He was just trying to help all us victims of surveillance and even worse, electronic warfare assault, assassinations, counter surveillance provocation stalking, etc.
There are people being spied on just to kill them and control them like me.
’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.
Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.
Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.Obviously spoofing email and other identities on internet forums can be used in this manner too.
Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.
However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.It is used in war games to determine how to control your enemies and targets.Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.
One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.