Amazon Press

U.S. NATIONAL SECURITY AGENCY (NSA)

To: amazon@amazonco.com (Tannie Braziel)

From: Esur-4@aol.com (William Filer)

This is the technology that you are subjected to. I have worked with it for over 20 years. The abuses have become so great, it needs to be commercialized, and that is why I am disclosing it to you.

Title: U.S. National Security Agency (NSA)

Subject: NSA Subliminal Scripts

Author: William Filer

Created: Yr: 1998/Mo: 12/Dy: 30/Hr 13/Min 20

Manager: William J. Filer

Company: US National Security Agency

Category: National Security

Subliminally Implanted Post-Hypnotic Suggestions And Scripts Using Acoustically Delivered And Phonetically Accelerated Post-Hypnotic Commands Without Somnambulistic Preparation In The Subject For Intelligence And Counter-Intelligence Applications By The United States National Security Agency (NSA)

INTRODUCTION: The following information is an overview of one area of NSA Intelligence, Technology and Applications.

A Technology Title, Applications, Technology Description, case history summaries and the NSA's Behavioral Modification Procedure Outline written for the non-technical person is submitted for your review.

TECHNOLOGY TITLE: Subliminally Implanted Post-Hypnotic Suggestions And Scripts Using Acoustically Delivered And Phonetically Accelerated Post-Hypnotic Commands Without Somnambulistic Preparation In The Subject For Intelligence And Counter-Intelligence Application By The United States National Security Agency.

APPLICATIONS: INTELLIGENCE: Used on foreign and domestic diplomats, spies and citizens to gather intelligence; steal advanced technology for US Defense applications. Surveys of citizens' opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs.

Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.

COUNTER-INTELLIGENCE: Used on foreign and domestic diplomats, spies and citizens to identify intelligence operations, scope, participants, communication methods and weaknesses in individuals, systems, equipment or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in U.S. favor, behavioral modification of foreign spies to betray their loyalties, self-initiated executions (suicides).

BEHAVIORAL MODIFICATION AND ACCELERATED RESOCIALIZATION: This technology is used to develop and control spies, political candidates and other public figures through psychological intimidation, fear and extortion.

The NSA uses this technology to resocialize (brainwash) the U.S. civilian voting population into "Giving their lives to Christ" (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a "personal relationship with Jesus Christ" (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.

TECHNOLOGY OVERVIEW: In addition to the ability to see and hear what is going on inside people's homes, vehicles and businesses through the use of early microscopic digital and surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.

THOUGHT LABELS (RESPONSE LABELS): Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or "read minds" so to speak. Let's discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs or involuntary muscle spasms that are performed during subconscious interrogation "thought labels."

POST-HYPNOTIC DELIVERY METHOD: The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. "How can hypnosis be used?" you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The post-hypnotic script is made at normal conversational speed approximately 250 WM and a recorder/computer speeds up the message to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voices sound like the old American cartoon characters, "The Chipmunks". This is only slightly past doubling (2%) the delivery speed. At speeds as high as 1200 WPM, the voices would sound like a high-pitched chattering whine.

In the early years of this technology, the NSA originally recorded a spoken post-hypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, requied each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noice and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed, so that the resulting "sped-up" script was delivered at the correct speed. Now digital computers are used to append samples of optimized, ideal phonemes together to form words and the words are sped up to the correct delivery speed. Where dialects are present, a different set of base phonemes are used. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences. The empty space between words is minimied and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element's acoustic wave train, thus reducing the actual number of sine waves making up a word by 50% or more. This allows the messasge to be played at high speeds and not sound like recognizable accelerated speech.

The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many "subliminal tapes" on the market to program your subconscious mind. These tapes have their "messasges" recorded/hidden in the sounds of ocean waves, music or other sounds, but they are not sped-up to subconscious delivery speeds and are, therefore, not very effective. The subconscious mind can hear and discern the message even when someone else is speaking to you in normal conversation. Your conscious mind won't hear anything unless it is very quiet in the house. If you are very attentive, you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA's high-speed audio subliminal messasge. This modification of the phonetic elements, placed at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA's message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the post-hypnotic script with the conscious mind would be nearly impossible for the average citizen.

To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:

1. Professional state-of-the art technology recording equipment.

2. Digital acoustic wave editing equipment.

3. Advanced engineering knowledge of acoustic wave science.

4. Phonetics and linguistics expertise.

5. Hypnosis theory and scripting.

6. Ideal environmental conditions for recording.

7. NSA ignorance of the subject's intent and ability to capture a message.

This technology is the perfect intelligence tool. It is nearly impossible to detect or measure; difficult to trace back to the NSA. The symptoms that the NSA can "program" or inflict into the subject can cause fear they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself; the subject has no proof or evidence, only their perception, suffering and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.

USING THE POST-HYPNOTIC DELIVERY METHOD WITH THOUGHT LABELS: The NSA technique is simple. They transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car or office to you. The subliminal message delivered to you could be "Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear, you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disapppear after you scratch it twice." From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated it to him whether you have ever (1) cheated on your taxes; and (2) if the IRS could catch you in an audit. This is a avery over-simplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes, indeed, the NSA has exceeded the wildest expectations of the book "1984". As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic survellance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa and the free-world countries in Europe.

The NSA's goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counter-intelligence resources to identify the high frequency bursts of microwave transmission from the transreceivers. The system also have the ability to take a "voice print" from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transreceiver. If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic world-wide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voice print would be eventualy identified and the person's location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.

OTHER REFERENCE MATERIAL: Please refer to the book "Inside America's most Secret Agency, The Puzzle Palace" by James Bamford, published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA's history and the NSA's first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.

NSA CASE HISTORY EXAMPLE SUMMARIES: NSA Self-Initiated Execution (Suicide): Bamford's "The Puzzle Palace" documents one of the NSA's first self-initiated executions (suicide) with this "Thought Control" technology they developed. The NSA employee ran off NSA property saying demons were in his mind and he killed himself.

NSA Initiated Execution To Cover Up In The News: A University of California at Berkeley student that went into a bar on or around November 27, 1990, took hostages and insisted to the police that the CIA Director talked with him so that he could get relief from the suffering. The young man had sent letters to the President and the CIA, but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him. The San Jose police found copies of the letters written to the President referring to people that could "read minds" and that he has learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news, "The gunman was demanding to talk with the Director of the CIA" etc., disappeared quietly (suppressed) from later news accounts.

NSA Initiated Execution To Cover Up In Music: Curt Cobain of the musical group "Nirvana" was another victim of NSA brainwashing and was terminated by the NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the "friends" inside his head. Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.

NSA Initiated Executions In Overseas Defense Projects: Some years back, several employees of the United Kingdom's government working on a top secret radar project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality, other than working on a secured government project. They were not "staged" suicided (murders), because some of them happened behnd doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkeley student, the NSA Officer, Curt Cobain and thousands of others have experienced.

Distribution Of NSA Technology: Musical Distribution (security breach) Of NSA Technology: "Talking Heads", a music group poopular in the eighties, wrote a song explainig the scientific process of the NSA's brainwashing technology in a song called "Wild, Wild Life". the song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). they mentioned in the song that "they [NSA] talk so fast..." and that the music group had spent all their time and money, unsuccessfully, trying to find a place where the NSA would not be able to harass them. "Talking Heads" exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you for the brainwashing, and the scope of the electronic surveillance system.

NSA Counter-Intelligence Experiments: Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies ito assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself, but his desire for survival overpowered the NSA's behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn't figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep, so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counter-intelligence experiment completed with no liability or traceability to the NSA. Perhaps ten years ago, I read of several elderly people who died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post-hypnotic durability over time as the subject's health degraded. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for "God" to tell him what to do in the final hours of th siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, "God" spoke to them and said to commit suicide and they did, securing another one of the NSA's "great experiments" in mind control and social pathology. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multi-tier security system: Company Security, FBI, CIA, and at the top of the ladder watching the watchers, the NSA. I discussed the NSA's technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should be familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve natinal security. The cases of NSA activities go on and on. With access to the FBI's Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their "Thought Control" technology. Currently, the NSA has many subjects in the field (our society) that need only a series of "triggers" (carefully constructed post-hypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls these "Shooters on a Shelf". A recent example was Russell Eugene Weston, Jr. who went on a shooting spree at the Capital around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that "someone" (CIA, FBI, etc.) was communicating with him and that this communication abiity spanned across the USA, leadng hm to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. this was a man desperately trying to alleviate the suffering the NSA inflicted on him. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have "Friends" inside their heads also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.

NSA BEHAVIORAL MODIFICATION PROCEDURE: The following procedural outline documents typical techniques, processes, explanations, and definitions of the National SecurityAgency "Behavioral Modification Procedure" using Subliminal Implanted Post-Hypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject. In simpler terms, the subject is unknowingly given hypnosis while the subject is completel awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security agency. The behavior is usually extremely religious, is called "reborn" by the church, with the subject's life-long goal of "a personal relationship with Jesus Christ".

Abstract: The NSA'S behavioral modification process starts with identification and qualification of the subject. Subjects are chosen by the NSA based on the subject's net present value to the agent, in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject's post-hypnotic suggestibility index, the subject's intelligence and reasoning ability, moral and superstitious beliefs, and the subject's social status and the weakness of the subject's primary support groups (family). After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing post-hypnotic suggestions intended to break down the subject's will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups, causing the subject to experience depression, apathy, and ultimately, social and financial failure. After awhile, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a cult-like church with doctrines centered around the Bible; other social groups are also used by the NSA. The NSA prefers Christian churches because the doctrines allow "God" or "Jesus" to speak directly to the subject and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God, thereby masking the NSA's technology and processes. When the NSA uses other relationships in which the subject experiences a religious awakening and "gives their lives to Christ", the NSA achieves total control of the subject. the subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as "God" and "Jesus" "work" in their life. Soon, the subject has complete loyalty to Jesus (aka NSA) and will do anything on command from Jesus (NSA). The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA's electronic surveillance system captures and sorts the prayers by "Keywords". The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject according to "god's will". If the subject resists the NSA's instructions, additional punishments are inflicted on the subject. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued and reported on through prayer by other "Christians" to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject's problems to the NSA as they have been trained themselves (similar to the Nazi Gestapo of World War II and other Communist approaches). A subject that has successfully completed the NSA's behavioral modificationprogram lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subjects' lives are relatively unproductive, because their focus is on their life after death and not what they accomplish while they are alive. They avoid "worldly activities", and usually are confused and disjointd in rational thoughts and concepts. For instance, they don't believe in anything that is not in the Bible, i.e., dinosaurs, evolution, space travel, even though they ride on airplanes and watch television, both of which are not referenced in the Bible.

DEFINITIIONS AND ACRONYMS: Age Regression: The act of bringing back past memories in a subject through the use of hypnosis. The memories can be very vivid and real in the mind of the subject.

Hypnoamnesia: Temporary Loss Of Memory Due To A Post-Hypnotic Suggestion. NSA: National Security Agency, Fort Mead, Maryland, ODO: On-Duty Officer, Or Officer-On-Duty. Post-Hypnotic Command: Same as Post-Hypnotic Suggestion. This term "Command" is more commonly used when the hypnosis is forcibly given to the subject and when the subject's will has been broken down through the use of REM Sleep Deprivation and Suggestibility Index, increasing drugs like CNE and Cardiovascular Stimulants. The exposure to extreme REM Deprivation and select chemical stimulants cause the subject to have no ability to resist the "Suggestion" any longer, thereby making it a "Command".

Post-Hypnotic Suggestion: A subconcious suggestion or command resident and potentially active in the subject following a hypnotic trance or eriod of direct access to the subconscious mind.

Post-Hypnotic Suggestibility Index: An index or rating of a subject's susceptibility and sensitivity to hypnosis.

REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived of REM Sleep has multiple symptoms, i.e., reduced protein synthesis, black circles around eyes, loss of short-term memory, confusion, impulsiveness, anger, frustation, dimished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long-term REM Deprivation results in death.

Script: A carefuly constructed series of words arranged in the form of a post-hypnotic suggestion. The script will generally consist of four separate parts: (1) an identifier (subject's name, description or other identifying factor); (2) trigger activation condition or conditions (when, what or how the suggestion will trigger); (3) the content (what the trigger will precipitate in the perception of the subject); and (4) a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to "strengthen" or reinforce the central Post-Hypnotic Command.

Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and is a prerequisite to traditional hypnosis.

Subliminal Implant: A post-hypnotic suggestion successfully delivered to the subject's subconscious mind.

Tranceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordnates collected at the subject's site to NSA satellites that in turn forward it to the NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to subject's site in the form of a subliminal post-hypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes and street corners.

BEHAVIORAL MODIFICATION PROCESS: Triggering Techniques: The NSA minimizes security risks by using multiple post-hypnotic delivery techniques for applying negative reinforcement into the subject the patterns fall into three major categories: real-time deliveries, prescheduled deliveries via a preprogrammed computer, and post-hypnotic or "conditional" deliveries. The NSA does not use real-time transmitted post-hypnotic commands exclusively, because the subject might recognize when the NSA was not actively watching, causing a security concern and it would be cost prohibitive to babysit the subject 24 hours a day. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real-time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time through continuous pressure.

Real-Time Subconscious Implant Delivery: Real-time means that the NSA ODO is transmitting the post-hypnotic command script to the subject and observing the subject's response. This technique is required for subliiminal interrogations. All NSA standard post-hypnotic command scripts can be delivered real-time. This face of delivery can precipitate the perception of a "voice" heard in the mind of a subject to give them information (true or false) or orders, depending on the purpose of the NSA's activities.

Pre-Scheduled Subconscious Implant Delivery: The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script's transmission range can be limited to a single building, a city, or a large geographical area (i.e., North America or Europe). By having pre-scheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can't be associated with a commonly recurring situation like event-triggered scripts precipitate.

Event-Triggered (Conditional) Implant Delivery: Post-hypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a pre-determined desired behavior and inflicting delusions. This type of post-hypnotic command is the one most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavior modification). There is extensive information on the Internet and in college libraries about this form of post-hypnotic command delivery and how to"script" and use them. The NSA can reinforce a pre-determined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is when the NSA wants to isolate the subject from the company of a specific person, place or thing. The subject will be implanted with a feeling of increased anxiety, hostility, tesion, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place or thing, another post-hypnotic implant is triggered that rewards the subject's behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject's mind. Example: This script will always cause girl or boy not to sleep with the opposite sex: "You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy) or (girl) friend's house; and you will feel a deep peace when you leave their house to go back home." These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time. It should be noted that the NSA precisely tailors this type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This post-hypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that thediscomfort is naturally occurring and that is is the subject's decision uninfluenced by anyone else that the subject should avoid the person, place or thing. This subconscious implant can be combined with other implants like a post-hypnotic-triggered thought to enhance the subject's decision toward the situation. For example, the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another post-hypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives, they are actualy losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.

Stage 1 (Prescreen Evaluation): The subject's Post-Hypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject's speed is timed to determine how quickly they can overcome or not overcome the hypnotic suggestion "You will not be able to remember the name of '_____________' no matter how hard you try." Other post-hypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a post-hypnotic suggestion that they cannot move no matter how hard they try. In summary, a post-hypnotic suggestion is given to the subject and the subject's ability to overcome it is evaluated. A full study of the subject's religiion, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are Open-ended Questions (similar to multiple choice with response labels pre-assigned to each choice) or "Reject if Disagreeable" (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject's overall social status, abilities, attitudes, and communication skills with primary support groups and friends. Scientific understanding and practical applications in the fields of psychology, hypnosis, pharmacology, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file. The NSA technology affords powerful control over the subject, the subject's environment, and the subject's ability to plan and implement a discolsure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject's physical and mental condition is depleted. The subject's ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject's testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.

Stage 2 (Standard Process): This stage is where most subjects are behaviorally modified to serve and follow "God" (aka NSA management of the subject's civil rights). If the subject attempts religion and direction at this stage the NSA reinforces the subject's relationship wth Jesus and closes the file. this shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.

Coincidence: Coincidence is used to create the perception in the subject that supernatral events are beginning in the subject's life. A combination of post-hypnotic commands and pre-information awarded to the subject pror to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that "God" or some other supernatural being has taken interest in their life. The following is one typical technique used by the NSA: NSA Intelligence gathers information regarding the topic of the sermon in the subject's church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a post-hypnotic command that triggers the subject's mind into concern and contemplation about the sermon's topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject, which adds to "God's" mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject's relataive has been injured or killed. The subject is given a post-hypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.

REM Sleep Deprivation: The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the suject's ability to heal after physical damage or after periods of extensive exercise. The result is that the subject's general health degrades as does social bonds and work/school performance. The NSA performs control of REM Sleep through various methods. Post-hypnotic implants can be implanted that place a subject in a light sleep (post-hypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be discussed later). Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical. Dark rings surrounding the eyes is evident and the darkened areas around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation makes it more difficult for the subject to identify the REM deprivation problem. When the REM deprivation onslaught is gradual and accompanied by a post-hypnotic command that the subject "will feel energetic and rested", the subject will not recognize the REM deprivation. Additional post-hypnotic commands can be implanted that will make it difficult for the subject to "see or perceive" the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.

Shame Factor Enhancement: Various post-hypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the post-hypnotic scripts is constructed to cause the subject to perform embarassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarassments provide a means to blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject's life.

Religious Relevance And Convictions: The NSA typically implants post-hypnotic suggestions that ae clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the vaidity of the "Word of God". When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God's presence and force. "Thou shalt not disobey God."

Paranoia: Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject's distrust of other people including the subject's primary group that could provide positive support during this time of distress in the subject's life. Paranoia is often recognized and discounted as a character fault by most people in American society and therefore discredits the subject's testimony even further. Uninformed, but well wishing people, including friends, may recommend that the subject pursue counseling. this negative feedback can make the subject fear that people will believe the subject is crazy. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. a misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a "schizophrenia" label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot alalow the subject to share information that could be compiled and used to expose the NSA system.

Stage 3 (Extreme Process): This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world demons, ghosts, god, spiritual entities, etc. and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps: REM deprivation, break down self-esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.

Increasing Dependence On Drugs And Alcohol: As the REM deprivation increases, the subject must depend on Central Nervous System (CNS) stimulants to compensate for degradation of productivity at work, school, and in inter-personal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject's index of suggestibility. Or in other words, the post-hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with resisting the newly introduced post-hypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to get the subject set up for a conviction to get assurance that the subject loses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time, thereby further degrading and isolating the subject. In summary, the NSA benefits from the subject responding to the REM deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted post-hypnotic commands and it gives them a reason for shame that will be used against the subject later to justify the punishment from "God". It should be noted that the subject is not really guilty of anything, except being a victm that was manipulated in a carefully controlled scientific behavior modification process.

Poor Nutrition: The poor nutrition reduces the energy the subject has and serves later as another justification of God's punishment. The subject will be taught later that "the body is the temple" and that to abuse it is to violate God's will.

Apathy: After the subject's self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of "not persevering through faith" which is used on the subject later to increase a feeling of guilt.

Depression: Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing post-hypnotic suggestions inflicted over long periods of time) is not treated or corrected.

Insecurity: The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can't be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA, resulting in the NSA gaining more power over the subject's life.

Journals And Diaries: Most of the subjects are directed to keep a "Journal" or diary by the NSA so that the subject can record and review feelings, events, observations, and "God's directions" that would normally be unavailable due to short term memory loss during extended periods of REM deprivation. The NSA uses the subject's Journals in a variety of ways.

Degrading Spelling And Grammatical Performances: Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress have very poor grammar, spelling, and short attention spans.

Slowed Speech: Subjects experience slower speech and have a greater time articulating concise points as a result of the REM deprivation and other pereformance degrading post-hypnotic commands. Very slight alcohol consumption can exaggerate the damage of REM deprivation and precipitate slurred speech.

Confusion: Confusion results from three primary sources: REM deprivation, specific post-hypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject's life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do, and is less likely to recognize when they ave made mistakes. All of these symptoms assist the NSA's objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA's security risk.

Poor Concentraion: Difficulty in concentrating impairs the subject's productivity and restrains the subject from makng self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without "God", thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependent on the will of "God".

Loose Association And Personality Disorders: The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in group conversation. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.

Anger: The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with post-hypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the subject is encouraged to commit acts of violence with spouses, friends, or employeres resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent U.S. Postal Workers who work withn the Postal Service. This is one of the "viale communication intercept" channels the NSA is directed to monitor. The routes of suspect mail and the Postal Worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses him/her or subjects the Postal Worker to behavioral modification. Other examples of a typical NSA project include the University of California at Berkeley student that went into a diner on November 29, 1999 and insisted that the director of the CIA speak with him so that he could get relief from the suffering. The young man had sent letters to the President and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a diner customer, a SWAT team fatally shot him. The San Jose police found copies of the letters written to the President referring to people that could "read minds" and that he had learned how they do it. The NSA had no alternative but to torture him to death to assure their security.

Delusions: Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the subject developing conspiracy theories of fellow employees and friends, belief that Angels or Demons are communicating or visiting them, beliefs in supernatural events, etc.

Audio Hallucinations: Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.

Voices In the Subject's Mind: The voices in the subject's mind ae achieved in a variety of ways using real-time and prescheduled post-hypnotic suggestion deliveries, and Noun Substitution implant techniques.

Noun Substitution Post-Hypnotic Implant: The subject can have a post-hypnotic suggestion implanted that changes the form of pronouns in the subject's internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is: the subject thinks, "I should go to church today." With the noun substitution post-hypnotic suggestion, the subject experiences the following internal thought: "You should go to church today." Notice that by implanting the post-hypnotic command into the subject's subsconscious mind to think the pronoun "You" instead of "I" the subject will perceive that they're being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject's perception of threat, fear, and therefore paranoia. It can be used with other post-hypnotic suggestion implants that will give the subject the perception of either a "good" or "evil" voice or spirit is directing him/her. This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject's every thought. It provides a convincing proof that "God knows every thought of his children". Subjects that don't have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic.

Tinnitus (Ear Ringing): Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis, and is produced by a post-hypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.

Complete Quiet Silence: Used by the NSA as a positive reinforcement for two general reasons: the subject has the tinnitus removed to indicate that the subject has "The Lord's Peace Restored", and secondly, the subject has achieved a milestone toward being released by God (the NSA).

Quiet Wind: The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent examaple of this hallucination combined with the fear that accompanies it is contained in Phil Collins' lyrics of a song that has the chorus "I can get so scared. Listen to the wind."

Visual Hallucinations: Visual hallucinations are usually implanted in the waking moments when a subject is coming out of sleep or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc. The television show "Sightings" has had numerous reports of people seeing "Aliens" at waking moments. These types of news accounts create confusion in U.S. society and serve to keep people searching for the wrong phenomenon thus keeping the NSA's technology secure (disinformation).