Thehiddenevil\’s Weblog


43.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The objective is to isolate the bothersome informant, depict him as incompetent, disloyal, troublesome, mentally unbalanced or ill. The whistle-blower is forced out, frightening workmates and supporters. The assault continues until the target is left discredited, exhausted, in poor health, financially crippled, his career in ruins.

Activists/Dissidents

Corporations in various countries are currently using professional harassment groups on people that oppose them.(329)

Civil rights activists have a history of being targeted by these programs. If your views are not aligned with the corporate/state entity, & you are effectively raising awareness about an issue, you may very likely become the target of this type of terrorism. Anyone who opposes Globalization may be targeted.

War at Home-Covert war against U.S. activists & what we can do about it, Brian Glick

The records show that the vast majority of the targets of domestic covert action have engaged only in peaceful protest. They do no harm to anyone s health or safely. The only danger they pose is to the status quo. Their only weapon is the power of their words & the threat of their good example.

The Justice Department claimed that the original Cointelpro was needed to defend national security & prevent terrorism. (10) However, it ended up subverting democracy & promoting violence & terrorism. If you protest at an event, you could be considered a terrorist under the US Patriot Act. Under the JTTF there is currently a nation-wide effort with local & federal law enforcement to report information regarding demonstrations. Cointelpro is back. But it is much, much worse, now with one in 24 Americans being recruited as informants, an unlimited budget, & a loosening of laws that prevented it in the first place.

The New Cointelpro is now legal. According to ACLU executive director Anthony Romero, who viewed a confidential FBI memorandum, even peaceful protesters are now being labeled as potential “terrorists.”(367) Think about what this means.

Experimentation

Some known behavioral modification projects include BLUEBIRD, MKDELTA & MKULTRA. MKULTRA, with 149 sub-projects, was conducted in universities, hospitals, military institutions, & prisons. Some tests included the effects of stress on human beings, including duress, fatigue, torture, drugs, creation of mutations, & a variety of other tests.

Under MKULTRA about 23,000 people were traumatized, but researchers in this are see this as an extremely conservative number.(23) Since many of the records have been destroyed we will probably never know. Most of these people were unwillingly & unknowingly experimented on in these institutions, & their lives were basically ruined.

Some of these tests were conducted on children.

These people will think nothing of sacrificing innocent members of the population & experimenting on people, then covering up their crimes claiming reasons of national security. After studying the history of some of these agencies & learning the facts, it became clear to me that these acts were carried out by monsters misusing their resources & committing crimes against humanity.

The paper trail for these experiments ended around 1984.(23) But there are currently thousands of citizens being experimented on at this time. Labs are apparently no longer necessary as Directed Energy Weapons can be used at a distance. Targeted people are declined assistance by organizations that have been set up to help victims of torture & mind-control. They are routinely labeled mentally ill to discredit them.

Several mind-control survivors have written books. One MKULTRA survivor named Cathy O Brien wrote a book with Mark Phillips (former CIA operative) called, Access Denied: For Reasons of National Security. It is a well

Advertisements

42.

Why is it used?

The organizers have successfully desensitized communities & convinced them that it is OK to violate the civil rights of certain people. This was probably originally done using sex offenders & other undesirables. This may have started out as a system with positive intentions, however, due to lack of ethical oversight it has become heavily corrupted. This is now basically a parallel justice system & a revenge service that can be used for silent neutralization. There is a list or database that people are added to who are deemed expendable. It appears that there are several ways a person can be added to this list. I ve listed some later in this section.

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The United States of America has not openly declared war on private citizens. But illicit human experimentation and vicious non-lethal radio frequency assaults have been carried out by agencies within a number of federal institutions for 50 years.

I knew federal law enforcement & the intelligence community had their problems, like most institutions do. I had also heard scattered stories of people being harassed by government agencies but I attributed it to their own fault. I figured they must have been some serious troublemakers in order to provoke it. I thought the occasional media leaks were pretty much all there was to it. I trusted that the watch-dog media kept those agencies in line & were perhaps even a little intrusive (preventing these agencies from doing their jobs). I believed that these agencies would never spend resources to target innocent people, especially a nobody. I thought that these agencies had better things to do than to waste resources targeting innocent citizens. I was wrong. I never realized that those media leaks were just the tip of the iceberg or how big & organized this corruption was.

Then I began to learn about the organized human slavery rings, optimum/heroin trafficking (The Golden Triangle)

MKULTRA, & current mind-control operations.(100, 29, 23) And Operation Northwoods.(389)

I realized there was a whole community of targeted people screaming out to be heard, but stonewalled by the media & human rights organizations. These human rights organizations have received many complaints about Organized Vigilante Stalking, but as of the time of this writing they have not acknowledged this phenomenon. I can only conclude they have been given stand-down orders, no doubt for reasons of national security.

the women who are singled out appear to be somewhat too independent, perhaps too intelligent.. tend to live alone, tend to pursue professional careers. There s a heavy predominance of those types of woman in the TI community. Men are in a smaller proportion & seem to be those who have a sense of self-esteem & pride that seems to [invite] targeting.

-The Investigative Journal interviews Julianne McKinney, April 19th, 2006, Subject: Directed Energy Weapons & Gang Stalking

Revenge

Cause Stalking groups are available as for-hire revenge packages.(7) This revenge package is available to any person who has the connections & capitol to finance it. There are some very sick, sadistic people with influence in government & industry who can use this system if they think you ve done them wrong. This is the equivalent of putting a hit on someone. If this is the reason a person is targeted, he may never know it.

Whistleblowers

If you complained about working conditions or ethics of a corporation, you may be targeted. The U.S. postal service & other federal agencies use professional harassment services to harass people, literally to death.(20) This harassment includes psychological warfare & DEWs. If you do a key word search on yahoo using phrases such as, ” Harassed FBI Whistleblower,” you’ll find websites of former members of federal law enforcement, indicating that they are also targeted by the agencies they once served.

41.

service to Globalization. Individually, some tactics may not be illegal or very potent, but when combined with other tactics in a systematic round-the-clock fashion, day in, & day out, they are a painful & difficult to prove form of torture.

Torture (tôr cher), n., v., 1. the act of inflicting excruciating pain, as punishment or revenge, as a means of getting a confession or information, or for sheer cruelty. 2. a method of inflicting such pain. 3. Often, the pain or suffering caused or undergone. 4. extreme anguish of body or mind; agony 7. to afflict with severe pain of body or mind.

Webster s 1997 edition

40.

Silent Sound can also be piped through the V2K medium & transmitted over a distance. So this means that subliminal messages can be transmitted over a distance, through walls, directly into a person s skull. In essence, into their subconscious mind. If Silent Sound is used in this manner most people will probably hear a slight ringing in their ear.

“All schematics, however, have been classified by the US Government and we are not allowed to reveal the exact details… we make tapes and CDs for the German Government, even the former Soviet Union countries! All with the permission of the US State Department, of course…

The system was used throughout Operation Desert Storm (Iraq) quite successfully.”

-Edward Tilton, President of Silent Sounds, Inc, S-quad letter dated December 13, 1996

Microwave mind control: Modern torture and control mechanisms eliminating human rights and privacy

Dr. Rauni Leena Kilde, Former Chief Medical Officer of Finland

Report-September 25, 1999

All our emotions, moods, and thoughts have a specific brain frequency which has been catalogued. If these records fall into the wrong hands, our behaviour and attitudes can be manipulated by persons whose ethics and morals are not in our best interest. Both military and intelligence agencies have been infiltrated with such persons.

Some targets have reported being hit with other more exotic types of weapons that cannot be explained with current unclassified technology. These weapons have been known to penetrate all types of shielding. There are people with experience in the engineering field that have spent time & money on building shelters that did not stop these signals.

U.S. TAPS HIGH-TECH ARSENAL/PENTAGON LIKELY TO DEBUT NEW WEAPONS IN IRAQ. (News)

The Cincinnati Post (Cincinnati, OH); 3/20/2003 Byline: Jim Krane Associated Press

“Once you’re engaged and you have a capability that’s almost ready, you’ll try it,” said Clark Murdock, a former Air Force strategic planner now with the Center for Strategic and International Studies. “All kinds of things have been invented, particularly in the (classified) world, that will be used. If you use it and it works and no one knows, why talk about it?”

One former NSA employee, John St. Clair Akwei, is one of a very few targeted people to file a lawsuit (Civil Action 1:92 cv 00449) against the NSA. They have been harassing him using classified directed energy technology for the last twelve years. His information is posted on http://emhdf.com

Jesus Mendosa who appeared on The Power Hour radio show also has a case. Apparently he used radiation detection devices to identify some directed energy attacks against him & his children. He has also been Gang Stalked. I am unaware of the status of these cases. These folks are pioneers because most people don t realize what s happening &/or are too drained to intelligently explain what is going on. However, would it not be reasonable to conclude that organizations with a documented history of experimenting, torturing, & harassing citizens would use these weapons on people? If that is the case, then is it not also reasonable to conclude that at least some of these claims that weapons are being used on citizens are true? And if that is correct, does this not constitute a severe violation of human rights?

Tactics Conclusion:

It is impossible & unnecessary to explain every variation of harassment. In addition, there are some tactics that are much more subtle that you may experience if you re targeted. Now you know why some people are driven to suicide.

These organizers may be more aware of some of your habits than you are. For instance, commonly used routes will be used as avenues for various types of Street Theatre that unfold as you pass through. Also, products such as specific brands of soap, shampoo, deodorant, etc that you use will be discontinued, or sold out in the stores that you frequent.

The neighbors who move in next door to you will have loud motorcycles, or cars.

In addition, these neighbors may be carpenters, mechanics, etc & will always seem to have noisy projects to work on.

Moving out of the community or state will not stop this harassment.(7, 101, 200) This is not only nation-wide but it is happening in all NATO countries.(200) It apparently is one component of a political movement that appears to be in

39.

things; almost no one can believe their reports. Some experts who work for the German Army or Nato know very well about MW weapons, but secrecy keeps them from talking too much about in public. We have names and addresses of many victims and the circumstances of the cases. In some cases, the lifestyles of the criminals are well known to us. Similar to terrorists, many pretend good citizenship (sic) or student lifestyles to cover their crimes. Conventional criminal activities, (i.e. burglary) are undertaken by normal gangsters or former members of the Stasi

LIDA

The Russian LIDA machine (patent 3773049) is an old brain entrainment device used for the drugless sedation of mental patients. This device can be used as a weapon to drain a person of energy. The pulse rate can be adjusted so that it causes fatigue or excitability (sleeplessness). Although the LIDA signal does not travel a great distance, it can be used TTW in an apartment building. This device is about the size of a breadbox & works silently.

The LIDA machine was made in the 1950’s by the Soviets. the LIDA would put rabbits into a stupor at a distance and make cats go into REM The Soviets included a picture with the device that showed an entire auditorium full of people asleep with the LIDA on the podium.

-Dr. Eldon Byrd, U.S. psychotronic researcher

Voice-To-Skull (V2K)

V2K, also called Microwave Hearing was discovered during WWII when soldiers noticed buzzing sounds while standing in front of an energized radar antenna. Dr. Joseph Sharp demonstrated a V2K success in the mid 70s while working for the Walter Reed Army Institute of Research. If you have a tightly focused antenna, this can be transmitted through walls & over a distance. Voice or other sound can be transmitted over a distance, through walls, directly into the skull of a person. This was possible more than 30 years ago. Below is an except taken from the journal of the APA, which describes Dr. Joseph C. Sharp s V2K success.

The American Psychologist

Journal of the American Psychological Association

Volume 30, March 1975, Number 3

Given a thermodynamic interpretation, it would follow that information can be encoded in the energy and “communicated” to the “listener. Communication has in fact been demonstrated. Sharp and Grove (note 2) found that appropriate modulation of microwave energy can result in “wireless” and “receiverless” communication of SPEECH. The capability of communicating directly with a human being by “receiverless radio” has obvious potentialities both within and without the clinic.

Silent Sound Spread Spectrum

Silent Sound (patent 5159703), developed by Dr. Oliver Lowery of Norcross, Georgia, also called Clear Channel, is an improvement over the time-slicing subliminal suggestions. It does not need to compete with other sound to influence a subject because it occupies a separate channel just beyond the human hearing range. Hence the name: Clear Channel.

This channel is beyond human hearing but not human perception. It is not normally in use but it is a direct conduit to the subconscious.

Silent Sound can be used by installing a hidden speaker near person s area of work or in their home. These suggestions can be played constantly & the person would not be consciously aware of them. Apparently this weapon was used on Iraqi soldiers during the first gulf war.(386) Silent Sound can be transmitted through ordinary radio or television carrier frequencies. However, only a speaker is necessary. But Silent Sound cannot only convey suggestions, it can transmit cloned emotions. This is brain entrainment.

Nexus Magazine

Volume 5, Issue 6, October/November 1998

Military Use of Mind Control Weapons, Judy Wall 1998

PSY-OPS WEAPONRY USED IN THE PERSIAN GULF WARSubliminally,

a much more powerful technology was at work: a sophisticated electronic system to ‘speak’ directly to the mind of the listener and artificially implant negative emotional states-feelings of fear, anxiety, despair and hopelessness. This subliminal system doesn’t just tell a person to feel an emotion, it makes them feel it; it implants that emotion in their minds. presentation system carries cloned emotional signatures, the result is overwhelming.

38.

Sound beam puts listeners in the spotlight. (Foreign News)

The Independent (London, England); 5/17/2001; Arthur, Charles

Hearing Voices no one else can might not signal an imminent mental health crisis. A scientist at the MIT Media Lab in Boston has perfected a system that can beam sound to a specific point, like a spotlight aiming a beam of light at one point

Some of these Directed Energy Weapons (DEW) are Through-The-Wall (TTW) in nature. These devices or a similar ones are currently being used on citizens in North America & other NATO nations. It is likely that the perpetrators are using radar/Millimeter wave technology similar to the ones used in airports to pinpoint a person s location in a building & assist with aiming other DEWs at people.

Microwave

Microwave DEWs will produce dizziness, burning, headaches, eye problems, damaged nervous system & internal organs, heart attack, & an inability to concentrate. A common microwave oven can be turned into a DEW by modifying the appliance to operate with the door removed. It can then be positioned against a wall to attack someone on the other side. You can also build a weapon for a few hundred dollars that will employ a more focused attack.

Below is a picture from a website (Mikrowellenterror.de ) of a German doctor that has researched Microwave DEWs, & the German equivalent of Organized Vigilante Stalking. It appears that the perpetrator in the picture is using an easily modified microwave oven. Although the words in this picture are in German, you can get the general idea.

Targeting the Human with Directed Energy Weapons

Mikrowellenterror.de

Dr. Reinhard Munzert

6. Sept. 2002

Directed energy weapons are among the high-tech arms of the century. These weapons are also part of crimes (in Europe) that almost nobody knows except the victims and the offenders. The HPM-weapons that the high-tech gang uses supply continuous or pulsed waves over long periods of time – especially in the night – from cars or vans or buildings around the target/person(s). In addition they apply through wall imaging methods. Besides this the criminals use tactics of information warfare: Know all about the victims, let them know nothing about you, (sic) information dominance, disrupt the communication systems of the victims. the victims experience extreme, unbelievable

37.

incidents. But the real sick part is that the parents of these children are able to rationalize why it s necessary to use their children this way. It makes me wonder how else they re being used for the greater good.

You may also have people walk past you while your sitting down & stomp, or drag their feet as they pass in front of you. Or use some other tactic such as a throat-clearing campaign. Although there appears to be a boundary that they operate within, there is no act too petty or pathetic for these people. They will generally harass you any way they can.(7) These people are basically parasites.

Parasite (par e s t ), n. 1. an organism that lives on or within a plant or animal of another species

from which it obtains nutrients (opposed to a host). 2. a person who receives support or advantage from another without giving any useful or proper return

-Webster’s 1997 edition

Directed Energy Weapons

It is beyond the scope of this book to explain these weapons in detail. They are also known as Non-lethal Weapons, Less-lethal Weapons, & Electromagnetic Weapons. It appears that the package often includes electromagnetic attacks against a person as well. There are thousands of people across the planet who claim that directed energy weapons are being used on them.(23)

Virtual Government: CIA Mind Control Operations in America, Alex Constantine

The new elite death squads employ directed-energy weapons to harass and kill a designated guinea-pig (sic). These domestic terrorists are trained in the art of persuasive coercion (CIA jargon for a harassment campaign designed to break a subject without direct physical violence).

Some types of attacks that targets have reported can be explained with conventional technology. For instance, some types of unclassified directed energy weapons can cause nausea, fatigue, headaches, liquefy bowels & a variety of other symptoms.(312, 313) This is not science fiction. This technology currently exist. Some of it is over thirty years old & has been tested for decades. Although the technology being used on targeted individuals is probably much more advanced than the weapons I ve listed, I listed these weapons because their existence is undisputed.

Wonder weapons

U.S. News & World Report; 7/7/1997; Douglas Pasternak

So-called acoustic or sonic weapons, like the ones in the aforementioned lab, can vibrate the insides of humans to stun them, nauseate them, or even “liquefy their bowels and reduce them to quivering diarrheic messes,” according to a Pentagon briefing.

People have also reported having electrical systems in their cars, & brand new appliances, TVs, radios, PCs, & other electronic equipment suddenly die. Once again, this can be attributed to the E-bomb which can destroy electrical equipment while not damaging humans.(309-311) Recently, Massachusetts passed a law banning the illegal use of directed energy weapons. However, the law states that federal & local law enforcement can use these weapons.(357)

There are also sound lasers such as the Hypersonic Sound System (HSS), Long-Range Acoustic Device (LRAD), & Medium-Range Acoustic Device (MRAD). These sound lasers can focus an intense beam of sound up to 500 meters into an area ½ inch wide.(335-338) It can also project sound so that it appears to be coming from a specific location, like a ventriloquist.(339)

These sound beams can pass through a crowd of people & be focused inside of an individual s ear. That is, it can target a single individual in a crowd of people. They apparently have the capacity to play recordings in MP3 format as well.

People who are experiencing Organized Stalking report hearing doors slamming, voices, degradation of a religion, screaming, birds, etc. Some have experienced mock executions with gunshots going off in their ears.

36.

Symbols, such as ones that represent Wicca or Satanism may be used, as can numbers, letters, or other types of symbols. According to Ted L. Gunderson, who has investigated cults for over 25 years, these subliminal attacks, such leaving articles of clothing out of place & moving furniture around have been historically used by Satanic cults when stalking their targets.

These perpetrators will follow you into restaurants & businesses where they will try to surround you, kick your chair, or harass you any way they can.(7) They ll usually sit near you & mention several topics that directly relate to your personal life. This is done both to harass you & to try to evoke a sense of helplessness in you by not being believed if you were to tell someone about the harassment. This type of harassment is designed to try to evoke a feeling of paranoia.(101)

This harassment is concealed to anyone else in the establishment. Some of the other patrons may recognize that something is not right with that group of people. This is probably because the tone, rhythm & volume of their conversation are not natural; they re rehearsed & artificial. It addition, there are natural gaps between words & sentences that are absent with this type of staged event. It s almost like bad acting. You may even see other patrons looking over at them with an expression of what s wrong with those people?

Gaslighting-How To Drive Your Enemies Crazy, Victor Santoro

whispering sneers-Another way to foster your target s paranoia is to make it clear that people are, indeed, talking about him. Sneering while you whisper will suggest that he s being mocked, causing a very uncomfortable feeling. …If you can get several accomplices to do this… he’ll get the feeling that mockery & ridicule of him are widespread.

Here s an example: Suppose you re selling your house & have listed it in several websites & publications. Your asking price is $400,000. The day after you ve posted your Ad you are sitting on a park bench & the following situation occurs:

[One person walks by &, glances at you with a smirk & says into their cell phone, I spent 400.00 . A few moments later a couple walks by & in a monotonous, loud manner one of them says, yeah but isn t that a bit too high? Then another person walks by shortly after & loudly says into their cell phone, yeah, I just didn t like it, you know how some houses just don t feel right. Then a moment later a person walks by with an Ad on their shirt for a real estate agency. Then when you get home, you receive a call from a real estate agent that you did not contact.]

As always, personal information gathered by surveillance is used primarily for harassment. This has been well documented, not only by countless targets & websites, but also in books such as The War At Home, by Brian Glick, &  Terrorist Stalking in American by David Lawson. Themes can also apparently be projected using collisions & cut-offs.

Children are used in Cause Stalking campaigns.(7) Parents who are group members routinely use them in crowding, cut-offs, or other harassment skits. Once, within a one-week period I had three separate groups of kids that looked like they were about 13- 15 years old walk up to me & ask me for a dollar to take the bus. This happened in three different locations. Then several days later another group of kids (making it 4 total) asked for some money for the bus as well.

These children could have been recruited by their parents, or through displays of power. They may also have been recruited through a junior community-policing or similar program.

Once in August 2005, when I was at St Anthony s feast, on two separate occasions two different girls about 5 years old walked by me with very short skirts. I thought it strange that their parents would dress them that way. This happened within about a 5-minute period. On both occasions, shortly after, a man would walk by & give me a blatant, disgustful stare implying that I was looking at them in a sexual way. If I had stayed longer, there probably would have been a third. Two days later, I was turning onto my street & a girl of about 8 years old walked passed me. After several feet, she looked back & stared at me with a shocking expression, then started running, & looking back at regular intervals.

She ran into her house, which is located on the same street I live on. Other targets have reported similar skits. If I was not aware that I was being systematically harassed, I probably would have written those off as isolated, strange

Posted in mobbing,Neuro-linguistic,Neurolinguisticprogramming,NLP,Occult,Stalking by thehiddenevil on August 26, 2007

35.

Person 1: Isn t that being dumb?

Person 2: I agree, I think that s just being stupid.Person 1: Whenever

he s down visiting, I bring it up but he gets so uptight Person 2: I know, he goes nuts with that car!

Person 1: I think he plans to take it to Florida, but he s not going to make it!

Person 2: He should start thinking about loosing it

The conversation above is an example of an embedded hypnotic suggestion that can be very effective if used under the right circumstances.(4) It keeps the conscious mind occupied with an erroneous conversation concerning a car breaking down, while the actual message is slipped into the subconscious, potentially affecting the desired emotions. It appears a variation of this message can be conveyed with multiple people blitzing a person with cut-offs while talking on their cell phones, looking directly at the person & emphasizing (metacommunication) weighted words &/or information about person s personal life that was obtained from surveillance. Groups will also use these phony conversations to harass targets in stores, restaurants, public places, elevators, etc. These overheard comments are intended to elicit a negative reaction within you.(101)

NLP-The New Technology of Achievement, Steve Andreas & Charles Faulkner

When we hear something, even from another conversation, we can t help but make images & sounds of it in our head. The professional persuader knows this intuitively. In NLP we know it explicitly. You cannot NOT communicate.

Symbolism appears to be a big part of subliminal attacks.(100) After a target has been sensitized, they can even be harassed, insulted, & threatened with symbolism using articles of clothing, newspapers, & other items. Just as body communication (Social Kinesics) is used to harass a target, so too is symbolic communication. Symbolism can be used with articles of clothing, especially during a wave attack where you are blitzed by a crowd of harassers who smile, laugh, stare at you, & cut you off as they pass by you. Some of the shirts I’ve noticed are “Stop & Die,” “Big Bro,”

“Watch Your Back” as well as Satanic & Wicca symbols. An attention-getting tactic may be used prior to a harassment skit.(7) It can be a cut-off, blatant stare, loud noise, or other sensitivity tactics. Remember how the perpetrators at the YMCA both used an attention-getting tactic? One man gave me a smirking stare & the other two swarmed me.

In essence, they will take an event that is unfolding in your personal life & make references to it using any number of methods. This has also been reported by people who have been temporarily stalked for days at a time during anticorporate rallies.(340) The theme may pertain to something in your personal life. They may play on this theme for a single day, a series of days, or weeks. In addition, they may choose a theme & try to project it into your life. Some survivors of government mind-control & torture have reported themes being used in behavior modification programs, & as entry points for control & future manipulation. Some include: Disney, Alice in Wonderland, Cinderella, Wizard of Oz, etc.(12) For Gang Stalking & Mobbing targets, themes are used in harassment skits.

Mobbing, also referred to by some as bullying, psychological terrorism, and organizational violence is described as a collective form of psychological violence in which many individuals unite to persecute an individual Mobbing is a way of destroying a person without using any physical means Degrading themes are often used to try to prevent people from coming forward.

-http://www.psychologicalharassment.com

Whether the perpetrators actually believe in a theme is inconsequential. The use of themes (sometimes Satanic) injected into occult crimes assist with trauma, & serve to discredit a person if he were to come forward. Apparently the logic of using Satanic & other themes in occult-related crime is that you won t be believed because it’s too farfetched.(17)

The New Satanists, Linda Blood

“In one instance after another, charges of ritual abuse & other crimes linked to Satanism & various forms of malevolent occultisms have been rejected on ground no more substantial than that they are too bizarre to be believed.

34.

Messages-The Communication Skills Book, Matthew McKay, Ph.D., Martha Davis, PhD., Patrick Fanning

It s hard to defend against the anger & disapproval expressed in negative metamessages The attack is often so subtle that you aren t aware of exactly how you ve been hurt The basic function of metamessages is to say something covertly that you re afraid to say directly. Since metamessage attack is covert, there is little chance of overt retaliation.

These subtle whispering sneer attacks, & verbal barbs attacks may work best when done repeatedly, & after a person been loosened up with a more overt type of harassment such as noise campaigns, collisions, crowding, & sensitivity tactics. Within a conversation, certain weighted words can be emphasized. Volume, tone & tempo can be changed so that some words are slightly louder & spoken longer than the others. This can completely change the meaning of a message.

The following is a quotation regarding imbedded questions & suggestions as outlined in the book, Patterns Of The Hypnotic Techniques Of Milton H. Erickson, M.D., by NLP experts Richard Bandler & John Grinder. The example at the bottom titled Indirect Imbedded Command is exactly as it appears on page 173, where the weighted words (suggestions) that are to be emphasized when spoken are bolded. Note: When Erickson speaks of the dominant & nondominant hemisphere, he is referring to the conscious & unconscious mind respectively.

Patterns of Hypnotic Techniques of Milton H. Erickson, M.D. Richard Bandler & John Grinder

“They very often are a presupposition of some other command and serve to distract the dominant hemisphere by having it utilize the internal dialog These imbedded questions are most effective when they are stacked together to maximally distract the dominant hemisphere.

Imbedded commands serve the purpose of making suggestions to the client indirectly and, thereby, making it difficult to resist in any way…

These are most effective when they are also marked analogically by emphasizing the command and by looking intently at the listener, if their eyes are open.”

“Indirect Imbedded Command: “My friends tell me to feel comfortable and to loosen up when we are out on the town.””(4)

Below is an example of how groups use these suggestions to harass people. Bolded words indicate ones that are emphasized.

Situation:

You ve been blitzed with noise campaigns, crowding & collisions on your way to the bus stop. You feel like you ve been through a minefield & have been hit multiple times (you have). Your heart is pumping. You sit down on the bus  begin to relax. A couple sits down across from you & begin a conversation. You overhear bits & pieces of it.

Person 1: His car isn t working.

You: You think, My car is in the shop.

Person 1: They think it s the battery.

You: What a coincidence, my car is getting a new battery, you say to yourself.

Now that they have your attention, the conversation unfolds like this

Person 1: I saw him last week, his car looks bad.

Person 2: That s HORRIBLE What s wrong with it?Person 1: It just keeps

breaking down.

Person 2: I don t want to be in that car in case it should just flip out!

Person 1: That s insane!

Person 2: I hate to see him like that.

Person 1: He s crazy for keeping it. He knows it just keeps breaking down.Person 2: I know

he is. It just broke down so many times

Person 1: Not to be paranoid, but he should just give up on it.Person 2: You re not

being paranoid, but I don’t trust that thing on the highway.

Person 1: Is that crazy or what, is that being insane?

Person 2: he s nuts for keeping it. I told him he s crazy.

Next Page »