Project Soul Catcher : Secrets of Cyber and Cybernetic Warfare

1 year ago
850

Volume 2 details the CIA’s practices of interrogation and cybernetic mind control in their pursuit to weaponize neuropsychology. It covers the art of bio-communication war. Human beings are complex machines but their inner workings have been deciphered. Mind control and brainwashing have been perfected in the last 60 years. Hacking computers and hacking into individual minds are similar. The 21st century will be known as the age of spiritual machines and soulless men.
...He became a whistle-blower when he found out the evil purposes they were using this tech. for and he's now being targeted with the very same technology he helped create! The GangStalkers enact these role-play skits with street theater (all set-up FIRST by implanting words or thoughts into your head with V2K voice to skull) and subsequent / pre-choreographed staged events (which are artificial synchronicities or 'coincidences' that seem completely and mathematically improbable!). I've heard other T.I.s claim they experience the same as me. Part of Dr. Robert Duncan's books confirm my suspicions! That many of these skits are tailored to the specific 'religion' of the T.I. This gives a cover-story or 'mask' to hide the whole technology behind the 'paranormal' or 'supernatural.' All for padded - plausible deniability. Here are a couple snippets of Dr. Robert Duncan's book "Project Soul-Catcher." In one chapter 'ANGELS AND DEMONS SCRIPT' it says : "This script is the most popular one used on targets, so it's very important that I elaborate on it in great detail. During rapid fire interrogation techniques, the person is visited by four Fallen Angels or Demons. In summary, if the psychic assassin fails to kill its target, the target is saved by God's angels (usually Michael or Gabriel) which is the perfect script to use on Christian Targeted Individuals. This script plays into all religions, local cultures, mythologies and superstitions. Around 90-95%+ or so of the world's population is religious to some extent, so these techniques are very effective when combined with the V2K Voice of God weapons..." "Religion is the favorite method of manipulation of all the mind-hacking scripts. Using the V2K and Voice of God bio-communications (such as microwave silence signals), most will believe their god of choice is speaking to them, including aliens, angels and demons." Another few scripts were 'ALICE IN WONDERLAND' and 'WIZARD OF OZ'. Here are a few excerpts: "In all interrogation literature, the first few steps is to confuse and disorient the detainee. Likewise, in most of the CIA scripts, their goal is confusion. The ALICE IN WONDERLAND script is aptly named, as it involves, chasing the 'white rabbit.' This is an information warfare tactic to lead the subject down a path of misinformation or information overload." "In George Orwell's '1984' book, they torture the subject until they submit. Then they fill the 'ruling party's' ideas into their heads." "During the script, the mind hackers increase panic, using the beta wave enhancing entrainment to instill panic in the target, to hurry up, the end of the world is near, we're gonna kill you and your family, we are frying your brain, we placed bombs in your car, etc.. Panic is not only used to confuse the target, but to also make the target act irrationally and make bad decisions. People in panic mode can make decisions in greater haste and suggestibility is easier. In this case, the fairytale of the 'White Rabbit' entails its panic for no other reason than to make it to the mad-hatter's tea party. "Under this particular program, they often tell the subject that they've lost their minds and have planted chips in them. The Cheshire Cat says "Alice, you wouldn't be here, unless you were mad (insane)." As the experimentation and script progresses, so does the madness." "This prepares the target to chat with A.L.I.C.E. (Artificial Linguistic Internet Computer Entity) and T.A.M.I (Thought And Memory Interface) Chatterboxes, automated A.I. programs described in Chapter 3. The programs are imperfect , but the imperfections can be understood by the subject."

Loading comments...