALS that’s why they are hiding within their high-tech gadgets! Here are some facts: this operation violates human rights, constitutional rights and civil rights that highly industrialized and developed countries adopted. In addition these perpetrators are essentially terrorists! Their tactics are designed to be nearly impossible to prove, and are aimed to make genuinely targeted individuals look and sounds crazy, so don’t fall into their trap.

Unfortunately, there are many sectors of society that are participating in the crime of targeting. The motive is clear: it’s for money and control. Thus, the health care industry, the military, the governments, and financial institutions and yes, even tax exempt religious institutions –all profit in some manner from targeting individuals. Today MIND CONTROL TECHNOLOGY is a global billion dollar system that has officially unfolded through legalization, which legitimized nonconsensual human experimentation for military and law enforcement agencies, for research activity and testing. The horrible reality, are the victim's reports about this program becoming a high-tech subjugation effort, which has opened the door for massive, inhumane, VICIOUS violations of Constitution, Civil and basic Human Rights—from which we will never recover! We have past the point of no return.

As the symptoms of OSEH become daily normal occurrences in the lives of multitudes of people, it is very hard to detect who is being targeted and who is not. It’s hard to get a factual statistic on the number of targeted individuals globally. One thing is for sure though, it is happening around the world. So God’s people need to become informed and awakened to Satan’s endtime deceits and wiles being used against them, and most of all they need to arm themselves for the good fight of faith so they can endure to the end!

RELATED GOOGLE SEARCH:

The EMF Safety SuperStore Full-Body Scan Technology Deployed In Street-Roving Vans (video) Full-Body Scan Technology Deployed In Street-Roving Vans (article) US to Use Microwave Weapons On America Citizens Electromagnetic Radiation (emr) Weapons: As Powerful As The Atomic Bomb Michigan Passes Anti Electronic Harassment Law Including Life in Prison LRAD-PUTTING VOICES IN HEAD

20

OSEH MIND CONTROL TARGETED INDIVIDUALS

MIND GAMES: THE TORTURED LIVES OF ‘TARGETED INDIVIDUALS’

BY LAURA YAN

03.04.18 https://www.wired.com/story/mind-games-the-tortured-lives-of-targeted- individuals/

Thousands of people think that the government is using implanted chips and electronic beams to control their minds. They are desperate to prove they aren’t delusional.

EVERY MORNING, LIZA wakes up and remembers that she’s been tortured. When she looks down at her hands, she can see slightly raised bumps where she believes she’s been implanted with microchips. She is certain that the chips track her every move, that her family has been programmed not to listen to her. She knows that her mind had been pushed to the limits of human endurance (“the most pain you could put on a person before they die”). The targeting, the rewiring of her brain, is so extreme that she can no longer even cry.

Liza is 56, a thin, wiry woman with elf-like ears and bright eyes, an artist who grew up in the Rocky Mountains. She worked at Microsoft for 10 years and started her own web development company with her partner before the electronic attacks, the stalking, and the surveillance began. She knew it had to be some form of technology attacking her— she’d worked in the technology industry for more than a decade. She knew what it was capable of.

When she sought help, a hospital committed her to a 10-day hold in the mental ward, teaching her how to calm her racing heart without addressing the technology that Liza believed was causing it. When she was released she found answers to her questions online. There was “an encyclopedia of information,” she says, a whole new vocabulary to help explain what she’d experienced: gangstalking, brain computer interface, psychotronics. “I felt really thankful,” she says. “I felt like I was opening up this crack into a whole new universe.”

21

OSEH MIND CONTROL TARGETED INDIVIDUALS

Liza, who asked for her name to be changed, fearing retribution from the person or group behind her targeting, learned that she was one of thousands of people who identify themselves as “targeted individuals”: a victim of human experiments, tracked and stalked and harassed by remote electronic weapons. There were others who understood her plight, and together they could try to take action, fight back, and maybe, find some relief.

IT WAS LATE October when my Uber slowed to a stop in the woods after dark. My driver seemed alarmed. We’d driven to the forests outside Boston, up a rocky, limited- access road with few lamps and no residences in sight. We pulled to a stop at the top of a hill with a few low, cinderblock buildings in the distance. It was dead quiet. “Where are you going?” he asked.

I tried my best to explain. I was there to attend the first ever Unity and Hope Conference, a weekend gathering of targeted individuals. The TIs were there to learn and organize and to be reminded that they were not alone.

I’d first heard about the TI community last summer while researching an article about RFID chips—those rice-grain sized devices that can be implanted beneath the skin and used to unlock laptops and doors. People have been implanting microchips in pets as “tracking” devices for years, even though the chips don’t actually track locations—they serve as virtual ID tags that confirm the identity of a lost pet if it’s listed in a database. Few people know as much about RFID chips as a biohacker named Amal Graafstra. On his website, I stumbled on a strange letter called “So You Think You’ve Been Implanted Against Your Will,” which he posted in 2016.

“Hello,” the letter began. “You’re likely here because you have a problem.” Graafstra went on to list common symptoms: You hear voices or see lights—you believe you’ve been implanted with a chip against your will. Graafstra wanted to help. He is actually a big proponent of RFID technology: He’s had a chip implanted in each hand since 2005.

To Graafstra, getting the chip implants was a “no brainer,” and he loves to experiment with what they are capable of. (Among other things, his implants allow him to unlock his car and operate a smart gun that only he can fire.) But not everyone shares Graafstra’s perspective. Shortly after news of his implants was published in March 2005, he got his first piece of hate mail. Since then, he’s received hundreds more strange emails, from death threats to questions from worried TIs.

In the beginning, when he first started hearing from people who believed they’d had chips implanted against their will, Graafstra wrote back to them. “I was like, OK, this person is misinformed—it’s a normal intelligent person who maybe has the wrong idea. I tried really hard to engage.” He suggested ways to verify if they really had an implant, like getting an X-ray at the doctor.

22

OSEH MIND CONTROL TARGETED INDIVIDUALS

He pointed out logical fallacies in their beliefs, including the technical impossibility of chip implants capable of tracking an individual: A GPS microchip would have the same energy demands and battery problems as a smartphone, and while researchers are experimenting with implants that might help treat neurodegenerative diseases or link prosthetics to neural pathways, even the most advanced technology can’t make someone hear voices or experience a different reality. But his logical appeals rarely mattered—the people on the other end had already made up their minds.

In the weeks leading up to the Hope and Unity Conference, I’d spoken to a few TIs over the phone myself, and I encountered the same certainty and desperation as Graafstra. But I’d never met a TI in person, and walking up to the buildings that first night, I was nervous—I had no idea what to expect. I said hello to a few people gathered outside, and then looked for the conference’s organizer in the cafeteria. It was the main meeting area, and it was warm and cheerful inside: Classic rock played from the sound system, and attendees, mostly in their forties and fifties and mostly white, drank tea and ate brownies under fluorescent lights.

They were, for the most part, friendly and talkative. A woman grew suspicious of my notebook (what’s a better cover story than being a writer, she said) while another thanked me deeply for listening to her story—it wasn’t often that she got to tell it without judgment or dismissal. Before I settled in for that night’s program, a screening of a documentary called Monarch: The New Phoenix Program, I headed to the dorms. The venue was a nature education center, a summer camp for kids, but that evening the long hallways, orange carpet, and outdated furniture seemed somehow eerie. I set my bags down in an empty room and went back to the cafeteria, where the lights would soon dim for the showing. Over grainy archival footage, a monotoned narrator explained the shadowy history of CIA programs like the original Phoenix, an assassination and torture initiative that killed as many as 40,000 suspected Viet Cong supporters during the Vietnam War. Next, the documentary reviewed the infamous MK Ultra program, carried out by CIA operatives and psychologists during the Cold War, a true history that sounds like a horror film: heavy doses of LSD, sleep deprivation, intensive electro-shock therapy, alleged experiments on children, psychological torture.

MK Ultra and the Phoenix Project both sound like the stuff of conspiracy theories, but much of what’s alleged has since been documented and confirmed. The movie doesn’t stop with history, though: It alleges that the secret government programs never ended. They are still attacking US citizens through covert, powerful electronic weapons today, and the victims are the targeted individuals. The droning narrative and disturbing imagery made me increasingly unnerved, and I left before the film ended. Back in my dorm room, I stayed awake late, listening to sirens and tires screeching in the distance.

IN THE MORNING there were around 50 attendees gathered in the presentation room. The day began with a talk by Matthew Aaron, a PhD in neurobiology who was working

23

OSEH MIND CONTROL TARGETED INDIVIDUALS on an article on bioluminescent fish for Nature magazine when his targeting began. Today, Aaron works as a science consultant in Washington, DC, and he began his talk with a disclaimer: His presentation was aimed at the general public, not the expert audience in front of him. (“By being targeted, you know more than a non-expert could ever hope to know,” he said.) He thanked the non-TIs who had shown up at the conference. “That shows a degree of willingness to take this issue on and consider it. And that’s a big step,” Aaron said. “It’s a very lonely crime that we’re going through.”

Through the next hour, he detailed evidence of his own targeting and the potential technologies used against him: from low-intensity microwaves from the neighbor next door to military electronic beams. His targeting began in his apartment and eventually became so bad that he ripped off sections of the drywall—spots, he believed, that emitted “hot electric microwave energy.” Later, after he’d fled Vancouver, Canada, he examined the pieces under a blacklight. Around the spots he’d removed, he found “rings of fluorescent material.”

The next two days were packed with similar dissections of targeting technology, testimonials, and action plans. A woman showed the unlikely links that popped up when she began typing code names for the CIA and MK Ultra into a local property deed website. David Voigts, a former Naval officer, spoke about walking across the US to raise awareness of nonconsensual human experimentation. (His talk moved the TIs to line up after and shake his hand in gratitude).

During breaks and meals, TIs who had never met before discovered shared symptoms and compared notes and theories, from who was behind their targeting (government agencies, criminal organizations, big tech companies, people in their own lives) to ways to detect or shield themselves against the technology. They were full of information and desperate to learn more. They were engineers and scientists and artists, former government and military employees, and some, like Liza, had driven more than 2,000 miles to attend.

It wasn’t the first time Liza had traveled far to seek a solution to the targeting of individuals. In 2014, she drove from the Midwest to New York City, sleeping in her car for two weeks while she met with nonprofits she hoped to enlist in combatting the problem: the Center for Constitutional Rights, Psychologists for Social Responsibility, and Physicians for Human Rights. She hoped that someone would help put a stop to the injustices she suffered. “Nobody would take my story,” she says. “Nobody would touch it with a 10-foot pole.”

But at the conference, she and the other TIs were among people who understood them, people who spoke the same language. Outside the presentation room, beneath the sun and the blue sky, if I could momentarily forget that we were talking about mind control, it almost felt like I was at an adult summer camp. And at the end of the third day, the TIs

24

OSEH MIND CONTROL TARGETED INDIVIDUALS gathered together on a hill for a group photo. They called out “We are the targeted individuals!” on a count of three while the camera snapped. Getting a decent photo took some jostling. When the photographer directed, “More enthusiasm!” a woman responded, half in jest: “We can’t! We’re TIs!”

TO THE OUTSIDE world, the TIs’ beliefs are implausible, ridiculous, or evidence of mental illness, in large part because technology and paranoia have a long, interconnected history. In 1810, a man named James Tilly Matthews, who was confined in London’s infamous Bedlam asylum, drew a detailed illustration of a machine he called the “Air Loom." He believed that with it, a gang of invisible assailants was tormenting him with gases and magnetic rays. Similar theories popped up with the advent of the telegraph and cell phones. More than 200 years later, the narrative sounds startlingly familiar. The difference? Today, prototypes of directed energy weapons actually do exist (though none are in use; the UN banned blinding laser weapons in 1998) and sonic weapons have been around for decades.

According to David LaPorte, a psychology professor at Indiana University of Pennsylvania, technology is the perfect culprit for delusional beliefs: It’s ever-evolving, and for many people it’s slightly beyond understanding. The earliest Google searches for the term “targeted individual” appeared in 2004, around the time Graafstra got his first RFID chip implants, and searches for the term spiked in 2013–14, when Edward Snowden exposed the NSA surveillance of ordinary Americans.

Today, technology is increasingly folded into our everyday lives. Some 8.4 billion “connected things” will be used globally this year, most of which are vulnerable to hacking and surveillance. Early this year, a German regulatory agency labeled a blond, talking doll named My Friend Cayla “an illegal espionage apparatus,” recommending its destruction. The FDA recently approved the first pill that can track whether a patient has taken it. These Big Brotheresque developments are worrying even if you are not a suspicious or paranoid person. For the TIs, these devices are their worst fears realized. The technology doesn’t just spy on them or track them. It attacks them.

Finding others who share your beliefs creates a “perfect storm,” LaPorte says, a way for the beliefs to spiral. Without the internet, LaPorte believes, “this would have never happened”—or, at least, it wouldn’t have happened on the same scale nor spread as quickly nor become so deeply rooted. The New York Times estimated that there are more than 10,000 self-identified TIs, it is also what lets them meet each other. In weekly newsletters and in-person support groups, they find a community of people who listen and the knowledge that they’re not alone.

ONE MORNING AT the conference, I overhear a TI tell another that she was planning to “get” her perpetrators. “What do you mean?” The other woman asks.

25

OSEH MIND CONTROL TARGETED INDIVIDUALS

“I mean, I’m going to get them. Maybe not all of them, but as many as I can get,” she says. “Did you see that guy wandering around last night? You remember what happened with Vegas? What if he’d come in here with a gun?”

She’s talking about the man with a fedora who had stood at a distance from the other TIs, muttering to himself, pacing and acting strangely last night. He turned out to have been a fellow TI, surprisingly friendly when he wasn’t muttering warnings. But it is days after a gunman shot 58 strangers at a concert in Las Vegas, and the thought of it must have been hanging over everyone’s minds. I feel unsettled too. When I curl up in bed that night, I think about all the unlocked doors at the conference and the unpredictability of violence.

And for days after the conference, I worry. Was the woman I’d overheard planning something serious, and was I responsible for doing something to stop her? According to LaPorte, there are rare but disturbing instances of paranoia that lead to violence—in 2016, a man in Colorado who shot numerous police officers identified as a TI—but the statistical link between mental illness and violence is far lower than most people believe. “I’ve not seen evidence that the TIs commit violence,” LaPorte told me.

I was too nervous to confront the woman from the bathroom, unsure about how she would react. But before I left the conference, she approached me and handed me a binder that contained her full story. When I read it, I felt both sad and reassured: In her handwritten pages, there were many pleas for help and no plans to harm.

SOMETIMES TIS ASKED me if I was worried about becoming targeted myself. I told them no, but I was worried—about what might happen to the TIs and what they might be driven to do. Most of all, I worried that I would disappoint them—that I couldn’t tell their story the way they wanted it to be told.

Liza and the other TIs told me, again and again, that the worst part of being a TI is not having people believe you. Being made to look crazy was part of the targeting. While the TIs are still searching for evidence of black ops and covert crimes, their stories are just that: stories. You could believe them or not. Most people don’t. “That’s a terrible thing,” Liza said. “You don’t really understand how dear and vital the connection to other people is until it’s taken away.”

In the months I’d spent talking to the TIs, I witnessed how lonely it was to experience something that so few can see or acknowledge, how terrible it must be to be dismissed as crazy and delusional, no matter how hard you tried to make people understand.

Months after the conference I got an unexpected email from another TI. She was an artist who wore a hat trimmed and lined with copper to block out radio waves. She was lovely and memorable. I’d comforted her briefly at the conference when she had a fit of

26

OSEH MIND CONTROL TARGETED INDIVIDUALS unhappiness. Her email was brief: She offered to talk about her experience and attached what she said was evidence of her targeting and photos of her paintings. “You were very nice,” she wrote, “and that is rare for us to experience.”

I broke into tears when I read it, imaging a life in which such a small kindness would be so hard to find.

Liza had told me stories of her life before the targeting began: the 10 summers she spent working at hatcheries in Alaska, painting watercolors and working at her friend’s general store, zooming around in a little Honda that was like the “closest thing to flying.” She travelled overseas, seeing Israel, Turkey, Egypt. She spent years painting or making sculptures, and later falling in love with Microsoft: the campus with all its trees and the freedom to learn everywhere. She’d always loved learning and exploring new worlds, but the TI universe is different. “It’s not about who we are, but technology," she says. "It changes who we are and it changes our lives.”

Once she loved technology, shaping and molding it, playing with data in the backend of a website. When the targeting first began, she even considered the ways the technology could do good: What if, for instance, the chip inside your head could teach you to speak a new language? But she quickly learned that it wasn’t there to teach her—it was there to hurt her. It was permanent, and it would change her forever.

27

OSEH MIND CONTROL TARGETED INDIVIDUALS

Remote Mind and Behavioral Influence Technology Evidence Report

John J. McMurtrey, M. S. Dec. 2003

Note: This is an excerpt from the above entitled report. You may read this report in full at: http://slavery.org.uk/RBITE.htm#sdendnote145anc …The numbers in parenthesis are end note reference numbers that appear in this article.

People discerning remote manipulation by technology capable of such influence as being reported here have formed protest organizations across the world (1) (2) (3) (4). Educated society is uninformed regarding authentic documentation of the development and existence of these technologies, and are unaware of the dangers. Complaint of ‘hearing voices’ and perception of other remote manipulation must receive appropriate scientific and legal investigation with protection. Professional awareness is virtually absent...

This report contains evidence for the following:

1. Human wireless internal voice transmission and tracking technologies. 2. Reports of electroencephalographic (EEG) thought reading capacity, evidence of covert development, and remote EEG capture technology. 3. References to the use of these, or similar technologies against humans.

An Army Mobility Equipment Research and Development Command report affirms microwave speech transmission with applications of “camouflage, decoy, and deception operations.” (22) “One decoy and deception concept presently being considered is to remotely create noise in the heads of personnel (people) by exposing them to low power, pulsed microwaves . . . By proper choice of pulse characteristics, intelligible speech may be created” quotes the report.

Numerous designs involving human location, identification, and tracking methods, have long demonstrated the feasibility of constructing devices capable of producing internal voice continuously in isolated individuals. To deny such technological capabilities in the face of extensive complaint is willfully to ignore documented development of the relevant technologies and engineering competence for complete integration.

Functional magnetic resonance imaging (fMRI) studies also report differentiation of cognitive states. Distinguishing truthful from deceptive responses by fMRI is also reported. The ability to discern the state of romantic love towards an individual by fMRI has report as well.

28

OSEH MIND CONTROL TARGETED INDIVIDUALS

A letter by the Department of Defense Assistant General Counsel for Manpower, Health, and Public Affairs, Robert L. Gilliat in 1976 affirmed brain wave reading by the Advanced Research Projects Agency.141 “Thought reading or synthetic telepathy” communications technology procurement is considered in a 1993 Jane’sg Special Operations Forces (SOF) article: “One day, SOF commandos may be capable of communicating through thought processes.” 142 Descriptive terms are “mental weaponry and psychic warfare”...

In 1976, the Malech Patent # 3951134 “Apparatus and method for remotely monitoring and altering brain waves” was granted.143 The possibility of impressing an ‘experience set’ upon an individual by ultrashort pulses is also exists.143 The above patent can alter brain waves as well as detect them. Microwave non-lethal weapon brain wave disruption145 and behavioral change includes unconsciousness146.

The above EEG telemetry patent and ultrashort pulse method are by active radar probe. Yet a passive field extends as far as 12 feet from man as detected by a cryogenic antenna.147 A technical article maintains this device as entirely adaptable to clandestine applications, and pointedly comments on the disappearance of physiological remote sensing literature since the 1970’s for animals and humans,

The microwave irradiation of the American Embassy in Moscow received little publicity until the winter of 1976 instillation of protective screening, but irradiation was known since 1953.34

The most documented citizen microwave irradiation was of peace protesters at Greenham Common American Air Force Base in Berkshire England, who prompted investigation of unusual symptoms.163 Radiation measurements exhibited microwaves with symptom experience up to a hundred times the background level, and rose sharply on protests nearer the base.160 Symptoms became pronounced on cruise missile transport, a protest focus.160 Recorded were wide ranging complaints: skin burns; ‘severe’ headaches; drowsiness; temporary paralysis; uncoordinated speech; two late (5 mos.) spontaneous abortions; an apparent circulatory failure; and unlike usual menstrual synchronization, irregular or postmenopausal menstruation. The symptom complex fits well with electromagnetic exposure syndrome 160 It has also been reported that some of the women ‘heard voices.’164 The base closed finally in 1991.

Ultrasound behavioral influence technology use in Northern Ireland is cited 168 The device could focus on one person; and utilized ultrasound cancellation like those patented. It was employed in Vietnam by the Americans, and is known as the squawk box. Mentioned infrasound frequency (ultrasound carrier directed) is like Loos 1/25/00 patent, with psychological effects summarized as ‘spooky.’ More detail by a defense journalist is quoted: “When the two frequencies mix in the human ear they become intolerable. Some people exposed to the device are said to feel giddy or nauseous and in extreme cases they faint. Most people are intensely annoyed by the device and have a

29

OSEH MIND CONTROL TARGETED INDIVIDUALS compelling wish to be somewhere else.” 169 British police inventories list the specific device, though a spokesman denied use.160

Sophisticated behavioral influence capability is confirmed by ex-intelligence officers. Julianne McKinney, Director of The National Security Alumni Electronic Surveillance Project is prominent. This is a largely classified employee victim study with internal voice transmission avowal.170

Potential behavioral influence targets are multiple. Since those supposedly expert regard a victim’s perceptions as psychotic, all complaints are disregarded, not to mention capability to bear witness. Targets may include anyone worth neutralization: domestic adversaries;171 security risks, which may only comprise classified disclosures; persons witnessing serious improprieties; and those prone to committing advantageous felonies. Legality is readily circumvented by executive orders, (particularly declaration of a crisis or emergency situation), which can be sealed, and this prerogative is only accountable to co-equal branches of government as is now the case with terrorism suspects. Internal voice technology is most applicable within the same language and culture. Space here limits more than mention of remote EEG influence capacity, hypnosis, and footnoting remote subliminal technique. Hypnotic or subliminal message presentation represent particularly insidious means of influencing thought, mood, behavior, and undermining civil liberties.

Though there is some scant psychoanalytical acknowledgement,175 current medical awareness ensures effective neutralization of the afflicted. Not all those affected are stigmatized. However phenomena of ‘hearing voices’, or perception of remote manipulation, when recounted to health professionals results in various stigmatizing diagnoses, 176 177 totally without investigation. Determination of relevant fields around complainants is mandatory, or abatement by proven shielding of such phenomena. Professional opinions formed without excluding these technologies are negligent.

The medical community has long heard either identical or similar complaint 178 to that above delineated as known internal voice technology from numerous victims. This fact indicts the scholarship and presumption of impossibility evident in the pertinent medical literature. In addition, microwave bioeffects have considerable congruence with reported symptoms of major psychosis other than ’voices.’ 179 All of society should be disturbed at the prospect of technologic induction of voice, since the unaware subject would perceive such voices as his own natural thought, without such an assault as to provoke complaint.

It is difficult to deny the level of substantiation for the possibility that a thought reading capacity exists, even with references that support a remote basis. The logic that in the thirty years since the Pinneo work started, this capability has had full development is too sound to dismiss victim corroboration. It would have to be admitted that funding for

30

OSEH MIND CONTROL TARGETED INDIVIDUALS projects by the defense and security agencies is considerably greater than for open science, and that thought reading would be a priority area. Educated democracies should not be complacent at this prospect, given the potential for political control, and existence of a remote EEG method in the public domain.

Acknowledgements: Thanks are given to God for inspiration, and a benefactor of Christians Against Mental Slavery for financial support. There is gratitude also to Dr. Paul Canner, and Dr. Allen Barker for their suggestions. Excellent compilation of research sources by Eleanor White is also acknowledged, though her site is no longer publically available.

REFRENCES

1 Mind Justice (Formerly Citizens Against Human Rights Abuse), Director, Cheryl Welsh, 915 Zaragoza Street, Davis, CA 95616, USA. Website at http://www.mindjustice.org/ Email is [email protected]

2 Christians Against Mental Slavery, Secretary, John Allman, 98 High Street, Knaresbourough, N. Yorks HG5 0HN, United Kingdom. Website at http://www.slavery.org.uk/ Email is [email protected]

3 Moscow Committee for the Ecology of Dwellings, Chairman, Emile Sergeevne Chirkovoi, Korpus 1006, Kvrtira 363, Moscow Zelenograd, Russia 103575. . Website at http://www.moskomekologia.narod.ru Email is [email protected]

4 International Movement for the Ban of Manipulation of the Human Nervous System by Technologic Means, Founder, Mojmir Babacek, P. O. Box 52, 51101 Turnov, Czech Republic, Europe. Website at http://www.geocities.com/CapeCanaveral/Campus/2289/webpage.htm Email is [email protected]

22 Oskar KJ. “Effects of low power microwaves on the local cerebral blood flow of conscious rats” Army Mobility Equipment Command Report,. # AD-A090426, 1980. Available form NASA Technical Reports. Abstract at http://www.raven1.net/v2s- nasa.htm

142 Lopez R. “Special operations survives Pentagon budget constraints” Jane’s International Defense Review 26(3): 247-51, 1993.

143 Malech RG. Patent #3951134 “Apparatus and method for remotely monitoring and altering brain waves” USPTO granted 4/20/76.

145 Morehouse DA. Nonlethal Weapons: War without Death Praeger, p 20, 1996.

31

OSEH MIND CONTROL TARGETED INDIVIDUALS

146 Dando M. A New Form of Warfare: The Rise of Non-Lethal Weapons Brassey’s, London, Washington, p 22, 1996

147 Taff BE and Stoller KP. Patent #49400558 “Cryogenic remote sensing physiograph” USPTO granted 7/10/90.

160 Microwave irradiation of the U.S. Embassy in Moscow: review of its history and studies to determine whether or not related health defects were experienced by employees assigned in the period 1953-1977. United States, Congress, Senate Committee on Commerce, Science and Transportation. US GOV. DOC. Y 4.C 73/7: IR 7.

170 McKinney J. “Microwave Harassment and Mind Control Experimentation” Unclassified, June-July1992 4(3): 1-20. Also at http://www.webcom.com/~pinknoiz/coldwar/microwave.html

171 Lamb C, and Swett C. Department of Defense Directive, Non-Lethal Weapons Policy Draft of 21 July 1994. at http://www.heart7.net/mcf/mindnet/mn168.htm particularly last paragraph of p 7 onto p 8.

175 Smith C. “On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology” J Psycho-Social Studies 2(2) #3, 2003. Article at http://www.btinternet.com/~psycho_social/Vol3/JPSS-CS2.html

176 American Psychiatric Association DSM-IV Task Force. Diagnostic and Statistical Manual of Mental Disorders Fourth Edition (DSM-IV-TRTM) American Psychiatric Association, 2000.

177 Flaum M and Schultz SK. “The Core Symptoms of Schizophrenia” Ann Med 28(6): 525-31, 1996.

178 Isselbacher, KJ, Adams RD, Brunwald E, Petersdorf RG, and Wilson JD. Harrison’s Principles of Internal Medicine Ninth Ed., McGraw-Hill, New York, p 150, 1980.

179 McMurtrey JJ. “Microwave Bioeffect Congruence with Schizophrenia” In press, 2003. Available at http://www.grn.es/electropolucio/microwav.rtf

32

OSEH MIND CONTROL TARGETED INDIVIDUALS

V2K TECHNOLOGY

John Lennon on Insanity: “Our society is run by insane people for insane objectives. I think we’re being run by maniacs for maniacal ends and I think I’m liable to be put away as insane for expressing that. That’s what’s insane about it.”

V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies. Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K can also use to induce or manipulate dreams or to deprived TI sleeps.

Eleanor White: What is ‘Voice to Skull’? The ‘psycho-electronic’ type of mind control I’m discussing here is the covert, around the clock harassment of innocent citizens living in their homes and communities, and is currently worldwide in scope. This harassment includes electronic mind/body attacks, street harassment skits, destruction of family and other relationships and destruction of careers.

One especially invasive attack method in the arena of ‘psycho-electronic’ mind control is ‘voice to skull’. Voice to skull is the transmission of voice, or any other audible or subliminal sound, directly into the hearing sense of the mind control victim. This is sometimes done around the clock and can be one of the severest forms of torture. Voice to skull technology is sometimes referred to as “synthetic telepathy.” Current-day voice to skull cannot be stopped by any known electromagnetic shielding, a fact which demonstrates how advanced classified mind control technology has become.

The listener needs to know that at least one method of voice to skull transmission, using microwave pulses much like radar, is not particularly new. During World War II, technicians working in the path of energized radar antennas discovered they could hear a buzz, seeming to originate inside their skulls. This buzz was being caused by the train of very short pulses of microwave signal, each pulse causing a single click.

In the early 1970s, Dr. Joseph Sharp of the Walter Reed Army Institute of Research used a computer to control a radar transmitter such that for each time a human voice waveform changed from a peak to a valley, the radar transmitter sent out a single pulse, causing a single click to be heard by the test subject. Because these clicks were timed according to the human voice waveform, the test subject heard a voice, rather than a string of clicks.

33

OSEH MIND CONTROL TARGETED INDIVIDUALS

This has not been pursued, at least publicly, due to concerns about the effect of microwave signals aimed at a person’s skull, but it does work.

In actual fact, a suitably modified amateur radio transmitter operating in either the 420 to 450 megahertz band or the 1.3 gigahertz band, with a highly directional antenna, is capable of transmitting voice to skull signals at less cost than the price of an automobile.

In addition to simply driving a target crazy, voice to skull can cause far more severe damage to a targeted person if instead of audible voice, one of several types of SUBLIMINAL voice is transmitted instead. When the subliminal voice is that of a hypnotist, and is aimed at a targeted person’s bed, voice to skull can be used over time to undetectably program the person. Because the power level required is fairly modest, being something like the output of the common heat lamp, the person being programmed could have no idea this was happening.

A person who is highly susceptible to hypnosis, and about one in five are, could be put through living Hell simply by way of subliminal voice to skull.

It is common for psycho-electronic mind control victims to report a very frequent or constant “ringing in the ears”, which is also a symptom of the “Lowery” method of subliminal voice conversion. Lowery’s method is described in U.S. patent 5,159,703 and such a converter can easily be built by someone with reasonable electronic assembly abilities. Source: the7thfire.com

Effects of Radiation Harassment Technology (V2K) Technology - PERPS (Perpetrator or the harasser) have technology that in a nut shell can do the following:

 They are a very faint sound, therefore a person interprets them as their own thoughts. Since they are a very faint sound, only those things that are know to a person can be manipulated. Put it simply they won’t be able to teach you Chinese. An example of this is that if a person says a sentence very slowly and close to your ears, then you will only understand it if you know it or parts of it, otherwise your interpretation of what’s being said would be different as compared to what was actually said.  PERPS use other means to make a person dwell on things that where unknown to them. Like after listening to a news article, or even other people saying something similar that PERPS would want a target to direct there thoughts on. Affects related to this are listed below. (VOICE)  They can vibrate certain muscles, affects related to that are mentioned below. (MUSCULAR)  Certain parts in nervous system react to them. Affects related to this are mentioned below. (NERVOUS)  They can cause power surges. (EMP) (EMP = Electromagnetic Pulses)

34

OSEH MIND CONTROL TARGETED INDIVIDUALS

 Give throat irritation, mucus formation. (MUSCULAR)  Watery mouth. (MUSCULAR)  Hyperventilation, sudden shortness of breath. (MUSCULAR)  Vibrate certain muscles in our body. (MUSCULAR)  Give different body aches and pains. Specially back ache. (MUSCULAR)  Tinnitus. (MUSCULAR OR NERVOUS)  Clogged ears. (Like the way it feels when the elevation changes, like in plane or in elevators). (MUSCULAR)  If a person have an existing condition, like a cut, or infection, they can make it really pain. (MUSCULAR)/(NERVOUS)  Nausea, headaches. (NERVOUS)  Listen to a person’s thoughts. Yes that’s what they are capable of. Lots of time, during early manipulation, that’s what a person complains of, that someone knows what they are thinking, or watching them all the time, however, not all is true, some of those thoughts are manipulated by PERPS. (NERVOUS)  Manipulate a person’s thoughts, by putting specific words while a person is thinking. (VOICE)  Manipulate a person’s emotions by making them angry or inducing anxiety or even make a person cry or laugh. (NERVOUS)  They can cause simple sounds to occur again and again. For instance, if a pager is set to simple beep, then they make a person to think that the pager is on, yet when its not. (VOICE)  They can cause surges, yes, the lights that went out recently in NY, is there doing. (EMP)  They can make minor malfunctions in electronic equipment. Causing them to flicker, or even in some cases render the equipment useless. (EMP)  Any sensor driven machine is prone to them. They can cause a light sensor to activate at night, causing the light to go out. (EMP)  They can temper with thermostats. Causing the air conditioner to come on, or the refrigerator to malfunction, or cause the car to overheat. Yep, that’s what they can do. (EMP).

Source: Voicetoskull.com

BEAMING VOICES - “…Until recently, people who believe the government is beaming voices into their heads would have added

35

OSEH MIND CONTROL TARGETED INDIVIDUALS social isolation to their catalogue of woes. But now, many have discovered hundreds, possibly thousands, of others just like them all over the world. Web sites dedicated to electronic harassment and gang stalking have popped up in India, China, Japan, South Korea, the United Kingdom, Russia and elsewhere. Victims have begun to host support meetings in major cities, including Washington. Favorite topics at the meetings include lessons on how to build shields (the proverbial tinfoil hats), media and PR training, and possible legal strategies for outlawing mind control. The biggest hurdle for TIs is getting people to take their concerns seriously.

A proposal made in 2001 by Rep. Dennis Kucinich (D-Ohio) to ban “psychotronic weapons” (another common term for mind-control technology) was hailed by TIs as a great step forward. But the bill was widely derided by bloggers and columnists and quickly dropped. Doug Gordon, Kucinich’s spokesman, would not discuss mind control other than to say the proposal was part of broader legislation outlawing weapons in space. The bill was later reintroduced, minus the mind control. “It was not the concentration of the legislation, which is why it was tightened up and redrafted,” was all Gordon would say…” (Mind Games)

PATENT - “…Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of ten to twenty uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The pulse width is in the range of 10 nanoseconds to 1 microsecond. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated…” (Patent For Microwave Voice-To-Skull Technology)

SUSCEPTIBLE TO HYPNOSIS - “…In actual fact, a suitably modified amateur radio transmitter operating in either the 420 to 450 megahertz band or the 1.3 gigahertz band, with a highly directional antenna, is capable of transmitting voice to skull signals at less cost than the price of an automobile. In addition to simply driving a target crazy, voice to skull can cause far more severe damage to a targeted person if instead of audible voice, one of several types of SUBLIMINAL voice is transmitted instead. When the subliminal voice is that of a hypnotist, and is aimed at a targeted person’s bed, voice to skull can be used over time to undetectably program the person. Because the power level required is fairly modest, being something like the output of the common heat lamp, the person being programmed could have no idea this was happening. A person who is highly susceptible to hypnosis, and about one in five are, could be put through living Hell simply by way of subliminal voice to skull. It is common for psycho-electronic mind control victims to report a very frequent or constant “ringing in the ears”, which is also a symptom of the “Lowery” method of subliminal voice conversion. Lowery’s method is described in U.S. patent 5,159,703 and such a converter can easily be built by someone with reasonable electronic assembly abilities…” (What is voice to skull?)

36

OSEH MIND CONTROL TARGETED INDIVIDUALS

PSYCHOLOGICAL DAMAGE - “…When used as a “nonlethal” weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protestors, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon. Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. Embarrassing private moments cannot be hidden: they are subject to all manner of hurtful comments and remarks.

Evidence can be collected for blackmail with tremendous ease: all the wrongs or moral lapses of one’s past are up for review. Like a perverted phone caller, a hostile person with this technology in hand can call at any time of day, all day long. Sleep can be disrupted. Prayers can be desecrated, religious beliefs mocked. Business meetings can be interrupted, thoughts derailed. Love can be polluted, perverted, twisted and abused. Dreams can be invaded, fond memories trashed. The attacker cannot be seen or identified, the attack cannot be stopped, and the psychological damage is enormous. But there is no physical damage, not one single mark is left on the body and there is absolutely no proof that any crime or any violation ever took place! Everything that “happens” to the victim happens inside the victim’s head. What physical evidence is there to give the police? Without physical evidence, how can one photograph the “crime scene” or fingerprint the stalker? There are no footprints leading to or from the scene.

Indeed, there is no physical scene at all, and no evidence that an attack ever took place. Most people who experience this abusive form of “artificial telepathy” feel as if their mind has been raped. They find themselves hunted, stalked, harassed and abused by a person or persons who refuse to give their names, who defile one’s mind with the most foul and perverse language imaginable, and who refuse to hang up or go away. The caller or callers delight in the perverse and sadistic torture of their targets. Furthermore, they delight in violating the privacy of their targets, reading the target’s mind and commenting on everything the target thinks, in an effort to demonstrate as brutally as possible that the target has no privacy at all…” (Artificial Telepathy 101)

THE VOICE WILL PANETRATE THEIR INNER PEACE - “…Indeed it isn’t. It’s an ad for “Paranormal State,” a ghost-themed series premiering on A&E this week. The billboard uses technology manufactured by Holosonic that transmits an “audio spotlight” from a rooftop speaker so that the sound is contained within your cranium. The technology, ideal for museums and libraries or environments that require a quiet atmosphere for isolated audio slideshows, has rarely been used on such a scale before. For random passersby and residents who have to walk unwittingly through the area where the voice will penetrate their inner peace, it’s another story. Ms. Wilson, a New York-based stylist, said she expected the voice inside her head to be some type of creative project but could see how others might perceive it differently, particularly on a late-night stroll home. “I might be a little freaked out, and I wouldn’t necessarily think it’s coming

37

OSEH MIND CONTROL TARGETED INDIVIDUALS from that billboard,” she said. Joe Pompei, president and founder of Holosonics, said the creepy approach is key to drawing attention to A&E’s show. But, he noted, the technology was designed to avoid adding to noise pollution. “If you really want to annoy a lot of people, a loudspeaker is the best way to do it,” he said. “If you set up a loudspeaker on the top of a building, everybody’s going to hear that noise. But if you’re only directing that sound to a specific viewer, you’re never going to hear a neighbor complaint from street vendors or pedestrians. The whole idea is to spare other people.” Holosonics has partnered with a cable network once before, when Court TV implemented the technology to promote its “Mystery Whisperer” in the mystery sections of select bookstores. Mr. Pompei said the company also has tested retail deployments in grocery stores with Procter & Gamble and Kraft for customized audio messaging. So a customer, for example, looking to buy laundry detergent could suddenly hear the sound of gurgling water and thus feel compelled to buy Tide as a result of the sonic experience…” (Voice to Skull Technology in New York)

FROM YOUR MEMORY BANK - “…How is it possible to produce a voice without a resonating sound box and expect it to be received and understood without a physical audio receiver (and a memory bank) as the source of intelligence for understanding? Even more important, I reasoned; if the cortex in which our memories are stored are lost at the time of the loss of our bodies at death, how can we establish communication after we have slipped out of our mortal coil, and transmit messages to those we have left behind us in this vale of tears with no memory from which to draw upon?

The answer to my questions had to be simply that it is not possible to communicate with the non- physical realities into which we pass at the time of our death, unless we employ some type of scanning process with which to tap the memory banks of those with whom we would communicate in the physical reality, and this would transcend the use of either voice or language, since it consisted only of stimulating and rearranging mind patterns.

With this process, it would not even be necessary to make use of a language, or even to utilize any spoken or written language common to both transmitter and receiver, because the transmission would be that of thought patterns, and memory impulses, which the receiver would have to translate into words, and/or voice patterns for understanding, and recording. The voice you would hear then, when you received messages from the spirit world, would have to be either your own or taken from your memory bank to put the telepathic communication into words, and sounds for your own convenience in understanding, and recording.

There was no reason why radio could not be used for this purpose, I concluded, because it was entirely possible to scan the memory banks of the living by radio waves, and it was also within the realm of possibility to transmit thought patterns, suggestive impulses, and stimulate the ego to translate, and interpret telepathic communications into

38

OSEH MIND CONTROL TARGETED INDIVIDUALS memorized sounds, and words for recording, and understanding. The voice you hear in your head, then, although it may not be your own, would have to be supplied by you from your memory bank, and what you thought you were hearing would not be sounds, but a matter of perception, and although quite real, nevertheless, only real to you, and only after you had created it out of your imagination…” (The Next Voice You Hear)

V2K RELATED GOOGLE SEARCHES:

Army Yanks “Voice To Skull Devices” sites Microwaves and Behavior Mind Games Anti-Voice to Skull Countermeasure Artificial Telepathy 101 Voice to skull technology Five Available Electronic Harassment Tech How to tell if youre a victim of E-harassment Videos: Voice to Skull Devices that talk to Mind Need Debate, Controls Allen Barker’s Resisting the Mind Control State Psychological Warfare Synthetic Telepathy Directed-Energy Harassment Defense Silent Weapons Electromagnetic fields and public health Direct Energy Weapons Microwave radiation dangers in home (Video) CIA Brain Experiments on Veterans (Video)

39

OSEH MIND CONTROL TARGETED INDIVIDUALS

OS TECHNOLOGY

Mark M. Rich on systematic terrorizing of individuals:11 “Organized Stalking is a form of terrorism used against an individual in a malicious attempt to reduce the quality of a person’s life so they will: have a nervous break-down, become incarcerated, institutionalized, experience constant mental, emotional, or physical pain, become homeless, and/or commit suicide. This is done using well-orchestrated accusations, lies, rumors, bogus investigations, setups, framings, , overt or covert threats, vandalism, thefts, sabotage, torture, humiliation, emotional terror and general harassment. It is a “ganging up” by members of the community who follow an organizer and participate in a systematic “terrorizing” of an individual.”

OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a specific person for the purpose of inducing harm and possibly death.

Signs - Stalking is the first noticeable signs of targeting. You will notice an increase in traffic whether in pedestrians or vehicles wherever targeted individuals are located (at work or at home). You will feel like being followed and will eventually confirmed this is happening to you. You will be under surveillance 24/7, 365 days a year. The surveillance will include noise campaigns and street theatre. Its main goal is to induce mental disorder or the perception of one. Paranoia, delusional, anxiety, fear, agitations are the common outcomes.

Mind Game – One of the targeted individuals said, “This is a game of chess, a chase to one’s sanity.” So be very aware of the mind game they are playing. They want you to feel paranoid. They want you to be super sensitive, to be very observant. In other word, they want you to take notice every aspect of the harassment. So you have to learn to ignore them. To take control and not give them the attention they are desperately seeking.

Isolation VS - Noise campaign, including helicopter/aircraft and other public harassment are tactics to induce paranoia and other mental illness. Mobbing is used to invade targeted individuals’ personal space and privacy. They normally do this to induce isolation, so that you will feel uncomfortable in public place and with many people surrounding you. Counteract this by thinking of this as a time for you to socialize,

11 https://www.facebook.com/FrancescaThe1/posts/638272142868797

40

OSEH MIND CONTROL TARGETED INDIVIDUALS and be friendly. Another tactic is street theatre, a loud person talking into his or her cell phone is the most common skit.

Time is Money - Do not think everyone is there to harass you. Do not give them the attention and the impression that you’re getting impatient especially if you’re in the store or public places, waiting in line. Relax and take your time, the more time you spend with them, the more money their organizer will spend (which includes the helicopter!).

Paranoia and Delusions – Targeted individuals will experienced breaking and entering. Normal occurrences are, invaluable items will disappear and reappear. Furniture being moved. Stoves being left turned-on. They will leave signs that someone was inside your property, such as cigarette butts at your front door. These are tactics to induced paranoia and delusions.

Reporting with Concrete Evidences – Learn to gather concrete evidence and then properly plan the reporting to the authorities, making sure not to have any chances of being label or perceived as paranoid or delusional. Which means do not tell anyone particularly the police that you are hearing voices unless you have a concrete evidences.

Learn and Adapt - As targeted individuals become super-attentive to what is going on, eventually, he or she will realized that this will probably go on for the rest of their lives. Until some major disaster or events happen, this phenomenon will probably continue. Therefore, one must learn to adapt. One must try to neutralize the harassers’ efforts. You can achieve this by educating yourself. For example, the tactic of “entrapment.” Targets who previously had debt problems will get several credit card offers via e-mail and other media. Avoid this temptations. Those who are religious will get some nasty sex-related junk e-mail. Trashed this. Or other persistent religious e-mails that ask you to forward this to ten people or so that you’ll be bless by God, this is junk mail. Those who are actively involved in politics will get unsolicited e-mail/propaganda about their political affiliations or rival organizations. Read and delete. The main purpose of all of harassments is to manipulate someone’s emotions. To provoke a reaction. Targeted individuals must learn to adapt to this regular daily occurrences. Identify, ignore or trash it.

Neutralize the Harassments - Another example of how to adapt or neutralize the harassments is, when targeted individuals decides to do activism, unsolicited news or propaganda will flow or come in via social network rigorously. All are aimed to heighten emotions. They wanted you to feel angry. They wanted you to have a strong opinion

41

OSEH MIND CONTROL TARGETED INDIVIDUALS about everything. The most common is the feeling that your civil/human rights are being violated. Making targeted individuals combative and agitated. Warning: If you decide to go public, avoid to have a perception that you’re “losing it” with your public tirade and agitation.

RELATED GOOGLE SEARCHES: A Practical Survival Guide to OSEH Targeted Individuals – The FBI harassment nightmare. Targeted Individuals – The Ultimate Form of Entrapment! Who Gets Targeted Anti-Organized Stalking (Citizen Harassment Group) Info Site Guns and Butter – “Targeted Individuals” Scalar Wars Areas to Consider When Researching Gang Stalking Help Stop the Silent Holocaust: Organized Stalking Areas to Consider When Researching Gang Stalking What Targets Can Do Suicide factors: UNSAFE or SAFER? Artificial Telepathy 101 Putting Faces to the TI Phenomenon Reading your mind Crazy or being gang-stalked?

42

OSEH MIND CONTROL TARGETED INDIVIDUALS

OSEH Targeted Individuals 101

James F. Marino on NSA:12 “In reference to Julian Assange’s comment regarding Facebook, it is indeed a covert venue for spying on Internet users, however the truly appalling ‘spying machine’ is the National Security Agency’s Signals Intelligence EMF Scanning Network, since this satellite spy system has been used to brain fingerprint all Americans, any of whom can be instantly tracked by way of their brain’s own unique EMF field. A crime that the NSA has been perpetrating against this author and myriad other Americans for decades.”

OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a specific person for the purpose of inducing harm and possibly death.

You may be a victim of electronic harassment IF:

 You experience visual distortions and hallucinations.  You experience manipulation of will, emotions, feelings, and perceptions.  You experience reading thoughts remotely, retrieving memories, implanting personalities.  You experience debilitating mental acuity: inability to concentrate, disruption of ability to think rationally and independently.  You experience loss of memory and knowledge.  You experience inadequate states, which targeted individuals have never experienced before (states of narcotic intoxication, depression, obsessive desires and so on).

12 http://9-11themotherofallblackoperations.blogspot.com/2014/06/nsa-satellite-signals-intelligence.html

43

OSEH MIND CONTROL TARGETED INDIVIDUALS

 You experience blurred vision.  You experience burning sensations on your skin or internal organs. – Excruciating, artificial pain in any part of the body, including heart attacks and other serious, medical conditions.  You feel pin pricks on various parts of your body. – Cramps, seizures and spasms  You feel some type of energy moving inside your body.  You experience extreme head pains.  You feel drop-in-your-tracks fatigue on a regular basis.  You continually have difficulty sleeping. – Control of sleep patterns: sleep deprivation or uncontrollable sleep.  You experience forced speech. – Manipulation of human behavior: forced speech, involuntary body movements, transmission of specific commands into the subconscious, compulsory execution of these commands.  You experience uncontrolled-by-you movements of limbs or other body parts.  You hear the voices of other people inside your mind with no other signs of mental illness.  You hearing intense loud sound or electronic-sounding noise, often mistaken for tinnitus (microwave hearing).  You hearing voices that sounds like chanting while an electrical machine is on (radio, fridge, electric fan, air conditioning, air vent).  You hearing voices that sounds like chanting while water is running in sink, toilet bowl, faucet or shower.  You experience Induced dreams – The induced dreams, incidentally, are also easy to obstruct. The activity occurs when you have reached the REM (rapid-eye movement) stage of sleep. Your brain, at that stage, is entrained by ELF, which deepens your sleep, thus eliminating the prospect of your being cognizant of the quasi subliminal auditory input being pumped into the back of your skull by bone- conducted means. The quasi-subliminal auditory input is what influences the course of your dreams. In a semi-conscious state, you can physically recognize this attempted input as resembling short-burst transmissions which, when impacting upon the back of your skull, create a hissing sound, rather like “PF-FFT! …PF- FFT!” at five-second intervals. This can be blocked. All that is required is that you protect the back of your skull with the aforementioned materials before you fall asleep.

Things you can do:

 Document everything! This will do two things. It will make the stalkers more careful and maybe your life easier. And it will provide a record in the event of legal action.  Get a camera if you don’t have one and start taking pictures or videos.

44

OSEH MIND CONTROL TARGETED INDIVIDUALS

 Write a blog or daily journal. Write down the daily harassments. It will help you organize your thoughts and would provide easy access to a record when talking to government officials or lawyers who may be able to help you.  Electronic harassments normally involves various types of directed energy weapons. These weapons normally requires the operations of someone and must be located near the location of a TI. You should be aware of your surroundings and possible source of the electronic harassments.  Write down all the symptoms you experience while under electronic harassments. The most common are: muscles and joint pains, nausea, skin burning, disorientation, itching, pin pricks, etc.  If possible, shielding from the source of electronic attacks is extremely important, If not possible, alleviate all the symptoms by taking smart steps by wearing right clothes, eat properly, exercise, be active. John Mecca’s website, www.us- government-torture.com, has lots of good information about this topic that has been helpful to many people.  Try to gather enough information to adapt to your specific situations.  Try to bring this crime into public awareness via networking.  It is important to do networking as TIs have little recourse and no proven and effective countermeasures at the moment. Victims commit suicide due to the extreme trauma of the experience, and supporting one another will help others to avoid this tragic outcome.

Other things Targeted Individuals can do:

 Move in with other people if at all possible. Even though you value your independence, the attacks are considerably more effective when you’re living on your own. Isolation is important to the perpetrator’s agenda.  Stay in contact with others who are in the same situation. This can be done using email, visiting websites and reading victims’ accounts or joining a forum where people talk about their experiences and support one another.  Refrain from telling too many people what is happening. People will not believe you and you stand the risk of being committed by well-meaning family members.

45

OSEH MIND CONTROL TARGETED INDIVIDUALS

However, if you are suicidal, and have no place to go and no one you trust, we would strongly advise that you allow yourself to be taken care of in a hospital rather than let the thoughts of self-harm overtake you. It is only temporary and you will be released.  Never think of it as something too horrible to contemplate – suicide is the horrible choice, far worse than going to a hospital for a while. By talking to other victims, and letting them know what is happening to you, you can be assured you will never need to feel alone.  Develop a solution-oriented mind-set. That is, find solutions to problems wherever possible. See the countermeasures page for some solutions.  Work hard at overcoming and facing your fears. The attacks are more effective when you are afraid. Remember that we’re all in this together and resist the urge to isolate yourself if something upsets you. Find someone who believes you who you can talk to about this. Other victims are a good choice, but some may be too unstable to talk to. Choose someone who seems to be in control. We are all at different stages of dealing with this.  Ignore the attacks. In time, many of them DO stop. But if you’re panicking, they tend to increase the attack, so it is imperative to gain control within and stay calm. (We’re speaking from experience here – many of us have seen this pattern – so don’t lose hope!) Conversely, don’t expect perfection from yourself. This takes time. My panic sessions diminished over time, rather than stopping all at once. Take a good multivitamin and a vitamin B complex for stress. See countermeasures for more detailed suggestions.  Try to be flexible as much as possible. Bend with the wind rather than try to fight it. If you are being bothered by noise don’t just sit there and let it get to you. Do something else, like reading a book, watching TV, going online or going outside for a walk.  Listen to music to counteract the high frequency sound (and for enjoyment!).  Do something you love to do. Creative activities are especially beneficial (don’t think too hard – just do something). This raises serotonin levels and helps you deal with the stress.

Sources: freedommfchs.com USAtrace.com eharassment.stalkingbyproxy.net RELATED GOOGLE SEARCHES: U.S. Air Force Abuse Using Electromagnetic Radiation Poisoning On American Civilians Voices in the Head: Washington Post on Electronic Harassment Technologies Electronic harassment From Wikipedia, the free encyclopedia Microwave Harassment The State of Unclassified and Commercial Technology – Capable of Some Electronic Assault Effects Electronic Harassment Hearing Voices – No Mental Illness (Video)

46

OSEH MIND CONTROL TARGETED INDIVIDUALS

Definitions

Aldous Huxley on propaganda or : “There will be, in the next generation or so, a pharmacological method of making people love their servitude, and producing dictatorship without tears, so to speak, producing a kind of painless concentration camp for entire societies, so that people will in fact have their liberties taken away from them, but will rather enjoy it, because they will be distracted from any desire to rebel by propaganda or brainwashing, or brainwashing enhanced by pharmacological methods. And this seems to be the final revolution.”

RELATED Google Search:

 Organized Stalking and Electronic Harassment Glosary  Organized Stalking by Groups – FAQ  The Economist: A Powerful Elite IS Secretly Running Things…but You’re Still Crazy  Role Definitions in Gang-Stalking  Gang Stalking Redefined

Agent Provocateur is a person assigned to provoke unrest, violence, debate or argument by or within a group while acting as a member of the group but covertly representing the interests of another. In general, agents provocateur seek to secretly disrupt a group’s activities from within the group. Agents provocateur are employed to disrupt or discredit a group by performing acts for which the group will be falsely accused, by leading the group into activities that they would not otherwise pursue or by creating discord between group members. Provocateurs may encourage illegal acts, recommend belligerent tactics a group might otherwise reject, spread false rumors intended to provoke hasty action by a group, spread malicious rumors within a group about a group member or employ other tactics intended to provoke improper action by a group or to divert a group from its chosen purpose. An agent provocateur might attempt to implicate as an accomplice an innocent target who the agent unwittingly involves in a crime or criminal conspiracy (sourcewatch.org).

BATF – U.S. Bureau of Alcohol, Tobacco, and Firearms

Black Listing A list of individuals or organizations designated for special discrimination or boycott; also to put a person or organization on such a list. Blacklists have been used for centuries as a means to identify and discriminate against undesirable individuals or organizations. A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a Labor Union that identifies firms with which it will not work; or a government that wishes to specify who will not be allowed entry into the country (legal- dictionary.thefreedictionary.com).

47

OSEH MIND CONTROL TARGETED INDIVIDUALS

Bullying is generally seen as aggressive intentional behavior to control someone physically, mentally, or emotionally. Not all is aggressive sometimes it’s punitive. Bullying occurs in every city, community and school. Bullying has no barriers it affects all races and gender (Bullying Information).

C-SPAN – cable channel dedicated to broadcasting both houses of Congress and other U.S. governmental functions.

CALEA - A 1994 law (“Communications Assistance to Law Enforcement Act”) to force a massive reworking of the U.S. telephone infra- structure so that the government can intrinsically wiretap it. Also called the FBI Digital Telephony Act. It is a domestic extension of ECHELON.

Cause stalking is an alternate term for what some multi stalking targets call “organized stalking” or “gang stalking.” It is specialized groups of people who think they are supporting some cause, but are more interested in harassing targets designated by their leaders. Lies told by the leaders add fuel to the fire (raven1).

CISPES – Committee in Solidarity with the People of El Salvador

COINTELPRO or Counter Intelligence Program was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting domestic political organizations. COINTELPRO tactics included discrediting targets through psychological warfare, planting false reports in the media, smearing through forged letters, harassment, wrongful imprisonment, extralegal violence and assassination. Covert operations under COINTELPRO took place between 1956 and 1971, however the FBI has used covert operations against domestic political groups since its inception. The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order” (Wikipedia).

Coercive Persuasion or Thought Reform is best understood as a coordinated system of graduated coercive influence and behavior controls designed to deceptively and surreptitiously manipulate and influence individuals, usually in a group setting, in order for the originators of the program to profit in some way, normally financially or politically. Using rewards and punishments, efforts are made to establish considerable control over a person’s social environment, time, and sources of social support. Social isolation is promoted (Organized Stalking by Groups – FAQ).

Conspiracy a secret agreement between two or more people to perform an unlawful act (The Economist: A Powerful Elite IS Secretly Running Things…but You’re Still Crazy).

Councils (illuminati) - The Illuminati has frequent meetings. Some of these meetings are organized to appear “acephalous” and “accidental” in their meetings, when in reality they are structured and planned. One group, MJ-12 has gone by the following names: the Group, the Special Study Group, the Wise Men, the Operations Coordinating Board (OCB), 5412 Committee, 303 Committee, 40 Committee, PI-40 Committee, and Policy Planning Group (PCG). Some of the formal policy and ritual groups have names that all Illuminati members who have gotten high enough to learn, will recognize: The Council of 3, Council of 5, Council of 7, Council of 9, The

48

OSEH MIND CONTROL TARGETED INDIVIDUALS

Grand Druid Council, The Committee of 300, and the Committee of 500 (known as Fortune 500). Many of the meetings are conclaves without formal names. The Grand Druid Council is not something fictional, but an actual body of people who formally meet and whose membership, we have been trying to keep track of. The groups which make decisions to control this planet are networked together. Each decision has its own origin and route that it takes. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Crime Against Humanity means murder, extermination, enslavement, deportation, imprisonment, torture, sexual violence, persecution or any other inhumane act or omission that is committed against any civilian population or any identifiable group and that, at the time and in the place of its commission, constitutes a crime against humanity according to customary international law or conventional international law or by virtue of its being criminal according to the general principles of law recognized by the community of nations, whether or not it constitutes a contravention of the law in force at the time and in the place of its commission. “genocide” means an act or omission committed with intent to destroy, in whole or in part, an identifiable group of persons, as such, that, at the time and in the place of its commission, constitutes genocide according to customary international law or conventional international law or by virtue of its being criminal according to the general principles of law recognized by the community of nations, whether or not it constitutes a contravention of the law in force at the time and in the place of its commission (Crimes Against Humanity and War Crimes Act).

Criminal Harassment The crime of stalking is defined legally as criminal harassment. The following section of the Criminal Code of Canada pertains to criminal harassment: Section 264. (1) No person shall, without lawful authority and knowing that another person is harassed or recklessly as to whether the other person is harassed, engage in conduct referred to in subsection (2) that causes that other person reasonably, in all the circumstances, to fear for their safety or the safety of anyone known to them. Prohibited conduct: (2) The conduct mentioned in subsection (1) consists of (a) repeatedly following from place to place the other person or anyone known to them; (b) repeatedly communicating with, either directly or indirectly, the other person or anyone known to them; (c) besetting or watching the dwelling-house, or place where the other person, or anyone known to them, resides, works, carries on business or happens to be; or (d) engaging in threatening conduct directed at the other person or any member of their family (The Criminal Code of Canada and Sexual Harassment).

Crowd manipulation is the intentional use of techniques based on the principles of crowd psychology to engage, control, or influence the desires of a crowd in order to direct its behavior toward a specific action. This practice is common to politics and business and can facilitate the approval or disapproval or indifference to a person, policy, or product. The ethical use of crowd manipulation is debatable and depends on such factors as the intention of and the means used by the manipulator, as well as the ends achieved. Crowd manipulation differs from propaganda although they may reinforce one another to produce a desired result. If propaganda is “the consistent, enduring effort to create or shape events to influence the relations of the public to an enterprise, idea or group”, crowd manipulation is the relatively brief call to action once the seeds of propaganda (i.e. more specifically “pre-propaganda”) are sown and the public is organized into a crowd. Crowd manipulation also differs from crowd control, which serves a security function.

49

OSEH MIND CONTROL TARGETED INDIVIDUALS

Local authorities use crowd-control methods to contain and defuse crowds and to prevent and respond to unruly and unlawful acts such as rioting and looting (Wikipedia).

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. The definition of ”harassment” must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress (Wiki: Cyberstalking).

DEA – U.S. Drug Enforcement Administration DIA – U.S. Pentagon Defense Intelligence Agency DIA – U.S. Drug Interdiction Agency (older)

Decoy(ing) is usually a person, device or event meant as a distraction, to conceal what an individual or a group might be looking for. Decoys have been used for centuries most notably in game hunting, but also in wartime and in the committing or resolving of crimes (Wikipedia).

DICTIONARY – Keyword searching with exclusion logic software.

Direct Energy Weapon (DEW) emits energy in an aimed direction without the means of a projectile. It transfers energy to a target for a desired effect. Intended effects may be non-lethal or lethal. Some such weapons are real, or are under active research and development (Wikipedia: Directed-energy weapon).

Dielectric heating, also known as electronic heating, RF heating, high-frequency heating and diathermy, is the process in which a high-frequency alternating electric field, or radio wave or microwave electromagnetic radiation heats a dielectric material. At higher frequencies, this heating is caused by molecular dipole rotation within the dielectric. At lower frequencies in conductive fluids, other mechanisms such as ion-drag are more important in generating thermal energy. RF dielectric heating at intermediate frequencies, due to its greater penetration over microwave heating, shows greater promise than microwave systems as a method of very rapidly heating and uniformly preparing certain food items, and also killing parasites and pests in certain harvested crops (Wikipedia).

Disability as a condition which limits a person’s ability to function in major life activities – including communication, walking, and self-care (such as feeding and dressing oneself) – and which is likely to continue indefinitely, resulting in the need for supportive services (What is the Legal Definition of a Disability?).

Dehumanization is to make somebody less human by taking away his or her individuality, the creative and interesting aspects of his or her personality, or his or her compassion and sensitivity towards others.[citation needed] may be directed by an organization (such as a state) or may be the composite of individual sentiments and actions, as with some types of de facto racism. State-organized dehumanization has been directed against perceived racial or ethnic groups, nationalities (or “foreigners” in general), religious groups, genders, minorities of various

50

OSEH MIND CONTROL TARGETED INDIVIDUALS sexual orientations (e.g., homosexuals), disabled people as a class, economic (e.g., the homeless) and social classes, and many other groups (Wikipedia).

Disinformation is false or inaccurate information that is spread deliberately with intentions of turning genuine information useless. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth. Disinformation should not be confused with misinformation, information that is unintentionally false. Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions (Wikipedia).

ECHELON is NSA’s world-wide surveillance network and associated software.

Electronic Harassment is a term referring to the use of electronic devices to harass, torture, and/or physically harm a person, not to be confused with cyberstalking. In Michigan, Public act 257 of 2003 makes it a felony for a person to “manufacture, deliver, possess, transport, place, use, or release” a “harmful electronic or electromagnetic device” for “an unlawful purpose”; also made into a felony is the act of causing “an individual to falsely believe that the individual has been exposed to a harmful electronic or electromagnetic device.” In Maine, Public law 264, H.P. 868 – L.D. 1271 criminalizes the knowing, intentional, and/or reckless use of an electronic weapon on another person, defining an electronic weapon as a portable device or weapon emitting an electrical current, impulse, beam, or wave with disabling effects on a human being (Publicsignal).

Electromagnetic radiation can be classified into ionizing radiation and non-ionizing radiation, based on whether it is capable of ionizing atoms and breaking chemical bonds. Ultraviolet and higher frequencies, such as X-rays or gamma rays are ionizing. These pose their own special hazards: see radiation and radiation poisoning. Non-ionizing radiation, discussed here, is associated with two major potential hazards: electrical and biological. Additionally, induced electric current caused by radiation can generate sparks and create a fire or explosive hazard (Wikipedia: Electromagnetic radiation and health).

Electromagnetic shielding is the process of reducing the electromagnetic field in a space by blocking the field with barriers made of conductive and/or magnetic materials. Shielding is typically applied (1) to enclosures to isolate electrical devices from the ‘outside world’ and (2) to cables to isolate wires from the environment through which the cable runs. Electromagnetic shielding that blocks radio frequency electromagnetic radiation is also known as RF shielding. The shielding can reduce the coupling of radio waves, electromagnetic fields and electrostatic fields, though not static or low-frequency magnetic fields[citation needed] (a conductive enclosure used to block electrostatic fields is also known as a Faraday cage). The amount of reduction depends very much upon the material used, its thickness, the size of the shielded volume and the frequency of the fields of interest and the size, shape and orientation of apertures in a shield to an incident electromagnetic field (Wikipedia).

Electrosensitivity Electromagnetic hypersensitivity, called also electro sensitivity or electro hypersensitivity is a disorder in which a person presents symptoms of a sickness caused or aggravated by magnetic fields or waves. These symptoms are recognized by the WHO and by

51

OSEH MIND CONTROL TARGETED INDIVIDUALS numerous scientific studies (ref. Bioinitiative Report). Here is the WHO’S definition: “For some time, numerous individuals complained of diverse health problems attributed to exposure to electromagnetic fields. While certain individuals report mild symptoms and are able to avoid these fields, others are so gravely affected that it becomes necessary to stop working and to modify their lifestyle totally. This sensitivity is presumed to be from electromagnetic fields and is generally called electromagnetic sensitivity (EMS)” (aseq-ehaq.ca).

FBI – U.S. Federal Bureau of Investigation

Flash mob A flash mob (or flashmob) is a term coined in 2003 to denote a group of people who assemble suddenly in a public place, perform an unusual and sometimes seemingly pointless act for a brief time, then disperse, often for the purposes of entertainment and/or . Flash mobs are organized via telecommunications, social media, or viral emails. The term is generally not applied to events and performances organized for the purposes of politics (such as protests), commercial advertisement, publicity stunts, that involve public relation firms, or paid professionals (Wikipedia).

GAK - Government Access [to cryptographic] Keys. Any cryptography product with GAK has been compromised so the government can read it.

Harassment covers a wide range of offensive behavior. It is commonly understood as behavior intended to disturb or upset. In the legal sense, it is behavior which is found threatening or disturbing. Sexual harassment refers to persistent and unwanted sexual advances, typically in the workplace, where the consequences of refusing are potentially very disadvantageous to the victim. In 1984, the Canadian Human Rights Act prohibited sexual harassment in workplaces under federal jurisdiction (Wikipedia).

Hate Crime The Criminal Code of Canada says a hate crime is committed to intimidate, harm or terrify not only a person, but an entire group of people to which the victim belongs. The victims are targeted for who they are, not because of anything they have done. Hate crimes involve intimidation, harassment, physical force or threat of physical force against a person, a family or a property. Sections 318 and 319 of the Criminal Code of Canada address hate crimes. (What is a hate crime?).

Human rights concerns the private rights and power of people. This typically has broad meaning, covering all human rights protected under the law outside of the criminal law context. Civil rights primarily gravitates around issues such as discrimination, accommodation, suffrage (voting), and to a lesser extent, property rights. Human rights are primarily protected under the federal and provincial Human Rights Acts in private context, and under the Canadian Charter of Rights and Freedoms where the state is a party to the matter. Controversial human rights issues in Canada have included patient rights, freedom of speech, freedom of religion, parents’ rights, children’s rights, abortion rights vs rights of the unborn, minority rights, majority rights, rights of the disabled, aboriginal rights, tenant rights and economic, social and political rights (Human rights in Canada).

52

OSEH MIND CONTROL TARGETED INDIVIDUALS

Gagged Person (GP) is whispered lies and slander, by a Perp, about a TI. If the GP believes the lies, they become infuriated at the TI — and are recruited into piling on, and targeting (perping) them. GPs are threatened, either subtly or aggressively — when they are gagged by the Perp, even though they usually have no legal authority to do so. After this the GP will not advise the TI — of either the slander they have been told, or the identity of the cowardly Perp who whispered it. The GP’s fear is based on the possibility that the slander may be justifiable and true — or even worse — if it is false, they fear that similar slander may be unleashed against them, unless they cooperate with the unjust targeting of the TI (exposegangstalking.com).

Gaslighting is a form of in which false information is presented to the victim with the intent of making them doubt their own memory and perception. It may simply be the denial by an abuser that previous abusive incidents ever occurred, or it could be the staging of bizarre events by the abuser with the intention of disorienting the victim. had a colloquial origin explained below, but the term has also been used in clinical and research literature (Wikipedia).

Gang Stalking Under Occupational Health and Safety laws, individuals are being flagged and placed on community notification lists. This is happening without the targets knowledge. In many countries these community notifications are being used by companies and others to target innocent individuals such as whistle-blowers, the outspoken, etc. In conjunction with these notifications, companies and others are in some cases using a practice that was used in the former soviet union called the psychiatric reprisal. This is used as a means of retaliation, blacklisting, silencing, or controlling members of society. Once on the notification system, warnings about the targets are sent out to every individual the target comes in contact with, thus poisoning their associations, and socially annexing the targeted individual (targetedindividuals.com).

Gang-Stalker is a person who participates, in a group that stalks, follows, mobs, bullies, harasses, and slanders TI’s on a 24×7 basis. Block Watch programs are notorious participants, as are organized motorcycle gangs (OMG’s), churches, or any other group that can be infiltrated and manipulated. The orchestrating umbrella above the gangs of stalkers has access to the most sophisticated law enforcement surveillance and communication resources. The scheme is government sponsored, their funding is endless, and the protocol is secretive (Definitions gang stalking related).

Handler in the intelligence services (and MKULTRA survivor group) is the direct supervisor of an intelligence “asset”. Someone who has been programmed to do the will of a controlling agency, such as a mind control target, is a “asset” to the controlling agency. Current day organized stalking and electronic harassment targets are not usually acquainted with their handlers, however, we can be certain at any given time that each of us has one. The term handler is heard and read much more frequently among MKULTRA survivors. The handlers know the appropriate hypnotic words, tones, or other signals to invoke the “asset’s” hypnotic programming (raven1).

HAARP or Highfrequency Active Auroral Research Project The vast majority of unscientific theories, research or reason, so if you want to focus on HAARP (High Frequency Active Auroral Research Program) which is a military and a scientific program of research on the ionosphere driven by the Air Force, United States Navy, DARPA (Defense Advanced Research Projects

53

OSEH MIND CONTROL TARGETED INDIVIDUALS

Agency) and the University of Alaska. Its main objective is the study is to improve the radio telecommunications and monitoring systems such as missile detection. HAARP by definition can not change the climate: the energy transmitted to the ionosphere is not absorbed by the troposphere and the stratosphere, the two layers of our atmosphere where weather phenomena occur. All electromagnetic interaction occurs near the area, about 70 miles up. At this point the influence of the sun’s rays are immensely more powerful than any made by electromagnetic emission antennae on Earth, therefore, if the ionospheric turbulence caused by the Sun is not able to create weather havoc on our planet, much HAARP can cause less (What is HAARP and why has not caused earthquakes).

Illuminati - The Illuminati are 13 elite bloodlines which have maneuvered themselves into control over this planet. They lead double lives, one for society and a hidden one which is based on a gnostic Lucifarian philosophy which consists of lots of blood rituals. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Informed Consent The signing of consent forms for other kinds of medical procedures, such as surgery, or for cancer treatments such as radiation or chemotherapy. However, informed consent for a clinical trial involves much more than just reading and signing a piece of paper. Rather, it involves two essential parts: a document and a process. The informed consent document provides a summary of the clinical trial (including its purpose, the treatment procedures and schedule, potential risks and benefits, alternatives to participation, etc.) and explains your rights as a participant. It is designed to begin the informed consent process, which consists of conversations between you and the research team. If you then decide to enter the trial, you give your official consent by signing the document. You can keep a copy and use it as an information resource throughout the course of the trial. The informed consent process provides you with ongoing explanations that will help you make educated decisions about whether to begin or continue participating in a trial. Researchers and health professionals know that a written document alone may not ensure that you fully understand what participation means. Therefore, before you make your decision, the research team will discuss with you the trial’s purpose, procedures, risks and potential benefits, and your rights as a participant. If you decide to participate, the team will continue to update you on any new information that may affect your situation. Before, during, and even after the trial, you will have the opportunity to ask questions and raise concerns. Thus, informed consent is an ongoing, interactive process, rather than a one-time information session (cancer.gov).

Key Recovery - See GAK.

Lawful interception (LI) is the legally sanctioned official access to private communications, such as telephone calls or e-mail messages. In general, LI is a security process in which a network operator or service provider gives law enforcement officials access to the communications of private individuals or organizations. Countries around the world are drafting and enacting laws to regulate lawful interception procedures; standardization groups are creating LI technology specifications (lawful interception).

Mind Control The most insidious threat to our basic freedoms, such as freedom of mind and freedom of speech, is a little-known phenomenon known as mind control. As used by FACTNet,

54

OSEH MIND CONTROL TARGETED INDIVIDUALS

“mind control” refers to all coercive psychological systems, such as brainwashing, thought reform, and coercive persuasion. Mind control is the shaping of a person’s attitudes, beliefs, and personality without the person’s knowledge or consent. Mind control employs deceptive and surreptitious manipulation, usually in a group setting, for the financial or political profit of the manipulator. Mind control works by gradually exerting increasing control over individuals through a variety techniques, such as excessive repetition of routine activities, intense humiliation, or sleep deprivation (FACTNet).

MISO The U.S. Special Operations Command, which, by law, is the executive agency for psychological operations, or “PSYOPs,” decided that a name change was in order: Operations aimed at influencing the emotions of people outside the United States would now be known as “Military Information Support Operations.” When the name change was first proposed, it took a millisecond for the thousands of active psychological operations officers and noncommissioned officers to deride the new acronym. “MISO” (Psychological Operations Get a New Name).

MK-ULTRA or Project MKULTRA was the code name for a covert, illegal CIA human research program, run by the Office of Scientific Intelligence. This official U.S. government program began in the early 1950s, continuing at least through the late 1960s, and it used U.S. and Canadian citizens as its test subjects. The published evidence indicates that Project MKULTRA involved the use of many methodologies to manipulate individual mental states and alter brain functions, including the surreptitious administration of drugs and other chemicals, sensory deprivation, isolation, and verbal and sexual abuse (Wikipedia).

Mobbing can be understood as the stressor to beat all stressors. It is an impassioned, collective campaign by co-workers to exclude, punish, and humiliate a targeted worker. Initiated most often by a person in a position of power or influence, mobbing is a desperate urge to crush and eliminate the target. The urge travels through the workplace like a virus, infecting one person after another. The target comes to be viewed as absolutely abhorrent, with no redeeming qualities, outside the circle of acceptance and respectability, deserving only of contempt. As the campaign proceeds, a steadily larger range of hostile ploys and communications comes to be seen as legitimate (Introduction To Workplace Mobbing).

Monarch Programming - This was a specific Project carried out by secret elements of the U.S. government and intelligence groups. There were, according to someone a few years ago who had access to the computer(s) which contains all the names of active monitored human slaves, 40,000 actively monitored Monarch slaves. However, this book uses the term generically to include all victims who have suffered this type of trauma-based mind-control. In the same way, that a brand name like “Hyster” is used to describe all lifts–when we use the term we use it in its broadest sense. This is the only way it can be used and technically correct, because as of this date, the authors have not seen who is on the active Monarch Program list of slaves. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

The Nazi Pig Theorem (NPT) Anyone who nonconsensually violates your brain/mind/mentation using Mengele-like methods is a Nazi pig. You do not care what a Nazi pig thinks. You do not care a Nazi pig’s opinions. You do not respond to a Nazi pig ridiculing you, threatening you, trying

55

OSEH MIND CONTROL TARGETED INDIVIDUALS to distract you, or otherwise trying to manipulate you. You work to get a Nazi pig hanged (Mental Firewalls).

New World Order or NWO The phrase New World Order is a probable mistranslation of novus ordo seclorum (which literally means “new secular order” in Latin), part of the seal of the United States. The actual phrase “New World Order” was used by George Herbert Walker Bush in the context of post-Cold-War politics (sourcewatch.org). Also: The New World Order is the global design for a One-World-Government One-World-Dictator and its constituents. Insiders call themselves the “network” and “the neighborhood.” (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Neuro-monitoring or Intra-Operative Neurophysiological Monitoring (IONM) Intraoperative neurophysiological monitoring (IONM) or intraoperative neuromonitoring is the use of electrophysiological methods such as electroencephalography (EEG), electromyography (EMG), and evoked potentials to monitor the functional integrity of certain neural structures (e.g., parts of the brain, spinal cord and peripheral nerves) during surgery. The purpose of IONM is to reduce the risk to the patient of iatrogenic damage to the nervous system, and/or to provide functional guidance to the surgeon and anesthesiologist (Wikipedia).

Noise Campaign is an orchestrated effort to produce stress in a victim through prolonged exposure to significant noise levels. A Noise Campaign can range from multiple neighbors routinely playing loud music, individual stalkers with air-horns or fireworks, or organized “repair work” that involves a high level of noise (myspace.com).

Nonperson is a citizen or a member of a group who lacks, loses, or is forcibly denied social or legal status, especially basic human rights, or who effectively ceases to have a record of their existence within a society (), from a point of view of traceability, documentation, or existence. The term also refers to people whose death is unverifiable and about which inquiries result in a “blank wall” of “nobody knows” (Wikipedia).

ORATORY – Speech recognition. Think of it as speech-to-text software. Subject to DICTIONARY searches.

Organized Stalking is the preferred term for that portion of the full crime of organized stalking and electronic harassment where people who live in the community will mercilessly harass a designated target, based on LIES, such as the target is a drug dealer, the target has a long criminal record, or the favorite lie, the target is a pedophile (raven1).

Perps are perpetrators of the organized stalking and electronic harassment crimes (raven1).

Perpetrator a person who does something harmful or dishonest, especially a person who commits a crime (Law-Glossary).

PGP – Free and unbreakable encryption, available world-wide.

56

OSEH MIND CONTROL TARGETED INDIVIDUALS

Propaganda is a form of communication that is aimed at influencing the attitude of a community toward some cause or position. As opposed to impartially providing information, propaganda, in its most basic sense, presents information primarily to influence an audience. Propaganda often presents facts selectively (thus possibly lying by omission) to encourage a particular synthesis, or uses loaded messages to produce an emotional rather than rational response to the information presented. The desired result is a change of the attitude toward the subject in the target audience to further a political agenda. Propaganda can be used as a form of political warfare. Common media for transmitting propaganda messages include news reports, government reports, historical revision, junk science, books, leaflets, movies, radio, television, and posters (Wikipedia).

Psychotronic weapons remain, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments was presented in the way which would allow for its replication. That it is feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of the countries the use of such technologies, without consent of the user, is banned. Devices using light for the stimulation of the brain show another way how the light flashing in certain frequencies could be used for the manipulation of human psychic life. As for the sound, a report on the device transmitting a beam of sound waves, which can hear only persons at whom the beam of sound waves is targeted, appeared last year in the world newspapers (bibliotecapleyades.net).

PSYWAR or PSYOP Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including Psy Ops, Political Warfare, “Hearts and Minds,” and Propaganda.[1] Various techniques are used, by any set of groups, and aimed to influence a target audience’s value systems, belief systems, emotions, motives, reasoning, or behavior. It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator’s objectives, and are sometimes combined with black operations or false flag tactics. Target audiences can be governments, organizations, groups, and individuals (Wikipedia: Psychological warfare).

Satanic Ritual Abuse (SRA) -This is used to represent all categories of ritual abuse which would be inspired by the desire to rob, kill, or destroy something worthwhile in a person, especially their freedom of thought. Many groups carrying out SRA do not mention Satan by that name. They may make Pacts to Baphomet, and call upon Rex Mundi, or Belair, or Lucifer, or the Father of Light, God, or Kali or even “Jesus” or “Jesus Christ”. SRA is not a value judgment by the authors against some group, the victims themselves on some level know that he or she is being abused. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Sensitization is an example of non-associative learning in which the progressive amplification of a response follows repeated administrations of a stimulus. An everyday example of this mechanism is the repeated tonic stimulation of peripheral nerves that will occur if a person rubs his arm continuously. After a while, this stimulation will create a warm sensation that will eventually turn painful. The pain is the result of the progressively amplified synaptic response of the peripheral nerves warning the person that the stimulation is harmful. Sensitization is thought to underlie both adaptive as well as maladaptive learning processes in the organism (Wikipedia).

57

OSEH MIND CONTROL TARGETED INDIVIDUALS

SIGINT – Signals Intelligence = NSA = electronic snooping

Skin effect is the tendency of an alternating electric current (AC) to distribute itself within a conductor with the current density being largest near the surface of the conductor, decreasing at greater depths. In other words, the electric current flows mainly at the “skin” of the conductor, at an average depth called the skin depth. The skin effect causes the effective resistance of the conductor to increase at higher frequencies where the skin depth is smaller, thus reducing the effective cross-section of the conductor. The skin effect is due to opposing eddy currents induced by the changing magnetic field resulting from the alternating current. At 60 Hz in copper, the skin depth is about 8.5 mm. At high frequencies the skin depth may be much smaller. Increased AC resistance due to the skin effect can be mitigated by using specially woven litz wire. Because the interior of a large conductor carries so little of the current, tubular conductors such as pipe can be used to save weight and cost (Wikipedia).

Sleep Deprivation The forced deprivation of someone’s necessary amount of sleep has been used in the interrogation of terrorist suspects to make them more amenable to providing information or confessions. There is some debate about whether sleep deprivation is a form of torture or one of a number of “stress and duress” techniques, and thus whether it is a legal and ethically acceptable in interrogation. According to the United Nations, sleep deprivation is a form of torture. The effects of sleep deprivation range from irritability, confusion and a decreased ability to concentrate, to loss of consciousness resulting from the failure of red blood cells to transport oxygen to the brain (Sleep Deprivation).

Stalking is a term commonly used to refer to unwanted, obsessive attention by individuals (and sometimes groups of people) to others. Stalking behaviors are related to harassment and intimidation. The word “stalking” is used, with some differing meanings, in psychology and psychiatry and also in some legal jurisdictions as a term for a criminal offense. It may also be used to refer to criminal offences or civil wrongs that include conduct which some people consider to be stalking, such as those described in law as “harassment” or similar terms (Wikipedia).

Street Theater when spoken of in an organized stalking context refers to carefully scripted harassment by neighbors and strangers especially, but can include harassment by family, friends and co-workers. These acts are designed to keep a target at a high stress level, and are crafted so that outside observers are likely to wave the skits off as “life’s normal breaks”. The cumulative effect of such acts can be crushing to sensitive targets. Noise, crowding in person or on the highway, stealing items from shopping cart when in the checkout line, and kids sent to hang out in front of, stare, make noise, and even throw tennis balls against the target’s house are simple examples. What differentiates street theater from “the breaks” is that street theater goes on every day, often by different mind control operatives, far too often to be random or “natural”. Cover is provided by the tendency of people to refuse to acknowledge the frequency of these acts and consider the complainer just being “a crank” (raven1).

Switching - This is when one part (fragment) of the mind takes over from another, or in simple terms, this is when one alter personality (or alter fragment) takes the body from the alter which is holding the body. Switching can occur via the Programmers’ codes for calling up alters, or by external or internal stimuli that trigger an alter to come out. Switching will usually cause at least a

58

OSEH MIND CONTROL TARGETED INDIVIDUALS flicker of the eyes, and for outside observers, who know the different personalities, they will observe another personality take the body. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

System - This term is used in several ways. It is frequently used to refer to a victim of total mind control because the victim consists of alters, programming, implant(s), internal computers, and numerous dissociative states which function together as a system. The word is also used in this book to refer to the body’s functional physiological units, such as the respiratory system. The word is also infrequently used to denote the established social-economic-political system controlling the world, also known insiders as the Network. Other standard meaning may also occasionally be used for the word. (The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave)

Targeted Individuals a department of defense term, are people who locals deem unfit for society, in one way or another. Some are whistle-blowers; some are , like anti-war demonstrators; some have a beef with one corporation or another; some just have different political or religious ideologies then the norm; some are targeted for reasons of lust and greed, and some are targets of convenience. They are targeted by means of gang-stalking, b & e’s, harassment, poisonings (biological and/or chemical), remote electronic harassment (messing with radios and tv’s, etc., remotely), vandalism, character assassinations, staged accidents, etc. Harassment is on-going, in and outside the home (About Gang-Stalking, Cause Stalking, And Targeted Individuals).

TI or Targeted Individual is an individual who has been placed into a maze of psychological and often physical warfare tactics which is orchestrated by the U.S. military, C.I.A. and federal law enforcement. From community harassment known as “Organized Stalking” and various other invasion of privacy tactics and violations of basic constitutional rights to invisible, silent physical torture through the use of highly targeted overexposure to electromagnetic radiation (Targeted Individuals – And The C.I.A.).

Targeted killing is the targeting and killing, by a government or its agents, of a civilian or “unlawful combatant” taking a direct part in hostilities in the context of an armed conflict who is not in that government’s custody and cannot be reasonably apprehended.[1] The target is a person taking part in an armed conflict or terrorism, whether by bearing arms or otherwise, who has thereby lost the immunity from being targeted that they would otherwise have under the Geneva Conventions.[1] Targeted killing has been used by governments around the world, and has become a frequent tactic of the United States and Israel in their fight against terrorism (Wikipedia).

Torture means any act or omission by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person (a) for a purpose including (i) obtaining from the person or from a third person information or a statement, (ii) punishing the person for an act that the person or a third person has committed or is suspected of having committed, and (iii) intimidating or coercing the person or a third person, or (b) for any reason based on discrimination of any kind, but does not include any act or omission arising only from, inherent in or incidental to lawful sanctions (Criminal Code).

59

OSEH MIND CONTROL TARGETED INDIVIDUALS

UKUSA - pronounced ‘you-koo-za’ – a secret wartime treaty that says member nations can spy on each others population without warrants or limits, and that this can be shared with the spied-on country’s SIGINT agency

Ultra-secret agencies: NSA – U.S. National Security Agency; GCHQ – British Government Communications Headquarters; CSE – Canada’s Communications Security Establishment; DSD – Australian Defense Signals Directorate; GCSB – New Zealand’s Government Communications Security Bureau

Walter Bowart on DSM-IV: ”…Look at the DSM-IV [Psychiatric Diagnostic Manual. It] is strongly influenced by the insurance companies and people having no experience in the richness of the human mind and spirit. That’s one of the things that the MK-Ultra victims taught me. Over and over I heard the phrase, “They didn’t mess with my mind; they messed with my soul.” I’ve begun to think in spiritual terms of what has gone on here. This is a horrible thing. [It is] just like the Inquisition, but more sophisticated and less visible. There’s no blood on the streets, but that makes it even more insidious. And of course the technology is now available to everyone…” (Walter Bowart interview)

Vengeance/Terrorist Stalkers do not seek a personal relationship with their targets. Rather, vengeance/terrorist stalkers attempt to elicit a particular response or a change of behavior from their victims. When vengeance is their prime motive, stalkers seek only to punish their victims for some wrong they perceive the victim has visited upon them. In other words, they use stalking as a means to “get even” with their enemies (Organized Stalking by Groups – FAQ).

Victimization or victimization is the process of being victimized. According to Wiktionary, to victimize is to (1) make someone a victim or sacrifice (2) punish someone unjustly, or (3) swindle or defraud someone (Wikipedia).

Voice to Skull devices or V2K is a nonlethal weapon which includes (1) a neuro- electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports (fas.org).

Workplace Bullying is repeated, health-harming mistreatment of one or more persons (the targets) by one or more perpetrators that takes one or more of the following forms: ; Offensive conduct/behaviors (including nonverbal) which are threatening, humiliating, or intimidating; Work interference: sabotage which prevents work from getting done (Definition of ).

60

OSEH MIND CONTROL TARGETED INDIVIDUALS

5G Radiation Dangers – 11 Reasons To Be Concerned

Like it or not we’re rapidly moving into the world of 5G, or 5th generation cellular telecommunications.

Why?

Because the frequency bandwidths used currently by cell phones and similar technologies are becoming saturated.

And also because we live in a world where people want more. 5G, and the Internet of Things (IoT) that goes with it, promises to give us more.

But more what?

Super-Fast Download Speeds

5G and IoT promises to connect us in our homes, schools, workplaces, cities, parks and open spaces to over a trillion objects around the world. It promises cars that drive themselves, washing machines that order their own washing powder and softener plus of course super fast downloads and streaming.

According to Fortune.com 5G will support at least 100 billion devices and will be 10 to 100 times faster than current 4G technology.(4G was already about 10 times faster than 3G).

It’ll bring download speed up to 10 Gigabits per second. This would let us have an entire building of people send each other data in close to no time, thus improving productivity.

What is 5G?

5G offers mind-blowing data capabilities, practically unrestricted call volumes and near infinite data broadcast. It does this by 5G using largely untapped bandwidth of the millimeter

61

OSEH MIND CONTROL TARGETED INDIVIDUALS wave (MMW), which is between 30GHz and 300GHz, as well as some lower and mid-range frequencies.

This table compares the different generations of mobile technologies:

There are some other features of 5G you need to be aware of:

Wireless Cell Antennas Galore

Millimeter waves (MMWs) do not travel well through buildings and they tend to be absorbed by rain and plants. This interferes with the signal. Added to this, high frequency waves like MMWs also have much shorter wavelengths that can’t travel far.

62

OSEH MIND CONTROL TARGETED INDIVIDUALS

To counter this problem 5G will utilize smaller cell stations (and the technology of beamforming) that’ll scramble/unscramble and redirect packets of data on a no-interference path back to us. This could mean wireless antennas on every lamp post, utility pole, home and business throughout entire neighborhoods, towns and cities.

MIMO Miniature Cell Towers

Current 4G cell towers have about a dozen or so antenna ports to support all communication, the new, smaller 5G cell towers (or bases) will be MIMO (Multiple Input Multiple Output) and carry about a hundred ports. These towers will probably be about 4 feet tall as opposed to the usual 90 feet towers currently erected around us. Cells will be available within a 100 meter range and these smart antennas will be able to differentiate between various mixed-up signals – like radio waves and WiFi signals – in the air and beam them back in an orderly fashion so to speak.

Low Latency – High Efficiency

5G will break down data and send it in smaller sizes to offer significantly reduced transmission times. Data will be sent with only a 1 millisecond delay instead of a 50 millisecond delay commonly found with 4G. With communication this fast, it’ll allow machines to talk to each other with practically no room for error. As Marcus Weldon the CTO of Alcatel Lucent comments, “up until now, we’ve designed the networks for people and their needs, and now we’re designing it for things.” The Dangers Of 5G – 11 Reasons To Be Concerned The USA is currently leading the way on 5G. At the June 2016 press conference where the Federal Communications Commission’s (FCC) head Tom Wheeler announced the opening up of low, mid and high spectrum’s. There was no mention of health effects whatsoever. But the dangers are real.

Thousands of studies link low-level wireless radio frequency radiation exposures to a long list of adverse biological effects, including:

 DNA single and double strand breaks  oxidative damage  disruption of cell metabolism  increased blood brain barrier permeability

63

OSEH MIND CONTROL TARGETED INDIVIDUALS

 melatonin reduction  disruption to brain glucose metabolism  generation of stress proteins

Let’s not also forget that in 2011 the World Health Organization (WHO) classified radio frequency radiation as a possible 2B carcinogen.

More recently the $25 million National Toxicology Program concluded that radio frequency radiation of the type currently used by cell phones can cause cancer.

But where does 5G fit into all this? Given that 5G is set to utilize frequencies above and below existing frequency bands 5G sits in the middle of all this. But the tendency (it varies from country to country) is for 5G to utilize the higher frequency bands. Which brings it’s own particular concerns. Here is my review of the studies done to date – 11 reasons to be concerned.

#1 – A DENSER SOUP OF ELECTROSMOG

We’re going to be bombarded by really high frequencies at low, short-range intensities creating a yet more complicated denser soup of electrosmog – as this diagram shows.

64

OSEH MIND CONTROL TARGETED INDIVIDUALS

Source: Latest on 5G Spectrum – EMFields Ltd.

To work with the higher range MMW in 5G, the antennas required are smaller. Some experts are talking about as small as 3mm by 3mm. The low intensity is for efficiency and to deal with signal disruption from natural and man-made obstacles.

#2 – EFFECTS ON THE SKIN

The biggest concern is how these new wavelengths will affect the skin. The human body has between two million to four million sweat ducts. Dr. Ben-Ishai of Hebrew University, Israel explains that our sweat ducts act like “an array of helical antennas when exposed to these wavelengths,” meaning that we become more conductive. A recent New York study which experimented with 60GHz waves stated that “the analyses of penetration depth show that more than 90% of the transmitted power is absorbed in the epidermis and dermis layer.”

The effects of MMWs as studied by Dr. Yael Stein of Hebrew University is said to also cause humans physical pain as our nociceptors flare up in recognition of the wave as a damaging stimuli. So we’re looking at possibilities of many skin diseases and cancer as well as physical pain to our skin.

#3 – EFFECTS ON THE EYES

A 1994 study found that low level millimeter microwave radiation produced lens opacity in rats, which is linked to the production of cataracts.

An experiment conducted by the Medical Research Institute of Kanazawa Medical University found that 60GHz “millimeter-wave antennas can cause thermal injuries of varying types of levels. The thermal effects induced by millimeterwaves can apparently penetrate below the surface of the eye.”

A 2003 Chinese study has also found damage to the lens epithelial cells of rabbits after 8 hours of exposure to microwave radiation and a 2009 study conducted by the College of Physicians and Surgeons in Pakistan conclude that EMFs emitted by a mobile phone cause derangement of chicken embryo retinal differentiation.

#4 – EFFECTS ON THE HEART

65

OSEH MIND CONTROL TARGETED INDIVIDUALS

A 1992 Russian study found that frequencies in the range 53-78GHz (that which 5G proposes to use) impacted the heart rate variability (an indicator of stress) in rats. Another Russian study on frogs who’s skin was exposed to MMWs found heart rate changes (arrhythmias).

#5 – IMMUNE SYSTEM EFFECTS

A 2002 Russian study examined the effects of 42HGz microwave radiation exposure on the blood of healthy mice. It was concluded that “the whole-body exposure of healthy mice to low-intensity EHF EMR has a profound effect on the indices of nonspecific immunity”.

#6 – EFFECTS ON CELL GROWTH RATES

A 2016 Armenian study observed MMWs at low intensity, mirroring the future environment brought about by 5G. Their study conducted on E-coli and other bacteria stated that the waves had depressed their growth as well as “changing properties and activity” of the cells. The concern is that it would do the same to human cells.

#7 – EFFECTS ON BACTERIA RESISTANCE

The very same Armenian study also suggested that MMWs effects are mainly on water, cell plasma membrane and genome too. They had found that MMW’s interaction with bacteria altered their sensitivity to “different biologically active chemicals, including antibiotics.” More specifically, the combination of MMW and antibiotics showed that it may be leading to antibiotic resistance in bacteria.

This groundbreaking finding could have a magnum effect on the health of human beings as the bandwidth is rolled out nationwide. The concern is that we develop a lower resistance to bacteria as our cells become more vulnerable – and we become more vulnerable.

#8 – EFFECTS ON PLANT HEALTH

One of the features of 5G is that the MMW is particularly susceptible to being absorbed by plants and rain. Humans and animals alike consume plants as a food source. The effects MMW has on plants could leave us with food that’s not safe to consume.

66

OSEH MIND CONTROL TARGETED INDIVIDUALS

Think GMOs on steroids. The water that falls from the sky onto these plants will also be irradiated. A 2010 study on aspen seedlings showed that the exposure to radio frequencies led to the leaves showing necrosis symptoms.

Source: https://www.hindawi.com/journals/ijfr/2010/83627

Another Armenian study found that MMWs of low intensity “invoke(s) peroxidase isoenzyme spectrum changes of wheat shoots.” Peroxidase is a stress protein existing in plants. Indications are that 5G will be particularly harmful to plants – perhaps more so than to humans.

#9 – EFFECTS ON THE ATMOSPHERE AND DEPLETION OF FOSSIL FUELS

Implementation of the 5G global wireless network requires the launching of rockets to deploy satellites for 5G. These satellites have a short lifespan which would require a lot more deployment than what we’re currently seeing. A new type of hydrocarbon rocket engine expected to power a fleet of suborbital rockets would emit black carbon which “could cause potentially significant changes in the global atmospheric circulation and distributions of ozone and temperature” according to a 2010 Californian study. Solid state rocket exhaust contains chlorine which also destroys the ozone.

The effects on the ozone are thought to be worse than current day CFC exposure.

Google’s Project Loon is said to bring Internet to rural and hard-to-access areas by using helium balloons. But these balloons only have a 10-month lifespan. We’re looking at a lot of helium being used here, more than what we can possibly have on Earth?

#10 – DISRUPTION OF THE NATURAL ECOSYSTEM

Since the year 2000, there have been reports of birds abandoning their nests as well as health issues like “plumage deterioration, locomotion problems, reduced survivorship and death,” says researcher Alfonso Balmori. Bird species that are affected by these low levels,

67

OSEH MIND CONTROL TARGETED INDIVIDUALS non-ionizing microwave radiation are the House Sparrows, Rock Doves, White Storks, Collared Doves and Magpies, among others.

But it’s not just the birds. The declining bee population is also said to be linked to this non- ionizing EMF radiation. It reduces the egg-laying abilities of the queen leading to a decline in colony strength.

A study conducted by Chennai’s Loyola College in 2012 concluded that out of 919 research studies carried out on birds, plants, bees and other animals and humans, 593 of them showed impacts from RF-EMF radiations. 5G will be adding to the effects of this electrosmog.

#11 – MOST 5G STUDIES MIS-LEADING

5G will use pulsed millimeter waves to carry information. But as Dr. Joel Moskowitz points out, most 5G studies are misleading because they do not pulse the waves. This is important because research on microwaves already tells us how pulsed waves have more profound biological effects on our body compared to non-pulsed waves. Previous studies, for instance, show how pulse rates of the frequencies led to gene toxicity and DNA strand breaks.

LIVE TESTING ALREADY BEGUN

AT&T have announced the availability of their 5G Evolution in Austin, Texas. 5G Evolution allows Samsung S8 and S8 + users access to faster speeds. This is part of AT&T’s plan to lay the 5G foundation while the standards are being finalized. This is expected to happen in late 2018. AT&T has eyes on 19 other metropolitan areas such as Chicago, Los Angeles, Boston, Atlanta, San Francisco and so on. Indianapolis is up next on their 5G trail due to arrive in the summer.

Charter, the second-largest cable operator in the US, has been approved for an experimental 28 GHz license in Los Angeles. The outdoor tests will use fixed transmitters with a 1 km or smaller effective radius.

Qualcomm has already demonstrated a 5G antenna system with about 27 decibel gain. According to ABI Research, is “about 10 to 12 more db than a typical cellular base station antenna.” Not a good sign.

68

OSEH MIND CONTROL TARGETED INDIVIDUALS

Many more private sector companies such as HTC, Oracle, Sprint, T-Mobile are playing a role in the developing of testing platforms by contributing time, knowledge or money.

In the UK the 3.4GHz band has been earmarked for 5G use with contracts awarded to O2, Vodaphone, EE and Three. While the 2.3GHz band, awarded to O2, is likely to be used for 5G too in time. Call to Action Research and pre-testing is rampant by companies who are interested to tap into the lucrative waters of 5G. But few are willing to research its effects on health. The International Commission on Non-Ionizing Radiation Protection (ICNIRP) guidelines remain essentially unchanged since 1998, not allowing for the recognition of radio frequency microwave radiation and MMWs as harmful unless there is a heating effect. But a few experts are speaking out.

DariuszLeszczynski from the University of Helsinki and also former member of the International Agency Research on Cancer is one of them. He has brought to attention to ICNIRP intention to classify skin as limbs. Limbs are paid lesser attention to when classifying exposure levels. Research indicates that MMWs affect the skin and the eyes the most. If skin is classified as a limb, this will pave the way for industry giants to introduce even higher exposures and put more people at risk.

The Global Union Against Radiation Deployment from Space (GUARD) addressed a letter to the FCC in September of 2016, bringing to their attention the harm 5G will inflict. GUARD warned the FCC that 5G violates Article 3 of The UN Declaration of Human Rights which states that “everyone has the right to life, liberty and security of person.” The document is laden with research, information and global support.

To learn how to write, call or email the relevant agencies to protest against the 5G deployment go here parentsforsafetechnology.org

WHAT EXPERTS ARE SAYING

Here’s what experts are saying about 5G:

69

OSEH MIND CONTROL TARGETED INDIVIDUALS

“Along with the 5G there is another thing coming – Internet of Things. If you look at it combined the radiation level is going to increase tremendously and yet the industry is very excited about it…. they project 5G/IoT business to be a $7 trillion business.” -Prof. Girish Kumar, Professor at Electrical Engineering Department at IIT Bombay

“The new 5G wireless technology involves millimeter waves (extremely high frequencies) producing photons of much greater energy than even 4G and WiFi. Allowing this technology to be used without proving its safety is reckless in the extreme, as the millimeter waves are known to have a profound effect on all parts of the human body.” -Prof. Trevor Marshall, Director Autoimmunity Research Foundation, California

“The plans to beam highly penetrative 5G milliwave radiation at us from space must surely be one of the greatest follies ever conceived of by mankind. There will be nowhere safe to live.” -Olga Sheean former WHO employee and author of ‘No Safe Place’

“It would irradiate everyone, including the most vulnerable to harm from radiofrequency radiation: pregnant women, unborn children, young children, teenagers, men of reproductive age, the elderly, the disabled, and the chronically ill.” —Ronald Powell, PhD, Letter to FCC on 5G expansion How To Protect Yourself From 5G My 3 step approach for dealing with EMFs can be summarized as:

1. Understand your exposures. Understand the different types of EMFs and how they behave – hence the need to read (and share) articles like this one. 2. Measure – use an EMF meter to obtain readings and identify hotspots. 3. Mitigate your exposure. Which means either eliminate the source, move further away from the source of radiation or shield your body.

I recommend the same approach with 5G. There is a concern that current EMF meters are not able to measure the frequencies of MMWs. On this point, researcher Alasdair Philips from Powerwatch states “current RF meters cover the frequency ranges proposed for most 5G use in the next three years”.

Endless Possibilities For The Future

70

OSEH MIND CONTROL TARGETED INDIVIDUALS

5G may bring about a new form of industrial revolution, human connectivity and even a new reality. It offers endless possibilities for the future.

We do need more research. But already what is clear, as the research I’ve shared here indicates, is that there are real dangers.

Which is why it even more important to take action to protect yourself and your loved ones. Please share this article with your friends and family.

Sources include: A 5G Wireless Future – Dr. Cindy Russell Latest on 5G Spectrum – EMFields Solutions Ltd IJMTER ISSN (online) 2349 – 9745 Evolution of Mobile Generation Technology: 1G to 5G and Review of Upcoming Wireless Technology 5G by Lopa J. Vora https://5g.co.uk/news/5g-spectrum-auction-results/4336/ https://www.radiomagonline.com/trends/at-t-charter-experimenting-in-los-angeles-with-5g- using-28-ghz-spectrum

71

OSEH MIND CONTROL TARGETED INDIVIDUALS

Extended Life Christian Training Ministry Other FREE Resources

"Buy the truth but do not sell it." (Proverbs 23:23)

Resources Produced and Compiled By Karen Connell

FREE Distribution by Extended Life Christian Training Ministry

extendedlifeCTM.org [email protected]

72

OSEH MIND CONTROL TARGETED INDIVIDUALS

Books and Manulas by Karen Connell

It is important to

understand the spiritual dynamics of physical and emotional dis-ease as it manifests in our spirit, mind-emotions and body.

This Manual was first published in 1998 and has currently been revised. You may Request your FREE copy of this 325 + page manual it is a valuable resource for anyone desiring to be involved in a prayer counseling deliverance ministry! God’s people need to be set free in order to be able to endure unto the end so they can be saved… (Matt 24:12-13) Because iniquity shall abound,

the love of many shall wax cold...But he that

shall endure unto the end, the same shall be

saved. THREE FOLD CORD CD Teaching Titles

#1. Three Fold Cord Foundation Now Available! #2. The Power of Anger #3. Who Do You Think You Are 24 CD Set #4. Legal Grounds for Demonic Influence

#5. Identifying 4 Primary Areas of Wounding is the companion #6. Self- Hatred #7. The Victim Mentality—Self Pity teaching series for #8. Breaking Curses the Three Fold Cord #9. Co-Dependency Issues Manual. #10. Deactivating Triggers These CD’s may be

#11. Rationalization ordered as a #12. Casting-down Imaginations & Buried Memories complete set #13. Pride Tactics #14. Dismantling & Developing Our Identity Or as single CD’S #15. Destroying Pride through Godly Sorrow #16. Taking a Personal Inventory—Getting Honest Threefold Cord #17. Closing the Door to Perversion #18. Supportive Confrontation 24 CD #19. Residue of Guilt Series #20. Victors or Victims #21. Intimidation #22. Principle of Deliverance #23. High Price of Co-Dependency #24. Denial Workbooks are also available for each chapter

73

OSEH MIND CONTROL TARGETED INDIVIDUALS

This

305-page Book

It is A MUST READ

for every

Christian! How is it possible for God’s people to be deceived?

Many professing Christians are following ministers and ministries simply because they are entertaining or operate in signs and wonders. They are not asking—is it another gospel, another Jesus or another spirit …that is bringing forth lying signs and wonders, doctrines of demons, a false Christ or false anointing? It is crucial to understand what the Bible has to say about these things because we are living in the last days when many, including professing Christians, are being deceived. Another subject of importance examined in this book is that of unity among professing Christians. Unity founded upon compromise has no power against demonic forces. It is vital to know what the Bible has to say about these issues, so we as God’s people will not fall prey to Satan’s deceptions and demonic seductions, which can result in…even the very elect being deceived! This book has a wealth of valuable insights and revelation to help God’s people overcome the deceits and strategies of the enemy in these end times.

74

OSEH MIND CONTROL TARGETED INDIVIDUALS

36

Spiritual Gifts Manual

This course of study is designed to teach the student how to recognize and receive spiritual gifts and thereby understand more clearly how they are to function in the body of Christ. It is also for the purpose of causing faith to rise to a higher level so the student can receive the spiritual gifts they desire for the purpose of fulfilling their ministry function… Follow the way of love and eagerly desire spiritual gifts (1 Cor 14:1). In this five-part manual on spiritual gifts the student will see what the Bible has to say about three specific categories of spiritual gifts…

 The seven MOTIVATIONAL gifts  The nine CHARISMATIC gifts  The five MINISTRY gifts

75

OSEH MIND CONTROL TARGETED INDIVIDUALS

Investigating and Experiencing The Glory of God True Transformation

86-page Booklet Chapter Topics include:

 Defining the Glory of God  Experiencing the Glory of God  The Manifestations of God’s Glory  Keys to Releasing God’s Glory

76

OSEH MIND CONTROL TARGETED INDIVIDUALS

Got A Life?

106-page book Chapter titles include:

 New Birth—New Life  Counting the Cost  Growing in the New Life  The Bible

This book was written for the express purpose of giving a clear Biblical understanding for laying a solid Christian foundation in a person’s life. The subjects of regeneration—justification—sanctification—and glorification are examined from the Scriptures. As the preface for this study Karen shares her personal testimony as to how she became a committed Christian after many years of living as a prodigal child of God after accepting Jesus Christ as her Savior at the age of 14. This is an excellent evangelistic tool and resource for new believers and anyone needing a better understanding of the foundational principles for the Christian life.

77

OSEH MIND CONTROL TARGETED INDIVIDUALS

65-page Book Topics include:

 Spiritual realms of delegated authority

 False spiritual warfare

 Qualified warriors

78

OSEH MIND CONTROL TARGETED INDIVIDUALS

NORMALIZING EVIL: Through False Teaching

70-page booklet

Topics include:

 Calling evil good

 Taking captive, the souls of men

 False doctrines of: Prosperity, Dominionism, and World Transformation

79

OSEH MIND CONTROL TARGETED INDIVIDUALS

WOMEN IN MINISTRY

46-page booklet Chapter topics include:

 Is it Biblical for a woman to teach men in a church assembly?

 Why does the Bible tell women to be silent in the church?

 Are church leadership roles only for males?

 Women in ministry from a historical perspective

80

OSEH MIND CONTROL TARGETED INDIVIDUALS

Watchman Reports

INSIDE THIS ISSUE:

 The Coming Hell Storm in Amerika  LEAKED U.S. ARMY DOCUMENT OUTLINES PLAN FOR (FEMA) RE- EDUCATION CAMPS IN AMERICA  National Guard Looking for Internment/Resettlement Specialists  The NDAA's historic assault on American

liberty  BREAKING: MILITARY MARTIAL LAW BILL SNEAKED THROUGH BY SENATE JANUARY 2016 WATCHMAN REPORT  The Wide-Ranging Food Control Policies of EO 13603  Prophetic Watchman Warning And MUCH more…

Be Informed and Prepared … Time is running Out!

Order your free copy of this Watchman Report Today

I realize that the information contained in this report will be very disturbing to those who read it—especially if it is new information for the reader. My purpose for sharing this report is not to try and scare anyone into believing or doing anything—but to inform the reader about the reality of what is taking place in this nation so they can begin to seek God about how to prepare for what lies ahead. I highly suggest that the reader do their own research in order to have this information confirmed, and would also warn against just accepting all that is found on the web. You must know those who labor among you as true watchmen of God, and know that they are credible in their research and reporting. I would encourage those who do “have ears to hear what the Spirit is saying” to share this information with as many as possible and as quickly as possible! Time is running out!!

81

OSEH MIND CONTROL TARGETED INDIVIDUALS

3 CD’s 3 CD’s

Survival package!

Share these resources with others who are wanting to prepare for what lies ahead!

The PROTECTION & PROVISION SURVIVAL package includes:

 A 3-part CD series by Steve Quayle entitled: Being Prepared in the Midst of Judgment

 A 44 page Survival Report that includes a list of 40 Grocery Items Sold Out After a Crisis and other crucial crisis information

 A PRACTICAL PREPAREDNESS 3CD Album by Steve Quayle

82 The survival information in contained in this package is essential for our provision and protection in the coming times of crisis! Order you FREE copy ASAP! OSEH MIND CONTROL TARGETED INDIVIDUALS

IN THIS ISSUE:

 Project MKULTRA  PROJECT RAINBOW  THE PHILADELPHIA EXPERIMENT  THE PHOENIX PROJECT  SPACE TRAVEL  THE MORMONS  THE PALLOTINE GROUP  The Knights of Malta  Mind Control TIES TO THE MILITARY

 Mind Control Blood Lines  SCIENTOLOGY / DIANETICS  Mind Control Today  HAARP - SON OF PHOENIX  MIND CONTROL Alert Posts from Steve Quayle’s site  Government Sponsored Mind Control Will Soon Eliminate All Free Will  Recent Developments  What the Government Is Doing Today  The Purpose of Mind Control  Mind Control Techniques Utilizes Law of Incrementalism  Your Body and Life Does Not Belong to You  DNA Provides An Avenue of Attack for Targeted Individuals  The Dawn of Micro-Chipped Mind Control  The Mind Control Delivery System: Project HAARP  A Very Ominous Warning from the Inventor of Electromagnetic Mind Order your free copy of this Watchman ReportControl Today Lest Satan should get an advantage of us: for we are not (to be) ignorant of his devices. ( 2 Cor 2:11)

We must know the mind of God concerning the evil things that are happening all around us—which are not generally known by the majority of people because they are uninformed—and sadly, many unfortunately choose to remain so because the facts are so evil and can be a very hard reality to face. Those in this position however, are placing themselves and their loved ones in terrible danger. We must give heed to the earthly messengers God is sending us—otherwise we can easily end up going in a direction that He never intended for us to go. Therein lies the greatest danger.

See to it that you obey God, the one who is speaking to you. For if the people of Israel did not escape when they refused to listen to Moses, their earthly messenger, how terrible our danger if we reject the One who speaks to us (that is sent) from heaven! (Heb 12:25) (parenthesis mine).

83

OSEH MIND CONTROL TARGETED INDIVIDUALS

Order your free copies and help us spread God’s Word! This Watchman Report is for those who are seeking God concerning what is going to take place in these last days. Those who spend quality time immersed in God’s Word and relying on the Holy Spirit to teach them the prophetic Scriptures—will know when a messenger is writing or speaking a revelation from God. The prophetic messages in this report are for the purpose of confirming God’s Word and preparing God’s people for what lies ahead—so they can warn others of what is coming upon this earth. (Matt 25:10-13) "… the bridegroom came… and the door was locked... Later, (others who were not prepared) …stood outside, calling, 'Sir, open the door for us!' ...But he called back, 'I don't know you!'..."So stay awake and be prepared... NLT

84

OSEH MIND CONTROL TARGETED INDIVIDUALS

Topics in this Watchman’s Report Include:

 The Christian and Energetic Medicine

 The Christian Holistic Health Movement

 What is Bio Energy?

 Demonic Energy An Operative Reality

 Pagan/Occult Connections

 The "love frequency" of 528 Hz is actually SATANIC

 Vibrating in Harmony

 Alternative Healing Through Sound and light

 Sarah Young's Mystical

 Channeled Messages from Jesus

 Bill Johnson and Bob Jones and their DANGEROUS New Age Order your free copies and help us spread God’sTheology Word!

In this report, you will discover some of the ways in which God’s people are being seduced by many deceptive tactics being used by occultists, the New Age, and the wholistic healing and health community. God’s people are being led astray by Satan’s very subtle and supernatural demonic wiles through New Age teachings and practices. This has opened the door for “sorcery” to enter their lives, disguised as the work of the Holy Spirit. Christians are becoming “enchanted” by false teachers and ministers offering “spiritual experiences” that lead them into the realm of sorcery (divination).

The Bible forbids God’s people to become involved with those who are “enchanters” or those who are able to enchant us through Sorcery. “There shall not be found among you any one...that uses divination, or is an enchanter... (Deut 18:10-13). The quest for spiritual experiences associated with “alternative” practices that contradict the Word of God are only going to increase as the time approaches for the second coming of Jesus Christ to gather His true saints out of this world. Those involved in what is being presented in this report will not be among those who will meet the Lord in the air at His second coming—if they don’t repent of these things! 85

OSEH MIND CONTROL TARGETED INDIVIDUALS

Order your free copies of this Watchman’s Report and help us spread God’s Word!

There have been many articles and topics about how food is changing and being effected by science. This is called Genetically Modified food, or GMO food. But what about Genetically Modified Humans? This is the topic known as Transhumanism. This is not a distant projection but activity that is presently being carried out. It’s in our military budgets; it’s in DARPA, it’s in a presidentially approved budget this year. Jesus states in (Matthew 24:37), “As it was in the days of Noah, so it will be at the coming of the Son of Man.” What exactly was taking place in the days of Noah? There was this broad genetic corruption that led to the corruption of what God had made. This year’s presidentially approved DARPA budget has tens of millions of dollars of budget in it specifically to use this kind of technology to create a new blueprint for our soldiers, future soldiers, on the battlefield to be genetically modified!

86

OSEH MIND CONTROL TARGETED INDIVIDUALS

INVESTIGATING THE APOCRYFUL BOOKS

Satan has done his best to distort and erase our ancient history. Much of the vital information from ancient history has been hidden from the majority of Christians, from around 100 years after the death of the founding Apostles until now. However, God told Daniel that in the end times “knowledge would increase” (Dan 12:4) and this includes knowledge concerning lost ancient history. Satan and his demonic hoards don’t want God’s people to know the truth concerning the ancient past, because—as I often say, “those who don’t understand the past will not be prepared for what hell has planned for the future.” The Bible does give us an accurate account of many past and future events. There are however, many “lost” writings from history, such as the Apocrypha and Pseudepigrapha of the Old Testament that provide a wealth of additional and accurate information regarding many past and future events that are relevant to the

87

OSEH MIND CONTROL TARGETED INDIVIDUALS

Order your free copies and help us spread God’s Word!

The focus of this article is a report on the recent emergence of NAR Dominion Theology in Charismatic and Pentecostal circles, and the primary theologian and thinker behind this movement. These Dominionists tend to scorn and belittle those who would exercise their God-given self-defense weapon of discernment. Those who would obey scripture and “test all things” are often mocked and ridiculed and labeled legalistic ‘Pharisees.’ Dominion teachers falsely teach that the Gospel of Salvation is achieved by setting up the “Kingdom of God” as a literal and physical kingdom to be “advanced” on Earth in the present age.

The so-called “Emergent Church” is the stepchild of postmodernism. This ideology contends it is arrogant to believe that one can know absolute truth; instead the “truth” is that truth, which is only determined by our personal subjective opinions and is, fashioned by culture and not Scripture. Is this concept even remotely associated with a logical thought process? It is contended that each person must find his own way to God, and not be addicted to “bibliolatry.”

88

OSEH MIND CONTROL TARGETED INDIVIDUALS

MIND CONTROL

Through Psychotropic Drugs

In this modern era of uncertainty, pleasure and anguish the boundaries between healing and enhancing the mind by chemical means have been redefined. Long before Prozac or Lithium would become a household name for an ‘emotional aspirin’ did consumers embrace the idea and practice of taking psychotropics not only to treat mental illness but also to make them feel better about living in a modern world. The Freudian promise that each individual can remake themselves in the pursuit of health and happiness was helpful in promoting and legitimizing the idea and practice of seeking wellness by prescription. However exciting, this endeavor will come at the high cost of further widening the problem of addiction—induced by a physician's therapy and also opening portals to the spirit realm and demonic influence or possession—in this age of happiness pills used as ‘Botox’ for the mind. Don’t forget to request to be placed on the

mailing list for the…

NEWS LETTER He that has an ear, let him hear...

89

OSEH MIND CONTROL TARGETED INDIVIDUALS

The WHEAT and the TARES look alike, but Satan has had HIS plants among the church from the beginning… be informed and don’t be DECIEVED! Watchman Report

THE ILLUMANATI WATCHMAN PACKAGE GET THE BILLY GRAHAM the Free Mason Watchman Report & The ILLUMINATI Infiltration of CHRISTIANITY 2 DVD series

DVD

90 2 DVDs OSEH MIND CONTROL TARGETED INDIVIDUALS

DVD

Is there a PRE-Tribulation Rapture?

Compiled by

Karen E. Connell EXTENDED LIFE C.T.M.

Johnathan Cahn Watchman Report

JONATHAN CAHN: Revealer of Mysteries? Package includes DVD’s & Report Jonathan Cahn claims he is a Jew who has received Yeshua as His Messiah or personal Savior, yet he calls himself a Rabbi when the Bible says: Matthew 23:8 “But be not ye called Rabbi: for one is your Master, even Christ; and all ye are brethren.” On his website it states he is... “Widely known for revealing the deep mysterieS of God’s word and for restoring the new covenant message to its original biblically Jewish richness and power .” It seems his “Jewish Richness and power” includes “Jewish Mysticism.” In a video, Jonathan Cahn is seen preaching new revelations about the Bible from a mystical source called the Zohar... a Jewish mystical book (that he claims God had a hand in writing). The Zohar contains all 125 degrees of the spiritual states that people are to experience if they want their souls to evolve. Ultimately the Zohar claims the soul achieves what mystical Kabbalah, refers to as the highest level of spiritual wholeness.91 We must ask, “Is Jonathan a genuine Christian or

OSEH MIND CONTROL TARGETED INDIVIDUALS

A 125 page-- Watchman Report The KABBALAH and the FREE MASONS

It is important to have a basic understanding of the workings of Kabbalah and the Free Masons because Satan has been able to use these things to confuse and thus deceive many professing Christians. These cults have invaded Christianity in very subtle ways, and have managed to change and challenge the very foundation of Christianity in ways that most Christians are not even aware of. I pray what is put forth in this report, will begin to open the eyes of God’s people who may have become entangled with those operating in what is being exposed in this report. This report reveals an aspect of the mystery of lawlessness, which is clearly revealed through the religion, signs and symbolism of KABBALAH—which is alive and well TODAY and all around us. In reality the whole world lies in deception and is influenced and controlled by this satanic cabal. Learn how the universal Christian Church, which is comprised of hundreds of denominations and movements, have been largely run by Kabbalistic Freemasonry organizations. You will learn how to recognize the churches and ministries that have been infiltrated by their symbolism and signs, which speak loud and clear, revealing real the truth of their

92

OSEH MIND CONTROL TARGETED INDIVIDUALS

The Illuminati… the Shadow Government and NEW WORLD ORDER

(Report and CD)

The Illuminati, its shadow government and its NWO agenda, is a worldwide secret society of elites that has infiltrated the world’s governments, businesses, banks, education systems and even Christianity, with the goal of seeking world domination. In other words, as the Bible clearly reveals the Illuminati is setting the stage for the demonic rule of Antichrist during the last generation of humanity upon this earth. And according to the Bible—we are that generation. We as Christians must re- think what we believe and make sure it is in accordance to God’s Word. What the Bible has to say won’t be popular and will even be hated by unbelievers in the world; nor will it be popular or accepted by those who are professing “worldly Christians.” It is a sad fact that many worldly ministers and ministries are servants of Satan’s Illuminati society. What is covered in this report will be the true and often forbidden history that that exposes Satan’s Lucifarian Illuminati agenda being carried out by his servants who disguise themselves as purveyors of truth.

93

OSEH MIND CONTROL TARGETED INDIVIDUALS

94

OSEH MIND CONTROL TARGETED INDIVIDUALS

Please complete this form to place an order by mail... To view or listen to these resources on line go to: www.extendedlifeCTM.org

Name______

Address______

City______State______Zip______

Phone ( )______e-mail______

I have enclosed a love offering in the amount of $______

Please check if you would like to be placed on our mailing list

How many FREE copies of the following you would like?

Copies of the Complete Extended Life C.T.M. Resource Catalog

Copies of the current Trumpet Sounds Newsletter

Copies of: In His Presence (worship CD) By Karen Connell

Copies of: ANATOMY FOR DECEPTION: If Possible Even the very elect will be deceived

Copies of: NORMALIZING EVIL: Through False Teaching

Copies of: SPIRITUAL WARFARE: A Biblical Perspective

Copies of: INVESTIGATING AND EXPERIENCING THE GLORY OF GOD

____ Copies of Other Resources listed below: ______

Mail to: 734 W. Water St.—Hancock, MI 49930

You may also use a credit card

Card Type______

Card #______

Name on card______

Expiration Date______

95

OSEH MIND CONTROL TARGETED INDIVIDUALS

96