Another interesting video from Amplex…
Illuminati Device So Powerful it Can Devastate Continents
Please follow and like us:
Incredible information on the biggest spy and control program in the history of the world! It’s called Talpiot and it’s being completely hidden by the Fake News and fake alternative news too! The Talpiot program was created way back in the 1980s to totally dominate all aspects of society by taking over all high technology for Israel! Israel has built the biggest spy machine in human history and used it to steal US technology that it uses to dominate industries, create massive new companies and embed spyware and control into every high technology on the planet!
I had no idea it was this bad but Israel has taken over everything! We give them billions each year and in return they take our technology, sell it to Russia and others and then totally dominate us with it! Want to find out who is real and fake in alternative media? Find out who is covering Talpiot and who hides it!
Do a search yourself on Alex Jones using the command on Google: site:infowars.com talpiot and see what comes up! You’ll see one listing and it was from a member of Planet Infowars and it was about a tomb, not the Israeli Talpiot program for dominating everything! If you think it’s wrong for Alex Jones with his millions and over 100 employees to be censoring Talpiot DEMAND he report on it by emailing him at firstname.lastname@example.org and watch him and his staff ignore you! You’re only good for milking for money baby! You don’t deserve an answer from the tip of the spear or his staff! Watch and see, I dare you! Demand answers for all lies and censorship and we can win! If you can never get a response from somebody even though they have over 100 employees, what does that tell you? They don’t CARE about you and certainly don’t care about winning! You are a resource and that’s it! Nobody runs and hides when they are REAL!
If you don’t realize there is much evil going on in Israel then you don’t read your bible! Where does the antichrist rule from? Jerusalem! He’s probably there right now building the Talpiot system of total control! I’m not saying all people of Israel are evil but the evil Rothschilds setup the modern state of Israel and they do much evil. When Israel does evil it must called out just as when the US bombs Syria on a lie. Nobody gets a free pass for doing evil. When Israelis shoot Palestinians in the head who are not holding guns is this what Jesus would want? If you think so then you should go work for the antichrist! You know where he’ll be building his base of operation!
More great information can be found in the link below.
To Understand Globalist Zionist Power And How It Rules From Israel, You Must Understand These Words – “THE TALPIOT PROGRAM” and “THE TECHNION”
Founded in Israel five years ago by entrepreneurs Omri Lavie and Shalev Hulio, NSO makes software that secretly targets a user’s mobile phone and gathers information, including text messages, photos and internet browning data.
Please follow and like us:
Unfortunately, science has still not been able to figure out how to levitate larger heavier objects. Yet, history suggests the Ancient Civilizations might have already cracked this secret in their building of the pyramids and other megalithic monuments.
Did they have some advanced form of sound levitation to move thousand ton stones—a task that present day builders admit would be difficult even with the use of modern cranes? In many parts of the world there are enormous monoliths that even in this brilliant era of technology no advanced crane could possible raise.
Our modern society is proud of its technological and scientific achievements, but we are forced to admit that our ancestors possessed unique knowledge we still cannot gain access to. This brings us to the intriguing question: “Did ancients master levitation?”
Please follow and like us:
Netanyahu can get away with murder because Israel controls the worlds high technology sector – over and above even the US. That “American” you see “controlling” something?
He or she is an American Jew or Zionist, dual national Israeli American citizen. Israel rules. Until we target specifically this control of the high technology sector and specifically The Talpiot Program, we will all continue to wonder how Israel gets away with all it does. It is a racist state of the most odious kind. But who will stand up to them?
From medical nano technology to cyber security to private hacking companies to military technology to police databases, banking, finance and medical – Israel runs them all. This is Israel’s false flag nuke.
Please follow and like us:
Chinese police have arrested a man using facial recognition, after high-tech cameras identified an alleged criminal among fans at a 60,000-strong pop concert.
The suspect, known only by his surname Ao, had been in attendance at a concert by Hong Kong singer Jacky Cheung, in Nanchang, Jiangxi province, southwest China, last week.
Despite being among thousands of Cheung fans, the system flagged Ao up to security thanks to facial recognition cameras and police arrested him at the show.
Arrested: Suspect, known only by his surname Mr Ao, left, was identified among 60,000 people attending a concert by Hong Kong singer Jacky Cheung, in Nanchang, Jiangxi province
The 31-year-old from Zhangshu, Jiangxi province, had been on a wanted list for an ‘economic dispute’ in the neighbouring Guangxi province.
Video footage shows the moment the shocked suspect is arrested by several police officers, and he can be heard saying: ‘My friends and I bought the concert ticket and I went with my wife.
‘If I knew of it [facial recognition], I wouldn’t go.’
Li Jin, a local police officer told ChinaDaily: ‘The concert attracted more than 60,000 visitors, so we paid a lot of attention to its security,’ said Li.
‘We set up several cameras at the ticket entrance, which was equipped with facial recognition technology.’
Caught: Video footage shows the moment Ao is arrested at the concert
Famous face: The 31-year-old from Zhangshu, Jiangxi province, had been on a wanted list for an ‘economic dispute’
Party like it’s 1984: A police officer in in China’s central Henan province is seen wearing a pair of smartglasses with a facial recognition system this month
Using facial recognition technology to monitor the public is already wide-spread practice in China.
Around 40 local governments use its CCTV recognition to monitor individuals on government blacklists, particularly during festivals and other public events as well as in airports.
Last month, some police began to don high-tech sunglasses that can spot suspects in crowded areas – the newest use of facial recognition technology that has drawn concerns among human rights groups.
The glasses send people’s images to a database that checks their personal information.
It is part of China’s efforts to build a digital surveillance system able to use a variety of biometric data – from photos and iris scans to fingerprints – to keep close tabs on the movements of the entire population.
Please follow and like us:
Many people may find themselves in during some future war or civil disturbance. That situation is you coming up against superior technology that you have no defense against. So, how do you deal with this threat?
Every weapons system is designed to operate in a certain environment and do a certain task within that environment. Because of that, every weapons system has weak points that it cannot hide from once you change that environment.
In WWII Sherman tanks were outmatched by German Tiger tanks. They were able to overcome this disadvantage by superior numbers and by putting the Tigers in situations that gave the Sherman the advantage. The Shermans were smaller and more maneuverable so they would try to engage tigers in dense areas where they could not maneuver and turn their guns because of obstacles. This allowed the Shermans to get behind the tigers and shoot them in their only weak point, their ass. The Tiger might get three Shermans but there was usually a fourth one that managed to get the Tiger.
When radar began to be used in WWII the RAF soon came up against German flak batteries that had radar. To get past this threat they came up with a simple solution. They deployed strips of aluminum foil, code named windows, that confused the radars and allowed the planes to get through. The Germans soon figured out how to deal with this but for a time it made their systems almost useless.
When you are faced with superior weapons you need to do two things.
Determine what its limitations are.
Determine how to attack it in that weak spot.
Those two things are the basis of counter weapons development for centuries. Not long after we got the tank we then developed anti-tank weapons. It’s the same with any new weapons system. Sometimes you need to develop your own superior technology to use against it and sometimes you need to resort to caveman technology.
Killer robots may come after us one day and be able to outrun us but how well do they rappel down a mountain or swim? They may be impervious to rifle bullets but what happens when they are hit by a 6 lb. steel ball from a cannon? A solid object traveling at high speed can do a lot of damage when it hits something. Just look at the DUC rounds the M1 Abrams fires or when a large meteor hits Earth. How do robots handle the bumper of a large truck traveling at high speeds? I have two words for the backyard inventors out there, rail gun.
New optical systems may be able to scan our retinas a mile away and tell who we are but how well do those optical systems work in fog, smoke or covered with mud or paint?
Those new MRAPs may be hard but how well do they operate in woods that have no roads? How well can they drive when all of the windows are covered with paint or other materials that blind them? How fast can they go when they are laying on their side or sitting in three feet of mud? The people in that vehicle must get in at some point and get out at some time. That is a weak point. That vehicle must be refueled at some time. That is a weak point. Are you getting the picture?
How well does any weapons system work when it is hosed down with fuel and ignited? How well does it work without fuel? How well does it work without ammo? How well does it work without repair parts or human operators? How well does it work when it cannot “see”? How well can it operate when it has no traction? How well can it operate in bad weather? What does it take to disable its electronics? What does it take to put a hole in it? What happens to an attack helicopter when a steel cable is suddenly propelled up into its rotors? How well can the operators function when they have no air to breathe?
Every system has a certain environment it works well in. Your job is to get it into a situation that is outside of its operating box so you have the advantage. That is the advantage that humans have over technology. We have the ability to adapt to new situations and learn new tricks. Most weapons systems cannot do that. Even if they can adapt they do not have our imagination. How many weapons systems would think of giving a group of enemy fighters diarrhea to reduce their combat effectiveness?
Our ability to think outside of the box is our greatest advantage. That is what we need to depend on in the days to come. Having weapon systems to fight back with will be important but the most destructive thing we have is our mind. Remember, it was a human that made that new weapon and it will be a human that designs the countermeasure to it.
Please follow and like us:
North Korea’s Foreign Ministry says Pyongyang’s nuclear capabilities have come close to reaching a state of equilibrium with the United States. Speaking to Sputnik, Russian observers said that although that may be somewhat of an overstatement, Pyongyang is right to claim that it has the ability to “strike at the United States.”
Speaking at a conference on nuclear non-proliferation in Moscow on Friday, Choe Son-hui, director of the North Korean Foreign Ministry’s North American Department, said that North Korea was coming close to matching the US nuclear potential.
“Our ultimate goal is to achieve a balance with the United States, so they do not dare talk about any military actions against the DPRK,” the diplomat noted. Choe added that nuclear weapons capability is a matter of “life and death” for Pyongyang, and that the country has no plans to negotiate with Washington on its nuclear status.
“The current situation strengthens us in our understanding that we need nuclear weapons in order to repel a possible attack,” she stressed, adding that North Korea lives under the “constant nuclear threat from the US.” At the same time, the US is the only country being actively targeted by North Korea’s nuclear capabilities, the diplomat said.Commenting on Cho’s remarks, Evgeny Kim, a senior researcher at the Russian Academy of Sciences’ Center for Korean Studies, told Sputnik that while Pyongyang may be exaggerating with its claim that it is close to reaching parity with US military strength, it can deal the superpower serious damage in the event of war.
“Of course, there is some exaggeration here, because North Korea cannot achieve parity with the US in nuclear-armed missile technology, not now or in the next decade,” Kim said. “First, they do not have the kind of delivery means that the US does…Second, they do not have as many nuclear warheads as the US. North Korea has tested nuclear warheads, but isn’t mass producing them. They will probably be able to start mass production sometime in the next two or three years.”
“But they are correct in the sense that they have capabilities that could cause some damage to US military power,” Kim added. “For example, the USS Ronald Reagan-led carrier group is located in the Sea of Japan. North Korea could, using all the capabilities of its missile technology, destroy this carrier. In this sense, Pyongyang is right to say that they are capable of inflicting a blow against the United States.”
The Navy’s forward-deployed aircraft carrier USS Ronald Reagan and the forward-deployed Arleigh Burke-class destroyer USS Stethem steam alongside ships from the Republic of Korea Navy in the waters east of the Korean Peninsula on October 18, 2017
The confrontation between Pyongyang and Washington intensified again this week amid joint US-South Korean drills east of the Korean peninsula. Forty US and South Korean warships, including the USS Ronald Reagan super carrier, along with US Air Force B1-B strategic bombers, were deployed across an area stretching from the Yellow Sea to the Sea of Japan.
This week, CIA Director Mike Pompeo ‘joked’ about North Korean leader Kim Jong-un’s possible death or disappearance, and added that Washington must be prepared for the possibility that North Korea is just some “months” away from achieving the technical capabilities to launch a nuclear attack against US territory.
“We all want to resolve this,” the CIA chief said, but added that Washington was prepared to use force, if necessary, to ensure that Pyongyang “doesn’t have the capacity to hold America at risk.”
North Korean leader Kim Jong Un (not pictured) guides the launch of a Hwasong-12 missile in this undated photo released by North Korea’s Korean Central News Agency (KCNA) on September 16, 2017
Asked to comment on what Pompeo’s cryptic comments may mean, and whether Moscow and Beijing should see them as an indication of an imminent US attack against Pyongyang, political analyst and Asia-Pacific expert Vladimir Terekhov said that the US rhetoric is part of Washington’s strategy to apply pressure against China.
“I don’t think anything serious will happen before President Trump’s November 8 visit to Beijing,” the observer said. “But the way, [Pompeo’s] statement itself is a kind of preparation for this visit as an element of pressure against China. Since it’s clear that the main goal of all this American rhetoric, and their actions in the Korean peninsula are directed not against North Korea itself, but against Washington’s main geopolitical adversary – China.”
Terekhov warned however that it is impossible to exclude more a pessimistic scenario, in which the United States might seek to resort to the use of force against Pyongyang. “It’s entirely possible in a situation where things worsen and no progress is made, from the American point of view, in solving the Korean issue, they will resort to the force of arms. Nothing can be excluded,” he stressed.Russia and China have recommended that Pyongyang declare a moratorium on new nuclear tests and missile launches, and that Seoul and Washington should refrain from any more drills in the region. Both sides have so far ignored the recommendations and continued to exchange hostile rhetoric.
At his Valdai speech earlier this week, Russian President Vladimir Putin warned the international community against driving Pyongyang into a corner, emphasizing that North Korea is a sovereign state and that “any contradictions must be resolved in a civilized manner.”
Please follow and like us:
A great extreme technology video of the Russian Military Pantsir-S1 air defense system. SUPPORT SOUTH FRONT: PayPal: email@example.com, http://southfront.org/donate/ or via: https://www.patreon.com/southfront Pantsir-S1 (Russian: Панцирь-С1, NATO reporting name SA-22 Greyhound) is a combined short to medium range surface-to-air missile and anti-aircraft artillery weapon system produced by KBP of Tula, Russia.
The system is a further development of 2K22 Tunguska (NATO reporting name: SA-19/SA-N-11) and represents the latest air defence technology by using phased array radars for both target acquisition and tracking. The Pantsir-S1 was designed to provide point air defence of military/industrial/administrative installations against aircraft, helicopters, precision munitions, cruise missiles and UAVs and to provide additional protection to air defence units from enemy air attacks employing precision munitions especially at the low to extremely low ranges.
The first finished version was completed in 1995 with the 1L36 radar, later was designed another. It is a short to medium range ground based air defence system, wheeled, tracked or stationary with two to three operators. Its air defense consists of automatic anti-aircraft guns and surface-to-air missiles with radar or optical target-tracking and radio-command guidance.
Its purpose is the protection of civil and military point and area targets, for motorised or mechanised troops up to regimental size or as defensive asset of higher ranking air defence systems like S-300/S-400. The system has capability for anti-munitions missions. It can hit targets on the waterline/above-water. It can operate in a fully automatic mode. It has the ability to work in a completely passive mode.
The probability of hitting a target for 1 rocket is not less than 0.7 with a reaction time of 4–6 seconds.It can fire missiles and gun armament while in motion. For its main radar station, early detection in height may be between 0-60° or 26-82° depending on the mode. The system has claimed significant advantages over other systems, such as Crotale NG (France), Roland-3 (France + USA), Rapier 2000 (UK), SeaRAM (Germany + USA).
This is not confirmed by comparative testing, but clearly follows from declared limit of possibilities of systems Since 2013, there is a variant with two radar stations for early detection * standing back to back *. The system has a modular structure which enables a fast and easy replacement of any part.  After receiving target coordinates (from any source) it may defeat the target (using all the radar except the early detection radar) within a range from -5 to +85 (82) degrees (vertical). The interval between missile launches is 1-1.5 seconds (a world record for analogue systems) Armament Missile 57E6
Type Surface-to-air missile Place of origin Russia Service history In service 2012–present Used by See list of operators Production history Designer KBP Instrument Design Bureau Designed 1994 Produced 2008 Variants 57E6, 57E6-E, 57E6Y Specifications (57E6-E) Weight 90 kg (200 lb) and 74 kg (163 lb) without container packing and storage of missiles Length 3.2 m Diameter 0.17 m Warhead frag-HE and multiple continuous rod
Warhead weight 20 kg Detonation mechanism Contact and proximity Propellant Solid-fuel rocket Operational range 20 kilometres (12 mi) Flight altitude 15 kilometres (49,000 ft) Boost time 2 seconds Speed Start 1,300 m/s (Mach 3.8), 780 m/s (Mach 2.3) to 18 km (11 mi) distance Pantsir-S1 carries up to twelve export designated 57E6 or 57E6-E two-stage solid fuel radio-command-guided surface-to-air missiles in sealed ready-to-launch containers.
Missiles are arranged into two six-tube groups on the turret. The missile has a bicalibre body in tandem configuration. The first stage is a booster, providing rapid acceleration within the first 2 seconds of flight, after which it is separated from the sustainer-stage.
The sustainer is the highly agile part of the missile and contains the high explosive multiple continuous rod and fragmentation warhead, contact and proximity fuses as also radio transponder and laser responder to be localised for guidance.
The missile is not fitted with seeker to keep target engagement costs low. Instead high-precision target and missile tracking is provided via the system’s multiband sensor system and guidance data is submitted via radio link for up to four missiles in flight.
Missiles can be fired at up to four targets, but more often in salvos of two missiles at one target. They are believed to have a hit probability of 70–95% and have a 15-year storage lifetime in its sealed containers. Pantsir-S1 combat vehicles can fire missiles on the move. Warhead weight 20 kg (44 lb)(5.5 kg (12 lb) explosive + 2,000 14.5 g fragments and rods).
Please follow and like us:
Total Individual Control Technology is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs(Targeted Individuals). Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of the technology via gangstalking.
What Total Individual Control Technology is Capable Of
According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate, and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment upon poor, homeless and weak people who have little or no chance of fighting back.
In interviews or presentations such as the below videos, Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.
Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:
“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”
“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”
“This technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is seeing and hear what target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”
“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”
“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”
“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”
“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moments notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”
“This technology can also be used to read the thoughts of the target in real time … they can read your thoughts verbatim as they occur within your own mind.”
“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”
Total Individual Control Technology Attacks Specific Individuals Based on DNA Resonance
As I have discussed in previous articles on mind control such as “They” Can’t Read Your Thoughts … Right? the state of current mind control technology is beyond most people’s comprehension and the idea of what is possible. Yet, we have had enough out-of-the-closet whistleblowers and leaked or declassified documents to give us a clear idea of the scary extent to which we can be psychically attacked. Whistleblowers such as Dr. Robert Duncan have lectured at length about the capabilities of V2K technology, which is defined as an EM frequency technology that utilizes RF (Radio Frequency) signals to induce sound within the cranial cavity of the target. V2K literally pipes thoughts directly into people’s heads without them knowing it.
Kofron bases his information on his own experience as an insider in this field, and also as a recent victim of V2K himself. He was attacked once he went public. He claims he has been assaulted with a beta version which is especially nasty, piping thoughts into his head such as:
“Everyone’s against you”
“Please be quiet or we’re going to kill you”
“Don’t work again or we’re going to kill you”
“You’re the lab rat now motherfucker”
Kofron claims the Total Individual Control Technology attacks are attempting to turn him against his former work colleagues, friends and family. However, since he was trained in this area, he knows that the voices are technological and can defend himself against the manipulations once he hears them.
Kofron echoes exactly what Duncan has warned about: individual-specific attacks. Duncan states that every person has a “unique resonance signature”, and in almost exactly the same words, Kofron states that:
“… the DNA of the individual is used to determine the resonant frequency of the DNA itself, the resonant frequency is then used to fine tune the technology … to tune it perfectly to the resonant frequency of the targeted individual’s DNA.”
The Drive to Create a Worldwide DNA Database
This leads into another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning. It is no coincidence that Amazon and Google (who are ultimately controlled by the same force as David Icke suggests) are racing each other, along with Microsoft, IBM and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.
Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.
Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!
Social Engineering with Total Individual Control Technology
Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets. On his website GangstalkerWars.com, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.
In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low-level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.
The Rising Danger of the Private Security Firm Industry in America
Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I stated in my previous articles, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top secret information. These security firms, like the MIC itself, appear to operate above and outside the law.
The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.
The Human Rights Loophole: False Diagnoses
Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses. Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers since his claims and testimonies will be dismissed as the ravings of a madman. This is a similar tactic to what is used with other victims of mind control.
The Infrastructure Underlying Total Individual Control Technology
The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar, and cell phone towers. Often, the antennae are camouflaged (hidden behind walls). Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.
Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power
In concluding, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.
Hopefully, this testimony can serve as a wakeup call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter. The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.
Please follow and like us: