SlideShare a Scribd company logo
1 of 6
IT ACTUALLY HAPPENED...AND IT STILL IS
Dissociation is the bread and butter of the initial research into human behavior
modification, brainwashing and mind control. The Ellipsis Manual is a partially-
controlled manual and will be available for pre-release before Christmas 2014.
(Background checks required)
Dissociation simply means the detachment or separation from something. It's the
opposite of association. In psychology, it can actually mean a range of things.
All of us dissociate. We get completely tuned in to a conversation we like,
become unaware of our surroundings during interesting movies and are able to
even drive a car without actually being 'aware' of what is going on around us.
When we disconnect from the moment, be it from boredom or severe trauma, our
mind splits. One part of the mind remains there as a 'data collector' and the
other is 'shut down'. Dissociation is a survival mechanism that allows the
compartmentalization of traumatic information. When children are abused for
example, the fight or flight response is not a viable option at their age. The
only viable option for a child's subconscious is to use the 'flight' instinct
and retreat into the recesses of the mind. In cases of post-traumatic stress
disorder (PTSD), the memories and content of the experience can continually stay
in the background of the mind and play in 'loop fashion' in the unconscious.
Experiences can range from a feeling of disconnectedness from the self to
completely independent 'personalities' forming within a person. The SEVERITY of
the dissociation is what makes the difference.
How the brain adapts to environments
In the case of post-traumatic stress disorder, the mind of a victim becomes
disconnected from reality for a time as a result of battlefield or trauma
exposure and emotional disconnection. The brain continuously adapts in order to
protect the psyche (self) from emotional harm. This is one of the main reasons
that people have 'blackout's during car accidents, torture, rape and childhood
abuse. Our minds continuously search for a 'way out' that can repress or
eliminate the experience from having happened to US.
The CIA and mind control
There are more conspiracy theories about the CIA and mind control than almost
anything else. The CIA released thousands of documents under the Freedom of
Information Act and it has caused many people to perform extensive investigative
research and spawned countless conspiracy theories. The CIA did, in fact, have
fully functional programs to developing techniques and methods for mind control.
While the programs have different names, the name 'MK ULTRA' is the most
commonly referred to. This project, and its subprojects involved torture, drugs,
hypnosis, brainwashing and many other related practices.
While the techniques you will learn in this chapter will absolutely allow you to
create an alter-personality in a subject, they are all very elementary. There
are absolute ways of creating the ‘Manchurian Candidate‘-style of mental
programming. You will be able to physically create another identity in a
subject‘s mind after your training in this chapter. This is only the beginning
of what makes this course a legitimate WEAPON.
Dissociation is the most common technique the CIA doctors used to perform mind
control experiments. The experiments for mind control have involved several
doctors, but we will discuss two in this training.
The Clinical Uses of Dissociation
In clinical psychotherapy or hypnosis, dissociation takes place in order to
benefit the client. However, the type of dissociation performed in a clinical
setting is much different than what you will use. In therapy, the patient is
told about the conscious and the unconscious mind, and the hypnotist will offer
suggestions and commands for them to let their conscious mind drift away and
allow the unconscious mind to become completely open. This helps the patient to
identify and understand that their brain essentially has two parts. In overt and
clinical hypnosis, dissociation is almost always used; separating the 'parts' of
the mind in order to establish more direct communication with the unconscious
mind. A therapist or hypnotist will generally be overt and unambiguous when
speaking about the dissociative process because it is in the best interest of
the patient. While the patient becomes aware of the two parts of their mind and
consciously makes the choice to separate one from the other, dissociation begins
to occur.
In hypnosis, techniques are continuously employed to increase or maintain the
amount of psychological dissociation a client is experiencing. By increasing the
amount of general relaxation and keeping the client in a daydream state, the
dissociation can remain relatively intact. Phrases such as, 'go deeper',
'drifting off', 'letting go' and 'all the way down' are examples of what some
hypnotists refer to as 'deepeners'. Although they serve to theoretically
increase the depth of trance, deepeners and phrases like these also help to
dissociate the mind. As the mind becomes relaxed, the subject is more
dissociative and, in turn, more able to absorb suggestions and commands from the
hypnotist.
Confusion, whether used covertly or overtly is a small step to cause the mind to
temporarily become dissociative while a subject makes the effort to make sense
of the confusion-statement. The deliberate introduction of a confusing phrase
is the most common method. Confusion is a technique used by a majority of
practitioners today and it produced the desired results quickly. Although it
produces only a small window with which a practitioner can 'install' further
commands, confusion is highly effective as a therapeutic tool.
Monarch Programming
Although not officially declassified, a program a large sum of data and
documents have surfaced under the Freedom of Information Act documents released
by the CIA in regards to project MK ULTRA. A subproject of MK ULTRA was Project
MONARCH. In the intelligence community it is a household phrase. Project MONARCH
had a few subprojects, but the most relevant goals of the project are referred
to in the unclassified/civilian world as BETA (kitten) programming and DELTA
programming.
In BETA programming, severe dissociation is accomplished via torture,
electroshock, trauma and sensory deprivation. Within the MK ULTRA projects,
several doctors could dissociate subjects to the extent they developed
completely separate personalities (Dissociative Identity Disorder) and program
these personalities to perform tasks ranging from delivering classified
information and carrying out assassinations to field intelligence operations and
sex-slave behavior. These alter personalities could be 'activated' on command of
a doctor or 'handler' of the subject and would remain in the state until
deactivated. Many of the sex-slaves created under the MONARCH program have come
forwards after having retrieved the information under hypnosis. The methods used
to program these subjects always involved the advanced use of hypnosis and
linguistics to modify behavior and implant false memories of trauma. Once a
subject was programmed, they could be passed to a handler who would have
training in linguistics and could activate them on command. As much as this may
sound like fiction, it is a very real and well-documented program.
DELTA Programming
While the name of the programming may not be the officially released name, this
is the common name used by the intelligence community. DELTA programming was a
program supervised by Dr. Ewen Cameron and heavily contributed to by Dr. George
Estabrooks. This program was developed to create and program assassins and
couriers. A subject would be programmed to "kill on command" and either commit
suicide or wipe the memory from their mind. Subjects would be programmed to have
an amnesic episode immediately upon performing the task they were given to do.
Even after being given advanced polygraph (lie detector) testing, the subjects
were unable to recall that they had performed any action while in their altered
state.
The following excerpts from released CIA documents show a very small sample of
what has been released to date. They involve programming to kill and the
automation of amnesic behavior immediately following the programmed event.
CIA document and page number: 190691, p. 1, 2
Title: Hypnotic Experimentation and Research
Date: 10 February 1954
A posthypnotic of the night before (pointed finger, you will sleep) was enacted.
Misses [deleted] and [deleted] immediately progressed to a deep hypnotic state
with no further suggestion. Miss [deleted] was then instructed (having
previously expressed a fear of firearms in any fashion) that she would use every
method at her disposal to awaken miss [deleted] (now in a deep hypnotic sleep),
and failing this, she would pick up a pistol nearby and fire it at Miss
[deleted]. She was instructed that her rage would be so great that she would not
hesitate to "kill" [deleted] for failing to awaken.
Miss [deleted] carried out these suggestions to the letter including firing the
(unloaded pneumatic pistol) gun at [deleted] and then proceeding to fall into a
deep sleep. After proper suggestions were made, both were awakened and expressed
complete amnesia for the entire sequence. Miss [deleted] was again handed the
gun, which she refused (in an awakened state) to pick up or accept form the
operator. She expressed absolute denial that the foregoing sequence had
happened.
Miss [deleted] felt reluctant about participating further since she expressed
her doubt as to any useful purpose in further attendance. The Operator thereupon
proceeded in full view of all other subjects to explain to Miss [deleted] that
he planned to induce a deep state of hypnosis now. The reaction was as had been
expected. Miss [deleted] excused herself to make a telephone call (defense
mechanism?). Upon her return a very positive approach was adopted by the
operator whereupon a deeper, much deeper state of hypnosis was obtained.
Immediately a posthypnotic was induced that when the operator accidentally
dropped a steel ball in his hand to the floor ... Miss [deleted] would again go
into hypnosis. Miss [deleted] then advised that she must conclude her work for
the evening. She arose to adjust her hair before the mirror. The ball was
dropped and she promptly slumped back into the chair and back into hypnosis. It
is the opinion of the operator the Miss [deleted] if properly trained (positive
approach) will continue to improve.
CIA document and page number: 190527, pp. 1, 2
Title: SI and H Experimentation
Date: 25 September 1951
(Note: SI stands for sleep induction and H for hypnosis)
"Prior to actually beginning the more complex experiments, several simple post H
were worked with both of the girls participating. The first major experiment of
the evening was set up as follows without previous explanation to either
[deleted] or [deleted]. Both subjects were placed in a very deep trance state
and while in this state, the following instructions were given:
(A) [Deleted] was instructed that when she awakened, she was to procede to
[deleted] room. She was told that while there, she would receive a telephone
call from an individual whom she would know only as "Joe". This individual would
engage her in a normal telephone conversation. During this conversation, this
individual would give her a code word and upon mentioning the code word,
[deleted] would go into a deep SI [sleep induction] trance state, but would be
"normal" in appearance with her eyes open.
[Deleted] was then told that upon the conclusion of the telephone conversation,
she would proceed to the ladies room where she would meet a girl who was unknown
to her. She was told that she would strike up a conversation with this girl and
during the conversation she would mention the code word "New York" to this other
girl, who, in turn, would give her a device and further instructions which were
to be carried out by [deleted]. She was told that after she carried out the
instructions, she was to return to the Operations Room, sit in the sofa and go
immediately into a deep sleep.
(B) [Deleted] was instructed that upon awakening, she would proceed to [deleted]
room where she would wait at the desk for a telephone call. Upon receiving the
call, a person known as "Jim" would engage her in normal conversation. During
the course of the conversation, this individual would mention a code word to
[deleted]. When she heard this code word, she would pass into a SI trance state,
but would not close her eyes and remain perfectly normal and continue the
telephone conversation. She was told that upon conclusion of the telephone
conversation, she would then carry out the following instructions:
[Deleted] being in a complete SI state at this time, was then told to open her
eyes and was shown an electric timing device. She was informed that this timing
device was an incendiary bomb and was then instructed how to attach and set the
device. After [deleted] had indicated that she had learned how to set and attach
the device, she was told to return to a sleep state and further instructed that
upon concluding the aforementioned conversation, she would take the timing
device which was in a briefcase and proceed to the ladies room.
In the ladies room, she would be met by a girl whom she had never seen who would
identify herself by the code word "New York." [Deleted] was then to show this
individual how to attach and set the timing device and further instructions
would be given the individual by [deleted] that the timing device was to be
carried in the briefcase to [deleted] room, placed in the nearest empty
electric-light plug and concealed in the bottom, left-hand drawer of [deleted]
desk, with the device set for 82 seconds and turned on.
[Deleted] was further instructed to tell this other girl that as soon as the
device had been set and turned on, she was to take the briefcase, leave
[deleted] room, go to the operations room and go to the sofa and enter a deep
sleep state. [Deleted] was further instructed that after completion of
instructing the other girl and the transferring to the other girl of the
incendiary bomb, she was to return at once to the operations room, sit on the
sofa, and go into a deep sleep state.
For a matter of record, immediately after the operation was begun it was noted
that a member of the charforce was cleaning the floor in the ladies room and
subsequently, both [deleted] and [deleted] had to be placed ... once again in a
trance state and instructions changed from the ladies room to Room 3. It should
be noted that even with the change of locale in the transfer point, the
experiment was carried off perfectly without any difficulty or hesitation on the
part of either of the girls. Each girl acted out their part perfectly, the
device was planted and set as directed and both girls returned to the operations
room, sat on the sofa and entered a deep sleep state. Throughout, their
movements were easy and natural."
http://www.scribd.com/doc/45949553/CIA-Hypnotism-1955
Hypnotism and Covert Operations
CIA Document (Memorandum) 228.11
5 May 1995 (Author Blacked-Out)
"Frankly, I now distrust much of what is written by academic experts on
hypnotism. Partly this is because many of them appear to have generalized from a
very few cases; partly because much of their cautious pessimism is contradicted
by agency experimenters; but more particularly because I personally have
witnessed behavior responses which respected experts have said are impossible to
obtain. In no other field have I been so conscious of the mental claustrophobia
of book and lecture hall knowledge. I don't think we have enough evidence to say
positively that hypnosis is a practicable covert weapon, but I do say that we'll
never know whether it is or not unless we experiment in the flied where we can
learn what is practicable (materially and psychologically) in a way that no
laboratory worker could possibly prove."
As you can see in the documents, the use of amnesia, dissociation and hypnosis
was absolutely critical. Their specific methods have not been released to the
public, but will be discussed in detail in this chapter and others in this book.
We will discuss the conversational and the institutional means to fractionate
and dissociate the mind of a subject and you will be able to see the specific
techniques within each step of the programming process. The process features
steps that were only BEGINNING to be discovered when the CIA began this
research. You will learn far more advanced methods in this chapter.
experiment was carried off perfectly without any difficulty or hesitation on the
part of either of the girls. Each girl acted out their part perfectly, the
device was planted and set as directed and both girls returned to the operations
room, sat on the sofa and entered a deep sleep state. Throughout, their
movements were easy and natural."
http://www.scribd.com/doc/45949553/CIA-Hypnotism-1955
Hypnotism and Covert Operations
CIA Document (Memorandum) 228.11
5 May 1995 (Author Blacked-Out)
"Frankly, I now distrust much of what is written by academic experts on
hypnotism. Partly this is because many of them appear to have generalized from a
very few cases; partly because much of their cautious pessimism is contradicted
by agency experimenters; but more particularly because I personally have
witnessed behavior responses which respected experts have said are impossible to
obtain. In no other field have I been so conscious of the mental claustrophobia
of book and lecture hall knowledge. I don't think we have enough evidence to say
positively that hypnosis is a practicable covert weapon, but I do say that we'll
never know whether it is or not unless we experiment in the flied where we can
learn what is practicable (materially and psychologically) in a way that no
laboratory worker could possibly prove."
As you can see in the documents, the use of amnesia, dissociation and hypnosis
was absolutely critical. Their specific methods have not been released to the
public, but will be discussed in detail in this chapter and others in this book.
We will discuss the conversational and the institutional means to fractionate
and dissociate the mind of a subject and you will be able to see the specific
techniques within each step of the programming process. The process features
steps that were only BEGINNING to be discovered when the CIA began this
research. You will learn far more advanced methods in this chapter.

More Related Content

Viewers also liked

Transforming the Customer Experience with SugarCRM
Transforming the Customer Experience with SugarCRMTransforming the Customer Experience with SugarCRM
Transforming the Customer Experience with SugarCRMClint Oram
 
Ficha tecnica renta total 30 sep-2012
Ficha tecnica renta total 30 sep-2012Ficha tecnica renta total 30 sep-2012
Ficha tecnica renta total 30 sep-2012ComunicacionesPDB
 
Penia, 8 period, Resume
Penia, 8 period, ResumePenia, 8 period, Resume
Penia, 8 period, ResumeShaynee Penia
 
Entreprise et Finance: Assemblées générales : la rémunération reste au centre...
Entreprise et Finance: Assemblées générales : la rémunération reste au centre...Entreprise et Finance: Assemblées générales : la rémunération reste au centre...
Entreprise et Finance: Assemblées générales : la rémunération reste au centre...Groupe SFC, cabinet d'expertise comptable
 
Internet et la recherche d'emploi
Internet et la recherche d'emploiInternet et la recherche d'emploi
Internet et la recherche d'emploimahemard
 
Federal Register - New OSHA Silcia Dust Rule - March 2016
Federal Register - New OSHA Silcia Dust Rule - March 2016Federal Register - New OSHA Silcia Dust Rule - March 2016
Federal Register - New OSHA Silcia Dust Rule - March 2016Marcellus Drilling News
 
Allison brooke de barr
Allison brooke de barrAllison brooke de barr
Allison brooke de barrAllison1227
 
Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...
Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...
Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...Clint Oram
 
How to Handle Customer Complaints Via Social Media
How to Handle Customer Complaints Via Social MediaHow to Handle Customer Complaints Via Social Media
How to Handle Customer Complaints Via Social MediaAaron Whitcher
 
Economic growth china
Economic growth chinaEconomic growth china
Economic growth chinaAda Alipaj
 
Mastering in Data Warehousing and Business Intelligence
Mastering in Data Warehousing and Business IntelligenceMastering in Data Warehousing and Business Intelligence
Mastering in Data Warehousing and Business IntelligenceEdureka!
 
kingdeli catalogue 2016
kingdeli catalogue 2016kingdeli catalogue 2016
kingdeli catalogue 2016Biying Luo
 
PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)
PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)
PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)Marcellus Drilling News
 
Dinamica de grupo Patricia Molla - world cafe innovando para el cambio
Dinamica de grupo Patricia Molla - world cafe innovando para el cambioDinamica de grupo Patricia Molla - world cafe innovando para el cambio
Dinamica de grupo Patricia Molla - world cafe innovando para el cambioPatricia Mollá
 
Ebook smart data&opendata 2017 Thinktur-ITH
Ebook smart data&opendata 2017 Thinktur-ITHEbook smart data&opendata 2017 Thinktur-ITH
Ebook smart data&opendata 2017 Thinktur-ITHDavid Vicent
 

Viewers also liked (19)

Transforming the Customer Experience with SugarCRM
Transforming the Customer Experience with SugarCRMTransforming the Customer Experience with SugarCRM
Transforming the Customer Experience with SugarCRM
 
Ficha tecnica renta total 30 sep-2012
Ficha tecnica renta total 30 sep-2012Ficha tecnica renta total 30 sep-2012
Ficha tecnica renta total 30 sep-2012
 
In k450 for xe quick reference card
In k450 for xe quick reference cardIn k450 for xe quick reference card
In k450 for xe quick reference card
 
Primer.doc (1)
Primer.doc (1)Primer.doc (1)
Primer.doc (1)
 
willem Europe 01
willem Europe 01willem Europe 01
willem Europe 01
 
Penia, 8 period, Resume
Penia, 8 period, ResumePenia, 8 period, Resume
Penia, 8 period, Resume
 
Entreprise et Finance: Assemblées générales : la rémunération reste au centre...
Entreprise et Finance: Assemblées générales : la rémunération reste au centre...Entreprise et Finance: Assemblées générales : la rémunération reste au centre...
Entreprise et Finance: Assemblées générales : la rémunération reste au centre...
 
Internet et la recherche d'emploi
Internet et la recherche d'emploiInternet et la recherche d'emploi
Internet et la recherche d'emploi
 
Ecologia
EcologiaEcologia
Ecologia
 
Federal Register - New OSHA Silcia Dust Rule - March 2016
Federal Register - New OSHA Silcia Dust Rule - March 2016Federal Register - New OSHA Silcia Dust Rule - March 2016
Federal Register - New OSHA Silcia Dust Rule - March 2016
 
Allison brooke de barr
Allison brooke de barrAllison brooke de barr
Allison brooke de barr
 
Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...
Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...
Disrupt or be Disrupted: 4 Strategies to Deliver an Exceptional Customer Expe...
 
How to Handle Customer Complaints Via Social Media
How to Handle Customer Complaints Via Social MediaHow to Handle Customer Complaints Via Social Media
How to Handle Customer Complaints Via Social Media
 
Economic growth china
Economic growth chinaEconomic growth china
Economic growth china
 
Mastering in Data Warehousing and Business Intelligence
Mastering in Data Warehousing and Business IntelligenceMastering in Data Warehousing and Business Intelligence
Mastering in Data Warehousing and Business Intelligence
 
kingdeli catalogue 2016
kingdeli catalogue 2016kingdeli catalogue 2016
kingdeli catalogue 2016
 
PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)
PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)
PA Governor's Pipeline Infrastructure Task Force Report - Final (Feb 2016)
 
Dinamica de grupo Patricia Molla - world cafe innovando para el cambio
Dinamica de grupo Patricia Molla - world cafe innovando para el cambioDinamica de grupo Patricia Molla - world cafe innovando para el cambio
Dinamica de grupo Patricia Molla - world cafe innovando para el cambio
 
Ebook smart data&opendata 2017 Thinktur-ITH
Ebook smart data&opendata 2017 Thinktur-ITHEbook smart data&opendata 2017 Thinktur-ITH
Ebook smart data&opendata 2017 Thinktur-ITH
 

Similar to Mind control

Deeper Insights 8: The Science Of Body Manipulation & Programming
Deeper Insights 8: The Science Of Body Manipulation & ProgrammingDeeper Insights 8: The Science Of Body Manipulation & Programming
Deeper Insights 8: The Science Of Body Manipulation & Programming528Hz TRUTH
 
A New Model: Advancing Organizational Security Through Peacebuilding-1st draft
A New Model: Advancing Organizational Security Through Peacebuilding-1st draftA New Model: Advancing Organizational Security Through Peacebuilding-1st draft
A New Model: Advancing Organizational Security Through Peacebuilding-1st draftMichele Chubirka
 
Covert Hypnosis Techniques pdf
Covert Hypnosis Techniques pdfCovert Hypnosis Techniques pdf
Covert Hypnosis Techniques pdfConradDrake
 
Security Is Like An Onion, That's Why It Makes You Cry
Security Is Like An Onion, That's Why It Makes You CrySecurity Is Like An Onion, That's Why It Makes You Cry
Security Is Like An Onion, That's Why It Makes You CryMichele Chubirka
 
A New Model: Advancing Organizational Security Through Peacebuilding
A New Model: Advancing Organizational Security Through PeacebuildingA New Model: Advancing Organizational Security Through Peacebuilding
A New Model: Advancing Organizational Security Through PeacebuildingMichele Chubirka
 
Conversational Hypnosis Techniques PDF
Conversational Hypnosis Techniques PDFConversational Hypnosis Techniques PDF
Conversational Hypnosis Techniques PDFConradDrake
 
Notes #flushyourmeds Scott Barry
Notes #flushyourmeds Scott BarryNotes #flushyourmeds Scott Barry
Notes #flushyourmeds Scott Barryseton666
 
The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]
The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]
The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]Catherine Hislop
 
R ev hyp (1b).edited
R ev hyp (1b).editedR ev hyp (1b).edited
R ev hyp (1b).editedjosephmaina45
 
Defense mechanisms & Examples and Discussion and how it works
Defense mechanisms & Examples  and Discussion and how it works Defense mechanisms & Examples  and Discussion and how it works
Defense mechanisms & Examples and Discussion and how it works Najah National University
 
Subliminal Mind Power: Secret Key To Success
Subliminal Mind Power: Secret Key To SuccessSubliminal Mind Power: Secret Key To Success
Subliminal Mind Power: Secret Key To SuccessMichael Lee
 
The hypnosis by group5
The hypnosis by group5The hypnosis by group5
The hypnosis by group5Erasmus+
 
LECTURE 8 STATES OF CONSCIOUSNESS.ppt
LECTURE 8  STATES OF CONSCIOUSNESS.pptLECTURE 8  STATES OF CONSCIOUSNESS.ppt
LECTURE 8 STATES OF CONSCIOUSNESS.pptgladysdzoro
 
074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...
074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...
074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...Lia s. Associates | Branding & Design
 

Similar to Mind control (14)

Deeper Insights 8: The Science Of Body Manipulation & Programming
Deeper Insights 8: The Science Of Body Manipulation & ProgrammingDeeper Insights 8: The Science Of Body Manipulation & Programming
Deeper Insights 8: The Science Of Body Manipulation & Programming
 
A New Model: Advancing Organizational Security Through Peacebuilding-1st draft
A New Model: Advancing Organizational Security Through Peacebuilding-1st draftA New Model: Advancing Organizational Security Through Peacebuilding-1st draft
A New Model: Advancing Organizational Security Through Peacebuilding-1st draft
 
Covert Hypnosis Techniques pdf
Covert Hypnosis Techniques pdfCovert Hypnosis Techniques pdf
Covert Hypnosis Techniques pdf
 
Security Is Like An Onion, That's Why It Makes You Cry
Security Is Like An Onion, That's Why It Makes You CrySecurity Is Like An Onion, That's Why It Makes You Cry
Security Is Like An Onion, That's Why It Makes You Cry
 
A New Model: Advancing Organizational Security Through Peacebuilding
A New Model: Advancing Organizational Security Through PeacebuildingA New Model: Advancing Organizational Security Through Peacebuilding
A New Model: Advancing Organizational Security Through Peacebuilding
 
Conversational Hypnosis Techniques PDF
Conversational Hypnosis Techniques PDFConversational Hypnosis Techniques PDF
Conversational Hypnosis Techniques PDF
 
Notes #flushyourmeds Scott Barry
Notes #flushyourmeds Scott BarryNotes #flushyourmeds Scott Barry
Notes #flushyourmeds Scott Barry
 
The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]
The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]
The Illuminati Formula To Create An Undetectable Total Mind Control Slave[1][1]
 
R ev hyp (1b).edited
R ev hyp (1b).editedR ev hyp (1b).edited
R ev hyp (1b).edited
 
Defense mechanisms & Examples and Discussion and how it works
Defense mechanisms & Examples  and Discussion and how it works Defense mechanisms & Examples  and Discussion and how it works
Defense mechanisms & Examples and Discussion and how it works
 
Subliminal Mind Power: Secret Key To Success
Subliminal Mind Power: Secret Key To SuccessSubliminal Mind Power: Secret Key To Success
Subliminal Mind Power: Secret Key To Success
 
The hypnosis by group5
The hypnosis by group5The hypnosis by group5
The hypnosis by group5
 
LECTURE 8 STATES OF CONSCIOUSNESS.ppt
LECTURE 8  STATES OF CONSCIOUSNESS.pptLECTURE 8  STATES OF CONSCIOUSNESS.ppt
LECTURE 8 STATES OF CONSCIOUSNESS.ppt
 
074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...
074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...
074 170922 bookclub_Road less traveled - 4.2 the miracle of the unconscious -...
 

Recently uploaded

如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一fjjwgk
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...shivangimorya083
 
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptUNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptDineshKumar4165
 
BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024AHOhOops1
 
What Could Cause A VW Tiguan's Radiator Fan To Stop Working
What Could Cause A VW Tiguan's Radiator Fan To Stop WorkingWhat Could Cause A VW Tiguan's Radiator Fan To Stop Working
What Could Cause A VW Tiguan's Radiator Fan To Stop WorkingEscondido German Auto
 
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESUNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESDineshKumar4165
 
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样gfghbihg
 
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptxUNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptxDineshKumar4165
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxDineshKumar4165
 
Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technologyquickpartslimitlessm
 
Digamma / CertiCon Company Presentation
Digamma / CertiCon Company  PresentationDigamma / CertiCon Company  Presentation
Digamma / CertiCon Company PresentationMihajloManjak
 
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaFULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaMalviyaNagarCallGirl
 
Digamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsDigamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsMihajloManjak
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERunosafeads
 
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一meq5nzfnk
 

Recently uploaded (20)

如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
 
Hot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Pira Garhi🔝 9953056974 🔝 escort Service
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
 
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptUNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
 
BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024BLUE VEHICLES the kids picture show 2024
BLUE VEHICLES the kids picture show 2024
 
What Could Cause A VW Tiguan's Radiator Fan To Stop Working
What Could Cause A VW Tiguan's Radiator Fan To Stop WorkingWhat Could Cause A VW Tiguan's Radiator Fan To Stop Working
What Could Cause A VW Tiguan's Radiator Fan To Stop Working
 
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLESUNIT-III-TRANSMISSION SYSTEMS REAR AXLES
UNIT-III-TRANSMISSION SYSTEMS REAR AXLES
 
sauth delhi call girls in Connaught Place🔝 9953056974 🔝 escort Service
sauth delhi call girls in  Connaught Place🔝 9953056974 🔝 escort Servicesauth delhi call girls in  Connaught Place🔝 9953056974 🔝 escort Service
sauth delhi call girls in Connaught Place🔝 9953056974 🔝 escort Service
 
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
(办理学位证)(Toledo毕业证)托莱多大学毕业证成绩单修改留信学历认证原版一模一样
 
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptxUNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
UNIT-V-ELECTRIC AND HYBRID VEHICLES.pptx
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
 
Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technology
 
Digamma / CertiCon Company Presentation
Digamma / CertiCon Company  PresentationDigamma / CertiCon Company  Presentation
Digamma / CertiCon Company Presentation
 
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaFULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
 
Digamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsDigamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and Qualifications
 
Call Girls In Kirti Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kirti Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Kirti Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kirti Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
 
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Jama Masjid (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
 

Mind control

  • 1. IT ACTUALLY HAPPENED...AND IT STILL IS Dissociation is the bread and butter of the initial research into human behavior modification, brainwashing and mind control. The Ellipsis Manual is a partially- controlled manual and will be available for pre-release before Christmas 2014. (Background checks required) Dissociation simply means the detachment or separation from something. It's the opposite of association. In psychology, it can actually mean a range of things. All of us dissociate. We get completely tuned in to a conversation we like, become unaware of our surroundings during interesting movies and are able to even drive a car without actually being 'aware' of what is going on around us. When we disconnect from the moment, be it from boredom or severe trauma, our mind splits. One part of the mind remains there as a 'data collector' and the other is 'shut down'. Dissociation is a survival mechanism that allows the compartmentalization of traumatic information. When children are abused for example, the fight or flight response is not a viable option at their age. The only viable option for a child's subconscious is to use the 'flight' instinct and retreat into the recesses of the mind. In cases of post-traumatic stress disorder (PTSD), the memories and content of the experience can continually stay in the background of the mind and play in 'loop fashion' in the unconscious. Experiences can range from a feeling of disconnectedness from the self to completely independent 'personalities' forming within a person. The SEVERITY of the dissociation is what makes the difference. How the brain adapts to environments In the case of post-traumatic stress disorder, the mind of a victim becomes disconnected from reality for a time as a result of battlefield or trauma exposure and emotional disconnection. The brain continuously adapts in order to protect the psyche (self) from emotional harm. This is one of the main reasons that people have 'blackout's during car accidents, torture, rape and childhood abuse. Our minds continuously search for a 'way out' that can repress or eliminate the experience from having happened to US. The CIA and mind control There are more conspiracy theories about the CIA and mind control than almost anything else. The CIA released thousands of documents under the Freedom of Information Act and it has caused many people to perform extensive investigative research and spawned countless conspiracy theories. The CIA did, in fact, have fully functional programs to developing techniques and methods for mind control. While the programs have different names, the name 'MK ULTRA' is the most commonly referred to. This project, and its subprojects involved torture, drugs, hypnosis, brainwashing and many other related practices. While the techniques you will learn in this chapter will absolutely allow you to create an alter-personality in a subject, they are all very elementary. There are absolute ways of creating the ‘Manchurian Candidate‘-style of mental programming. You will be able to physically create another identity in a subject‘s mind after your training in this chapter. This is only the beginning of what makes this course a legitimate WEAPON. Dissociation is the most common technique the CIA doctors used to perform mind control experiments. The experiments for mind control have involved several doctors, but we will discuss two in this training. The Clinical Uses of Dissociation In clinical psychotherapy or hypnosis, dissociation takes place in order to benefit the client. However, the type of dissociation performed in a clinical setting is much different than what you will use. In therapy, the patient is told about the conscious and the unconscious mind, and the hypnotist will offer
  • 2. suggestions and commands for them to let their conscious mind drift away and allow the unconscious mind to become completely open. This helps the patient to identify and understand that their brain essentially has two parts. In overt and clinical hypnosis, dissociation is almost always used; separating the 'parts' of the mind in order to establish more direct communication with the unconscious mind. A therapist or hypnotist will generally be overt and unambiguous when speaking about the dissociative process because it is in the best interest of the patient. While the patient becomes aware of the two parts of their mind and consciously makes the choice to separate one from the other, dissociation begins to occur. In hypnosis, techniques are continuously employed to increase or maintain the amount of psychological dissociation a client is experiencing. By increasing the amount of general relaxation and keeping the client in a daydream state, the dissociation can remain relatively intact. Phrases such as, 'go deeper', 'drifting off', 'letting go' and 'all the way down' are examples of what some hypnotists refer to as 'deepeners'. Although they serve to theoretically increase the depth of trance, deepeners and phrases like these also help to dissociate the mind. As the mind becomes relaxed, the subject is more dissociative and, in turn, more able to absorb suggestions and commands from the hypnotist. Confusion, whether used covertly or overtly is a small step to cause the mind to temporarily become dissociative while a subject makes the effort to make sense of the confusion-statement. The deliberate introduction of a confusing phrase is the most common method. Confusion is a technique used by a majority of practitioners today and it produced the desired results quickly. Although it produces only a small window with which a practitioner can 'install' further commands, confusion is highly effective as a therapeutic tool. Monarch Programming Although not officially declassified, a program a large sum of data and documents have surfaced under the Freedom of Information Act documents released by the CIA in regards to project MK ULTRA. A subproject of MK ULTRA was Project MONARCH. In the intelligence community it is a household phrase. Project MONARCH had a few subprojects, but the most relevant goals of the project are referred to in the unclassified/civilian world as BETA (kitten) programming and DELTA programming. In BETA programming, severe dissociation is accomplished via torture, electroshock, trauma and sensory deprivation. Within the MK ULTRA projects, several doctors could dissociate subjects to the extent they developed completely separate personalities (Dissociative Identity Disorder) and program these personalities to perform tasks ranging from delivering classified information and carrying out assassinations to field intelligence operations and sex-slave behavior. These alter personalities could be 'activated' on command of a doctor or 'handler' of the subject and would remain in the state until deactivated. Many of the sex-slaves created under the MONARCH program have come forwards after having retrieved the information under hypnosis. The methods used to program these subjects always involved the advanced use of hypnosis and linguistics to modify behavior and implant false memories of trauma. Once a subject was programmed, they could be passed to a handler who would have training in linguistics and could activate them on command. As much as this may sound like fiction, it is a very real and well-documented program. DELTA Programming While the name of the programming may not be the officially released name, this is the common name used by the intelligence community. DELTA programming was a program supervised by Dr. Ewen Cameron and heavily contributed to by Dr. George Estabrooks. This program was developed to create and program assassins and couriers. A subject would be programmed to "kill on command" and either commit suicide or wipe the memory from their mind. Subjects would be programmed to have
  • 3. an amnesic episode immediately upon performing the task they were given to do. Even after being given advanced polygraph (lie detector) testing, the subjects were unable to recall that they had performed any action while in their altered state. The following excerpts from released CIA documents show a very small sample of what has been released to date. They involve programming to kill and the automation of amnesic behavior immediately following the programmed event. CIA document and page number: 190691, p. 1, 2 Title: Hypnotic Experimentation and Research Date: 10 February 1954 A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses [deleted] and [deleted] immediately progressed to a deep hypnotic state with no further suggestion. Miss [deleted] was then instructed (having previously expressed a fear of firearms in any fashion) that she would use every method at her disposal to awaken miss [deleted] (now in a deep hypnotic sleep), and failing this, she would pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her rage would be so great that she would not hesitate to "kill" [deleted] for failing to awaken. Miss [deleted] carried out these suggestions to the letter including firing the (unloaded pneumatic pistol) gun at [deleted] and then proceeding to fall into a deep sleep. After proper suggestions were made, both were awakened and expressed complete amnesia for the entire sequence. Miss [deleted] was again handed the gun, which she refused (in an awakened state) to pick up or accept form the operator. She expressed absolute denial that the foregoing sequence had happened. Miss [deleted] felt reluctant about participating further since she expressed her doubt as to any useful purpose in further attendance. The Operator thereupon proceeded in full view of all other subjects to explain to Miss [deleted] that he planned to induce a deep state of hypnosis now. The reaction was as had been expected. Miss [deleted] excused herself to make a telephone call (defense mechanism?). Upon her return a very positive approach was adopted by the operator whereupon a deeper, much deeper state of hypnosis was obtained. Immediately a posthypnotic was induced that when the operator accidentally dropped a steel ball in his hand to the floor ... Miss [deleted] would again go into hypnosis. Miss [deleted] then advised that she must conclude her work for the evening. She arose to adjust her hair before the mirror. The ball was dropped and she promptly slumped back into the chair and back into hypnosis. It is the opinion of the operator the Miss [deleted] if properly trained (positive approach) will continue to improve. CIA document and page number: 190527, pp. 1, 2 Title: SI and H Experimentation Date: 25 September 1951
  • 4. (Note: SI stands for sleep induction and H for hypnosis) "Prior to actually beginning the more complex experiments, several simple post H were worked with both of the girls participating. The first major experiment of the evening was set up as follows without previous explanation to either [deleted] or [deleted]. Both subjects were placed in a very deep trance state and while in this state, the following instructions were given: (A) [Deleted] was instructed that when she awakened, she was to procede to [deleted] room. She was told that while there, she would receive a telephone call from an individual whom she would know only as "Joe". This individual would engage her in a normal telephone conversation. During this conversation, this individual would give her a code word and upon mentioning the code word, [deleted] would go into a deep SI [sleep induction] trance state, but would be "normal" in appearance with her eyes open. [Deleted] was then told that upon the conclusion of the telephone conversation, she would proceed to the ladies room where she would meet a girl who was unknown to her. She was told that she would strike up a conversation with this girl and during the conversation she would mention the code word "New York" to this other girl, who, in turn, would give her a device and further instructions which were to be carried out by [deleted]. She was told that after she carried out the instructions, she was to return to the Operations Room, sit in the sofa and go immediately into a deep sleep. (B) [Deleted] was instructed that upon awakening, she would proceed to [deleted] room where she would wait at the desk for a telephone call. Upon receiving the call, a person known as "Jim" would engage her in normal conversation. During the course of the conversation, this individual would mention a code word to [deleted]. When she heard this code word, she would pass into a SI trance state, but would not close her eyes and remain perfectly normal and continue the telephone conversation. She was told that upon conclusion of the telephone conversation, she would then carry out the following instructions: [Deleted] being in a complete SI state at this time, was then told to open her eyes and was shown an electric timing device. She was informed that this timing device was an incendiary bomb and was then instructed how to attach and set the device. After [deleted] had indicated that she had learned how to set and attach the device, she was told to return to a sleep state and further instructed that upon concluding the aforementioned conversation, she would take the timing device which was in a briefcase and proceed to the ladies room. In the ladies room, she would be met by a girl whom she had never seen who would identify herself by the code word "New York." [Deleted] was then to show this individual how to attach and set the timing device and further instructions would be given the individual by [deleted] that the timing device was to be carried in the briefcase to [deleted] room, placed in the nearest empty electric-light plug and concealed in the bottom, left-hand drawer of [deleted] desk, with the device set for 82 seconds and turned on. [Deleted] was further instructed to tell this other girl that as soon as the device had been set and turned on, she was to take the briefcase, leave [deleted] room, go to the operations room and go to the sofa and enter a deep sleep state. [Deleted] was further instructed that after completion of instructing the other girl and the transferring to the other girl of the incendiary bomb, she was to return at once to the operations room, sit on the sofa, and go into a deep sleep state. For a matter of record, immediately after the operation was begun it was noted that a member of the charforce was cleaning the floor in the ladies room and subsequently, both [deleted] and [deleted] had to be placed ... once again in a trance state and instructions changed from the ladies room to Room 3. It should be noted that even with the change of locale in the transfer point, the
  • 5. experiment was carried off perfectly without any difficulty or hesitation on the part of either of the girls. Each girl acted out their part perfectly, the device was planted and set as directed and both girls returned to the operations room, sat on the sofa and entered a deep sleep state. Throughout, their movements were easy and natural." http://www.scribd.com/doc/45949553/CIA-Hypnotism-1955 Hypnotism and Covert Operations CIA Document (Memorandum) 228.11 5 May 1995 (Author Blacked-Out) "Frankly, I now distrust much of what is written by academic experts on hypnotism. Partly this is because many of them appear to have generalized from a very few cases; partly because much of their cautious pessimism is contradicted by agency experimenters; but more particularly because I personally have witnessed behavior responses which respected experts have said are impossible to obtain. In no other field have I been so conscious of the mental claustrophobia of book and lecture hall knowledge. I don't think we have enough evidence to say positively that hypnosis is a practicable covert weapon, but I do say that we'll never know whether it is or not unless we experiment in the flied where we can learn what is practicable (materially and psychologically) in a way that no laboratory worker could possibly prove." As you can see in the documents, the use of amnesia, dissociation and hypnosis was absolutely critical. Their specific methods have not been released to the public, but will be discussed in detail in this chapter and others in this book. We will discuss the conversational and the institutional means to fractionate and dissociate the mind of a subject and you will be able to see the specific techniques within each step of the programming process. The process features steps that were only BEGINNING to be discovered when the CIA began this research. You will learn far more advanced methods in this chapter.
  • 6. experiment was carried off perfectly without any difficulty or hesitation on the part of either of the girls. Each girl acted out their part perfectly, the device was planted and set as directed and both girls returned to the operations room, sat on the sofa and entered a deep sleep state. Throughout, their movements were easy and natural." http://www.scribd.com/doc/45949553/CIA-Hypnotism-1955 Hypnotism and Covert Operations CIA Document (Memorandum) 228.11 5 May 1995 (Author Blacked-Out) "Frankly, I now distrust much of what is written by academic experts on hypnotism. Partly this is because many of them appear to have generalized from a very few cases; partly because much of their cautious pessimism is contradicted by agency experimenters; but more particularly because I personally have witnessed behavior responses which respected experts have said are impossible to obtain. In no other field have I been so conscious of the mental claustrophobia of book and lecture hall knowledge. I don't think we have enough evidence to say positively that hypnosis is a practicable covert weapon, but I do say that we'll never know whether it is or not unless we experiment in the flied where we can learn what is practicable (materially and psychologically) in a way that no laboratory worker could possibly prove." As you can see in the documents, the use of amnesia, dissociation and hypnosis was absolutely critical. Their specific methods have not been released to the public, but will be discussed in detail in this chapter and others in this book. We will discuss the conversational and the institutional means to fractionate and dissociate the mind of a subject and you will be able to see the specific techniques within each step of the programming process. The process features steps that were only BEGINNING to be discovered when the CIA began this research. You will learn far more advanced methods in this chapter.