PSYOPS: MILITARY PSYCHOLOGICAL OPERATIONS MANUAL
Domestic Police Use of Military Weaponry
(Federal Efforts To Supply Surplus Military Weapons And Equipment To Domestic Law Enforcement Agencies) "The militarization of American policing has occurred as a direct result of federal programs that use equipment transfers and funding to encourage aggressive enforcement of the War on Drugs by state and local police agencies. One such program is the 1033 Program, launched in the 1990s during the heyday of the War on Drugs, which authorizes the U.S. Department of Defense to transfer military equipment to local law enforcement agencies.
12. This program, originally enacted as part of the 1989 National Defense Authorization Act, initially authorized the transfer of equipment that was 'suitable for use by such agencies in counter-drug activities.'
13. In 1996, Congress made the program permanent and expanded the program’s scope to require that preference be given to transfers made for the purpose of 'counterdrug and counterterrorism activities.'
14. There are few limitations or requirements imposed on agencies that participate in the 1033 Program.
15. In addition, equipment transferred under the 1033 Program is free to receiving agencies, though they are required to pay for transport and maintenance. The federal government requires agencies that receive 1033 equipment to use it within one year of receipt,
16. so there can be no doubt that participation in this program creates an incentive for law enforcement agencies to use military equipment."
"War Comes Home At America’s Expense: The Excessive Militarization of American Policing," American Civil Liberties Union (New York, NY: ACLU, June 2014), p. 16.
(Domestic Law Enforcement And Military Surplus Weapons Made Available Through Federal 1033 Program) "The Department of Defense operates the 1033 Program through the Defense Logistics Agency’s (DLA) Law Enforcement Support Office (LESO), whose motto is 'from warfighter to crimefighter.' According to LESO, the program has transferred $4.3 billion worth of property through the 1033 Program.
61. Today, the 1033 Program includes more than 17,000 federal and state law enforcement agencies from all U.S. states and territories. The amount of military equipment being used by local and state police agencies has increased dramatically—the value of property transferred though the program went from $1 million in 1990 to $324 million in 1995 and to nearly $450 million in 2013.
62. "The 1033 statute authorizes the Department of Defense to transfer property that is 'excess to the needs of the Department,
63. which can include new equipment; in fact, 36 percent of the property transferred pursuant the program is brand new.
64. Thus, it appears that DLA can simply purchase property from an equipment or weapons manufacturer and transfer it to a local law enforcement agency free of charge. Given that more than a third of property transferred under the program is in fact new, it appears that this practice happens with some regularity."
IS HISTORY BEING REPEATED SIMILAR TO THE NAZI REICHSTAG ENABLING ACT? LINK: http://www.historyplace.com/worldwar2/timeline/enabling.htm
ELECTRONIC SURVEILLANCE OPERATION CENTERS
PSYCHOTRONC ELECTROMAGNETIC WEAPONS: REMOTE CONTROL OF THE HUMAN NERVOUS SYSTEM
BIO-ELECTROMAGNETIC WEAPON'S USE AND CAPABILITIES: http://www.i-sis.org.uk/BW.php
ACLU REPORT - TRUMP, HYPOCRITICALLY, MOVES TO MAKE TEMPORARY SURVEILLANCE PERMANENT
THE ENABLING ACT OF 1933 DETAILED - https://prezi.com/u_9o0cb0rjwm/the-enabling-act-1933/
IT TAKES AN ABUNDANCE OF LAWS TO MAKE MEN CRIMINALS
NOTE: Neurological Weapons, Extremely Low and Electromagnetic Frequency weapons fall under the category of biological.
Through U.S. Code, Title 50, Chapter 32, Section 1520a (below), it is "LEGAL" for the government to test chemical, biological, and radiological elements on humans under the "Exception Clause" approved for the military and law enforcement.
The military can test any of the above mentioned also as longas it is for research or law enforcement for law enforcement purposes and riot control, NON-CONSENSUALLY!
U.S. CODE, TITLE 50 -- WAR AND NATIONAL DEFENSE - CHAPTER 32--CHEMICAL AND BIOLOGICAL WARFARE PROGRAM
Sec. 1520a Restrictions on use of human subjects for testing of chemical or biological agents
(a) Prohibited activities
The Secretary of Defense may not conduct (directly or by contract) unless by **Exception
(1) any test or experiment involving the use of a chemical agent or biological agent on a civilian population; or
(2) any other testing of a chemical agent or biological agent on human subjects.
(b) **Exception Clause
Subject to subsections (c), (d), and (e) of this section, the prohibition in subsection (a) of this section does not apply to a test or experiment carried out forany of the following purposes:
(1) Any peaceful purpose that is related to a medical, therapeutic, pharmaceutical, agricultural, industrial, or **research activity.
(2) Any purpose that is directly related to protection against toxic chemicals orbiological weapons and agents.
(3) Any **law enforcement purpose, including any purpose related to riot control.
Unstated is that anyone can make allegations, then without "Due Process"Constitutional, Civil, or even basic Human Rights, men, women to include children, can be placed into this high-tech psycho-physical ongoing human experimentation program and used as a human guinea pig. Children, in the early stages of development can be used to further experimentation for future social and population control.
The Secretary of Defense/DOD may conduct a test or experiment described in subsection
NOTE: APPARENTLY, THE WAR ON TERROR NULLIFIED ETHICAL MORAL CONSENT THIS SPECIFICALLY TRUE WITH REGARDS TO ONGOING "COVERT HUMAN EXPERIMENTATION"
(b) of this section only if informed consent to the testing was obtained from each human subject in advance of the testing on that subject.
(c) Informed consent required,OR
(d) Prior notice to Congress
Not later than 30 days after the date of final approval within the Department of Defense of plans for any experiment or study to be conducted by the Department of Defense (whether directly or under contract) involving the use of human subjects for the testing of a chemical agent or a biological agent, the Secretary of Defense shall submit to the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives a report Setting, forth a full accounting of those plans, and the experiment or study may then be conducted only after the end of the 30-day period beginning on the date such report is received by those committees.
(e) "Biological agent'' defined
In this section, the term ``biological agent'' means any micro-organism (including bacteria, viruses, fungi, rickettsia, or protozoa), pathogen, or infectious substance, and any naturally occurring, bioengineered, or synthesized component of any such micro-organism, pathogen, or infectious substance, whatever its origin or method of production, that is capable of causing:
(1) death, disease, or other biological malfunction in a human, an animal, a plant, or another living organism;
(2) deterioration of food, water, equipment, supplies, or materials of any kind; or
(3) deleterious alteration of the environment.
(Public Law 105-85, Div. A, title X, Sec. 1078, Nov. 18, 1997, 111 Stat. 1915; Public. Law 106-65, div. A, title X, Sec. 1067(4), Oct. 5, 1999, 113 Stat. 774.)
Section is comprised of section 1078 of Pub. L. 105-85. Subsec. (f) of section 1078 of Pub. L. 105-85 amended section 1523
(b) of this title. Subsec.
(g) of section 1078 of Pub. L. 105-85 repealed section 1520 of this title.
Section was enacted as part of theNational Defense Authorization Act (NDAA) for Fiscal Year 1998, and not as part of Pub. L. 91-121, title IV, Sec. 409, Nov. 19, 1969, 83 Stat. 209, which comprises this chapter.
(d). Pub. L. 106-65 substituted ``and the Committee on Armed Services'' for ``and the Committee on National Security.''
Space Preservation Act of 2001
In October 2000, Congressman, Dennis Kucinich introduced in the House of Representatives a bill concerning these ELECTROMAGNETIC SPACE-BASEDweapons. In this bill, the definition of a weapons system included.
Sec. 7 Definition:
any other unacknowledged or as yet undeveloped means inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person)…through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or population. As in all legislative acts quoted in this article, the bill pertains to sound, light, or electromagnetic stimulation of the human brain.
THIS ORIGINAL BILL WAS OFFICIALLY, INTENTIONALLY, WATERED WITH KEY AREAS DELETED
Currently three states have acknowledge the reality of electromagnetic extremely low frequency technology with laws surrounding these technologies use. However, anything goes during ongoing wartime status AND leaves the weapon use open for rampant use to silence any effort against specific global goals:
Public act 257 of 2003 makes it a felony for a person to “manufacture, deliver, possess, transport, place, use, or release a harmful electronic or electromagnetic device for an unlawful purpose.” Also made into a felony is the act of causing “an individual to falsely believe that the individual has been exposed to a... harmful electronic or electromagnetic device.”
Public law 264, H.P. 868–L.D. 1271 criminalizes the knowing, intentional, and/or reckless use of an electronic weapon on another person, defining an electronic weapon as a portable device or weapon emitting an electrical current, impulse, beam, or wave with disabling effects on a human being.
3. California Bans Forced Human Microchip / Radio Frequency Chip Identification Implantation by Employers
4. Richmond California City Council Votes to Enforce Space Preservation Act in 2015
MILITARY LAWS AND ASSASSINATIONS: http://www.au.af.mil/au/awc/awcgate/awc-law.htm#assassination
NOTE: THE "MILITARY COMMISSIONS ACT" OF 2006 CREATES A BROAD DEFINITION OF "UNLAWFUL ENEMY COMBATANT."
THE MCA'S DEFINITION OF "UNLAWFUL ENEMY COMBATANT"
Unlawful Enemy Combatant is a term which, prior to the MCA had no meaning in the U.S. or International Law. However today it applies to both citizens and non-citizens, and is broad, with the potential for constant expansion.
It leaves in the hands of the President or Defense Secretary a nearly unrestricted authority to declare people "Unlawful Enemy Combatants." In other words to silence anyone or protest! And, as shown in the link, after labeling, anyone labeled as a "Combatant" target then can be lawfully attacked and even murdered.
Obviously one thing globalization efforts do not want, and are trying to prevent, are global protest against ongoing wars, or the Orwellian Technocratic state, such as what successfully impacted the Vietnam War, and nationwide mobilization against corruption, or any exposure against the globalization agenda.
FULL LINK TO UNDERSTANDING MCA "Unlawful Enemy Combatant" definition below.
DOD Regulation 5240.1.R
Procedures governing the activities of DOD intelligence components and United States persons, December 1982 - **SEE SPECIFICALLY PROCEDURE 13**
This DOD regulation sets forth procedures governing the activities of DOD intelligence components that affect United States persons. It implements DoD Directive 5240.1, and replaces the November 30, 1979 version of DoD Regulation 5240.1-R. It is applicable to all DoD intelligence components.
NOTE: The Procedure links detailed for DOD 5240 1.4 exampled below, have been deleted from the DOD website related to this Regulation's functions, entitled "The Department of Defense Oversight Intelligence Program." The Procedures below are now only titled without the definition on the site. However, through research, the following information was retrieved:
DOD REGULATION 5240 1.R PROCEDURE LIST
PROCEDURE 1 General Provisions
PROCEDURE 2 Collection of Information about United States Persons
PROCEDURE 3 Retention of Information about United States Persons
PROCEDURE 4 Dissemination of Information about United States Persons
PROCEDURE 5 Electronic Surveillance in the United States for Intelligence Purposes
PROCEDURE 6 Concealed Monitoring
PROCEDURE 7 Physical Searches
PROCEDURE 8 Searches and Examination of Mail
PROCEDURE 9 Physical Surveillance
PROCEDURE 10 Undisclosed Participation in Organizations
PROCEDURE 11 Contracting for Goods and Services
PROCEDURE 12 Provision of Assistance to Law Enforcement Authorities
**PROCEDURE 13** ~ Experimentation on Human Subjects for Intelligence Purposes
SPECIFIC LINK: https://books.google.com/books?id=A_N9t1c2MrUC&pg=PA115&lpg=PA115&dq=procedure+13+experimentation+on+human+subjects+for+intelligence+purposes&source=bl&ots=Yau4ngiMO5&sig=dBqU4JuFJyHI0XI4p0swUPKMcDk&hl=en&sa=X&ved=0ahUKEwi0-tPVsPTLAhULOiYKHTjZDxEQ6AEIMTAE#v=onepage&q=procedure%2013%20experimentation%20on%20human%20subjects%20for%20intelligence%20purposes&f=false
OFFICIAL MILITARY LINK TO DOD REGULATION CHANGES TO 5240.1.R:
PROCEDURE 14 Employee Conduct
PROCEDURE 15 AND APPENDIX A Identifying, Investigating, and Reporting Questionable Activities
USAF DEEPLY INVOLVED IN MIND CONTROL OF CIVILIAN POPULATION & ENERGY WEAPON ATTACKS
USAF also the Directed Energy Weapon administrator & involved in the 24/7 effort MICROWAVE cooking me relentlessly.
HUMAN INTELLIGENCE (HUMINT) TARGETING
EXECUTIVE ORDER 12333
"United States intelligence activities" stipulates that certain activities of intelligence components that affect U.S. persons by governed by procedures issued by the agency head and approved by the attorney general. Specifically, procedures 1 through 10, as well as appendix A, herein, requiring approval by the attorney general, contain further guidance to DoD components in implementing Executive Order 12333 as well as Executive Order 12334, "President's Intelligence Oversight Board."
Accordingly, by this memorandum, these procedures are approved for use within the Department of Defense. Heads of DoD components shall issue such implementing instructions as may be necessary for the conduct of authorized functions in a manner consistent with the procedures set forth herein.
This regulation is effective immediately.
Signal Intelligence Collection using Brainwaves
Signals intelligence collection of targets within the United States is governed by the Foreign Intelligence Surveillance Act (FISA.) The Foreign Intelligence Surveillance Act of 1978 ("FISA" Pub.L. 95-511, 92 Stat. 1783, enacted October 25, 1978, 50 U.S.C. ch.36, S. 1566) is an Act of Congress which prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of being engaged in espionage and violating U.S. law on territory under United States control) and domestically the Electronic Communication Privacy Act (ECPA.)
The Electronic Communications Privacy Act of 1986 (ECPA) Pub. L. 99-508, Oct. 21, 1986, 100 Stat. 1848, 18 U.S.C. § 2510)
Was enacted by the United States Congress to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer. Specifically, ECPA was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Wiretap Statute), which was primarily designed to prevent unauthorized government access to private electronic communications.
The ECPA also added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act,18 U.S.C. §§ 2701-12. The ECPA also included so-called pen/trap provisions that permit the tracing of telephone communications. §§ 3121-27. Later, the ECPA was amended, and weakened to some extent, by some provisions of the USA PATRIOT Act. In addition, Section 2709 of the Act, which allowed the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers, was ruled unconstitutional under the First (and possibly Fourth) Amendments in ACLU v. Ashcroft (2004). It is thought that this could be applied to other uses ofNational Security Letters.
BRAINWAVE SIGNAL MIND READING, COMMUNICATION AND TRACKING:
The use of technology tapping into brainwaves translating into words or speech which may be labeled as “signals intelligence” under the larger scope of “electronic communications” and “data” without consent or judicial order consent past 90 days would be illegal. The renewal of a warrant for the same can only be sustained if there is reasonable cause for the law enforcement agencies and this must be weighed with the harm it is doing as well or otherwise, the warrant to monitor must be cancelled or at the least; notice must be served to the defendant. This particularly applies to military, intelligence, or defense situations as
“Section 11.2.2. Air Force Policy Directive”.In “C184.108.40.206 of the Procedure governing Department of Defense Intelligence Components that affect United States Persons”
which also governs “Signal Intelligence Gathering” states that the intelligence gathering may not extend 90 days without consent or notice. In relation to the U.S. Department of Justice’s statute on Electronic Surveillance, “Section 9-7.302 (Consensual Monitoring—Procedures for Lawful, Warrantless Monitoring of Verbal Communications)" will likely not be applicable as collecting words from brainwaves does not fit the definition of “verbal communication” provided although this act also limits warrantless surveillance to 90 days and 180 days if evidence requiring it is there.
MANY VICTIMS ARE TRACKED AND MONITORED FOR THE REST OF THEIR LIVES
HUMAN TARGETING APPROVAL AKA HUMAN INTELLIGENCE (HUMINT) PLAYS A PIVOTAL ROLE
PROTECTING BRAINWAVES IN LIGHT OF ADVANCED SIGNAL INTELLIGENCE:
EXECUTIVE ORDER 12333 FURTHER DETAILED
E.O. 12333 augments statutory intelligence authority for the Secretary of Defense as well as relevant offices and agencies within the Department. The functions of the NRO are described in paragraph 1.7(e), and include the production and dissemination of geospatial intelligence information and data “for foreign intelligence and counterintelligence purposes to support national and departmental missions,” as well as the provision of “geospatial intelligence support for national and departmental requirements and for the conduct of military operations.” Assistance to law enforcement agencies is covered in paragraph 2.6 of E.O. 12333, which authorizes agencies within the Intelligence Community to participate in law enforcement activities to investigate or prevent clandestine intelligence activities, international terrorist activities, or narcotics trafficking activities. The order also permits the intelligence elements to provide specialized equipment, technical knowledge, or assistance of expert personnel for use by any department or agency, or, when lives are endangered, to support local law enforcement agencies.
E.O. 12333 requires agencies within the Intelligence Community to use “the least intrusive collection techniques feasible within the United States or directed against United States persons abroad.” Monitoring devices may be used only “in accordance with procedures established by the head of the agency concerned and approved by the Attorney General. Such procedures shall protect constitutional and other legal rights and limit use of such information to lawful governmental purposes.” The Attorney General is delegated the authority to approve the use, within the United States or against a United States person abroad, of “any technique for which a warrant would be required if undertaken for law enforcement purposes, provided that such techniques shall not be undertaken unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power.”
*Inside the United States (as well as abroad), DOD support for law enforcement agencies is authorized in accordance with Chapter 18 of title 10, U.S. Code. The legislation contains both explicit grants of authority :and restrictions on the use of that authority for DOD assistance to law enforcement agencies—federal, state, and local—particularly in the form of information and equipment. Section 371 specifically authorizes the Secretary of Defense to share information acquired during military operations, and encourages the armed forces to plan their activities with an eye to the production of incidental civilian benefits. Under sections 372 through 374, DOD equipment and facilities, including intelligence collection assets, may be made available to civilian authorities.
PATRIOT ACT RENAMED "USA FREEDOM ACT" JUNE 2015
THE PATRIOT ACT
Commonly known as the "Patriot Act") is an Act of the U.S. Congress that was signed into law by President George W. Bush on October 26, 2001. The title of the Act is a contrived three letter initialism (USA) preceding a seven letter acronym (PATRIOT), which in combination stand for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001. The Act dramatically reduced restrictions on law enforcement agencies' ability to search telephone, e-mail communications, medical, financial, and other records; eased restrictions on foreign intelligence gathering within the United States; expanded the Secretary of the Treasury’s authority to regulate financial transactions, particularly those involving foreign individuals and entities; and broadened the discretion of law enforcement and immigration authorities in detaining and deporting immigrants suspected of terrorism-related acts. The act also expanded the definition of terrorism to include domestic terrorism, thus enlarging the number of activities to which the USA PATRIOT Act’s expanded law enforcement powers can be applied.
Just before the midnight deadline on May 26, 2011, President Barack Obama signed a 4-year extension of three key provisions in the USA Patriot Act: roving wiretaps, searches of business records (the "library records provision"), and conducting surveillance of "lone wolves" — individuals suspected of terrorist-related activities not linked to terrorist groups.
The Act was passed in the House by 357 to 66 (of 435) and in the Senate by 98 to 1 and was supported by members of both the Republican and Democratic parties.
Opponents of the law have criticized its authorization of indefinite detentions of immigrants; searches through which law enforcement officers search a home or business without the owner’s or the occupant’s permission or knowledge; the expanded use of National Security Letters, which allows the Federal Bureau of Investigation (FBI) to search telephone, e-mail, and financial records without a court order, and the expanded access of law enforcement agencies to business records, including library and financial records. Since its passage, several legal challenges have been brought against the act, and Federal courts have ruled that a number of provisions are unconstitutional…..
Electronic Surveillance by definition, Title 50, Chapter 36, Subchapter 1, § 1801 excerpt defining Electronic surveillance by law:
(f) “Electronic surveillance” means —
the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes:
the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511(2)(i) of title 18;
the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or,
the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.
Title 50, Chapter 36, Subchapter I, § 1802
Electronic surveillance authorization without court order; certification by Attorney General; reports to Congressional committees; transmittal under seal; duties and compensation of communication common carrier; applications; jurisdiction of court.
Note: A tactic which goes hand in hand with Electronic Surveillance involves a community effort of using neighbors, employers, business owners, employers and employees to include even family members and friends in what is called Gang stalking or Organized Stalking or Covert Harassment Groups.
In most cases law enforcement provides disinformation about a “Target” to enlist community's support. The “Targeted Individual's” (TI's) life then becomes literally a living hell as strangers appear to have resentments, taunt, threaten or ridicule the target or even show hate for a target which is often unexplainable to the person being targeted. The residences of neighbors are used or neighbors in adjoining apartments or buildings are provided with an array of portable technology, under the guise of Neighborhood Watch or Community Policing programs who assist in electronic surveillance efforts spearheaded and overseen in real time situational awareness from the Operation/Fusion center. Advanced technology such as biometric computers surveillance software and smaller versions of real time, energy weapon disseminating hand held microwave technology energy weapons and technology allow complete infrared through the wall observance and targeting around the clock. Today, Constitutional, Civil and Human Rights violations are happening although it is illegal according to the Title below:
Title 18 Part I Chapter 119 2511
"Interception and disclosure of wire, oral, or electronic communications prohibited an offense under this subsection that consists of or relates to the interception of a satellite transmission that is not encrypted or scrambled and that is transmitted:
(1) Except as otherwise specifically provided in this chapter any person who:
(a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication;
(b) intentionally uses, endeavors to use, or procures any other person to use or endeavor to use any electronic, mechanical, or other device to intercept any oral communication when
(i) such device is affixed to, or otherwise transmits a signal through, a wire, cable, or other like connection used in wire communication (i) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, intercepted by means authorized by sections 2511 (2)(a)(ii), 2511 (2)(b)–(c), 2511(2)(e), 2516, and 2518 of this chapter, shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5). (4) (a) except as provided in paragraph (b) of this subsection or in subsection (5), whoever violates subsection (1) of this section shall be fined under this title or imprisoned not more than five years, or both. As you can see this is the penalty for such offends.
Electronic Surveillance Issues
EXCELLENT SCHOLARLY ARTICLES REGARDING ELECTRONIC SURVEILLANCE ISSUES
The Law of Electronic Surveillance - Carr - Cited by 183
Computer - based Work Monitoring: Electronic surveillance and its … - Aiello - Cited by 80
The Electronic Eye: The Rise of Surveillance Society - Lyon - Cited by 573
SADLY TARGETED VICTIMS, HAVE BEEN CONVENIENTLY SET-UP IN MASSIVE ONGOING MIND CONTROL PROGRAMS DATING BACK DECADES, OF WHICH PROFITS FROM BOTH ILLEGAL INFILTRATION OF DRUGS INTO SPECIFIC COMMUNITIES FOR MIND CONTROL TESTING AND LEGAL DRUGS FOR BIG PHARMA PROFIT TESTING IN BOTH URBAN AND AFFLUENT COMMUNITIES. THIS INCLUDES TARGETING AND SET-UPS FOR EVERY REASON UNDER THE SUN AS SHOWN IN THE LINK, BELOW I.E., ACTIVISM, WHISTLEBLOWING, OR JUST HUMAN GUINEA PIGS, FOR ADVANCING TECHNOLOGY.
SEVENTY TWO REASONS YOU COULD BE DETERMINED A "DOMESTIC OR POTENTIAL TERRORIST" AND TARGETED
THE FACT IS, "THE PROGRAM" IS A NEVER-ENDING AND HISTORICALLY DESIGNED, FOR SOCIAL AND MASS POPULATION CONTROL EFFORTS BY VARIOUS HIGH LEVEL AGENCIES WITH TODAY UNIFIED MILITARY TECHNOLOGICAL METHODS.
MANY VICTIMS OF THIS PROGRAM HAVE BEEN TARGETED SINCE CHILDHOOD, WHO WHEN AWAKENING THEN BECOME CANDIDATES FOR CONTINUED TARGETED WHEN THE MILITARY / POLICE FORCES ARE UNLEASHED IN BOGUS INVESTIGATIONS DENYING ANY LEGAL RIGHTS.
THE COLD HARD TRUTH IS THIS GLOBAL POPULATION CONTROL EFFORT, AND THOSE IN HIGH PLACES AT THE HIGHEST ECHELON OF APPROVAL DO NOT GIVE A DARN ABOUT THEIR PUPPETS EITHER EXCEPT FOR THE PURPOSE THEY SERVE.
BELIEVE IT OR NOT!
THE MILLION DOLLAR QUESTION...
Do humans have “built-in” vulnerability to manipulation and control?
SIX NON LETHAL WEAPONS IN FULL TODAY THAT WILL MAKE YOU WISH YOU WERE DEAD