High technology, cover-up, disinformation and destruction of human lives. The technology of direct manipulation and remote physical interaction of thoughts, previously unknown to the general public and which was exclusive to developed countries, has already arrived in Brazil and has caused havoc wherever it goes. The Mind Control Technology (MKTECH) is an advanced electromagnetic weapon that interferes with the bioelectric functioning of the brain of any evolved animal on the planet, such as mammals, and that includes us, human beings.

Welcome to the best kept secret of the last 60 years. It’s by far the most important one since the Manhattan Project, a period in which the discovery of nuclear fission and the development of the atomic bomb changed civilization. Today the technology of control, invasion and psychological torture has been doing the same thing. So, prepare to embark on the path of profound transformations in society. We are going to deal with new paradigms never considered in history, which includes the end of cognitive privacy and the content of our thinking.

High technology, cover-up, disinformation and destruction of human lives. The technology of direct manipulation and remote physical interaction of thoughts, previously unknown to the general public and which was exclusive to developed countries, has already arrived in Brazil and has caused havoc wherever it goes. The Mind Control Technology (MKTECH) is an advanced electromagnetic weapon that interferes with the bioelectric functioning of the brain of any evolved animal on the planet, such as mammals, and that includes us, human beings.

Welcome to the best kept secret of the last 60 years. It’s by far the most important one since the Manhattan Project, a period in which the discovery of nuclear fission and the development of the atomic bomb changed civilization. Today the technology of control, invasion and psychological torture has been doing the same thing. So, prepare to embark on the path of profound transformations in society. We are going to deal with new paradigms never considered in history, which includes the end of cognitive privacy and the content of our thinking.

Invasion and Mind Control Volume 1

Invasion and Mind Control – Volume 1

TITLE: MKTECH: Invasion and Mind Control – Volume 1

Autor: Author: Felipe Saboya de Santa Cruz Abreu
felipessca@gmail.com

Diagrams: : Felipe Saboya de Santa Cruz Abreu

Text formatting: Felipe Saboya de Santa Cruz Abreu

Illustrations: Eloy Rondon
eloyartes@hotmail.com

Translation:  Luene Langhammer Alves
luene.langhammer.alves@gmail.com

Book design: Rubens Lima
https://capista.com.br/

ISBN:978-65-901131-0-8

Pages
1
Chapters
1
Illustrations
1

Now on sale in digital format at Amazon. You can read it on any device: Kindle, iOS, Android, Mac, and PC

Introduction

Introduction

In this book, we are going to discuss how technology and science are advanced to the point that electronic equipment directly interacts with the functioning of the brain and its bioelectric functions, all of which is conducted remotely using electromagnetic waves. Moreover, we are going to focus on the people or groups of people who use this technological arsenal to torture, defraud, steal and murder all over the world — or just to have fun with the suffering of others.

All the topics covered in this book are the result of careful research based on scientific approach. They are the result of seven years of direct contact with this technology in full operation, following human test subjects and their suffering, day by day, and unraveling a complex and intricate, macabre system that involves disturbing phenomena and extensive reflections to understand them in order to show the danger to which we are exposed today. We are going to cover the reading of thoughts directly from the brain, theft of information and intellectual property to torture, murder and fraud in civil service competitive examinations.

Microwave antennas, satellites with instruments and sensors specialized in hacking the human brain and invading the mind using several advanced systems, programs specialized in analyzing and monitoring brain waves and their content, thus creating from a distance the most potentially destructive weapon ever developed by humans.

The book is also intended to alert readers to the arrival of this technology and its consequences on society as a whole, as well as the direct implications for humanity’s basic social interactions. It’s a complete violation of our constitutional rights perpetrated by these electronic devices. In their essence, they are modern weapons of the 21st century capable of reaching thousands of people at the same time while they are not even aware of what is happening or even draw incorrect conclusions about such an event when perceived.

As this technology has been in the dark since it was conceived, with restricted access to the military environment and intelligence institutions like CIA, KGB, MI6, BND, MOSSAD, MSS, among others, it’s extremely complicated for people to believe that this type of event is real. Even people with advanced knowledge in science are unable to form a general picture of what is going on in the world lately.

Based on that, I am going to prepare the reader for what is happening behind the scenes of modern society, since we are facing a reality that is difficult to adapt; a fact that will change practically everything that we constitute as societies and their foundations: it is possible to remotely monitor the electrical brain activity of entire regions, or selected parts, through the transmission and reception of electromagnetic waves at several different intervals, which interact directly with the human mind of any individual on the planet. Thus, the ability to read the content of thoughts, to hear vocalized thoughts, to see visual thoughts from visual memories — which opens unique precedents — becomes possible.

Furthermore, they are massacring people across the Earth using the voice-to-skull technology (V2K), a terrible device that inserts sounds and voices directly into an individual’s brain, driving them insane. As if that were not enough, there is still a powerful weapon capable of completely replacing a person’s dreams while sleeping, as if they were a TV broadcast or a computer game, causing unprecedented disruption. This is happening right now with thousands of people.

We are going to discuss these technologies that together make up the Mind Control Technology (MKTECH). We are going to differentiate technologies in terms of their functionalities, that serve for spying, surveillance and unauthorized access to thoughts, and how they are being used for torture and murder. Then we are going to understand the role of the organized crime that was born along with this technology, as well as the techniques used to accomplish shady, hidden goals. Finally, we are going to get to know MKULTRA 2.0, which provides the infrastructure and protocol to carry out attacks on victims, as its namesake — called MK-ULTRA— did in 1950.

This book shows the reality behind this technology hidden from most people, but which has become popular in Brazil and worldwide. We are going to know the most nefarious weapon ever conceived by humans after the nuclear bomb. It’s invisible, can modify and interfere physically and remotely in the mental content of living beings, altering the entire cognitive process. Modifying dreams when we are in deep sleep, changing behaviors, paralyzing animals, reaching thousands of people without leaving a trace and completely transforming society: this is the transformation of human lives at the push of a button!

DOWNLOAD A SAMPLE OF THE FIRST VOLUME IN PDF FORMAT

CONTENTS

Introduction

CHAPTER 1 WHAT IS THOUGHT AND HOW DO WE THINK?

1.1 – What is Language?

CHAPTER 2 MKTECH  the electronic systems that FORM the Mind Control Technology

CHAPTER 2.1 EMR – ELECTRONIC MIND READING

2.1.1 – Meet EMR

2.1.2 – Hacking of profiles and passwords from computers, websites and systems

2.1.3 – Intellectual property theft

2.1.4 – Theft of Confidential Information

2.1.5 – Theft of credit cards and PINs

2.1.6 – ATM withdrawals without biometric fingerprint technology

2.1.7 – End of interpersonal relationships

2.1.8 – End of privacy

2.1.9 – End of the right to free thinking

2.1.10 – How does the whole process of amplifying brain waves and extracting their contents from a remote position take place?

2.1.11 – Brain Functioning and Electromagnetism

2.1.12 – Speaking, reading and writing

2.1.13 – Summing up

2.1.14 – The vinyl record:

2.1.15 – Theft of vocalized thought and visual thinking.

CHAPTER 2.2 V2K – “VOICE TO SKULL”, INTRACRANIAL VOICE, MICROWAVE VOICE OR MICROWAVE HEARING EFFECT

2.2.1 – But what is a radar?

2.2.2 – The history of the Intracranial Voice

2.2.3 – How the microwave voice affects hearing and the brain

2.2.4 – Program interface

2.2.5 – How is the microwave voice demodulated by the brain?

CHAPTER 2.3 SYNTELE – SYNTHETIC ELECTRONIC TELEPATHY

2.3.1 – SYNTELE for torture, experiments and information theft

I – Battle tips for the Targeted Individual

2.3.2 – SYNTELE and Electronic Schizophrenia

Symptoms

CHAPTER 2.4 EMRa – ELECTRONIC MIND READING (AUDITORY)

2.4.1 – But how does it happen?

2.4.2 – Thalamus

2.4.3 – Vocalized thoughts

2.4.4 – V2K microwave voice capture

2.4.5 – How the algorithm that filters conversations works

CHAPTER 2.5 D2K – Synthetic Electronic Dream

2.5.1 – Gamification of dreams

2.5.2 – What is sleep and dream? How does D2K affect each stage?

2.5.3 – Dreams

2.5.4 – Function of dreams in REM sleep

2.5.5 – Dreams created by D2K in REM sleep

Waking up the target by synchronizing with dreams

GAP within dreams

2.5.6 – How do memory, remembrance and imagination work?

Memories

Remembrances

II – Important tips for the Targeted Individual

2.5.7 – Creating long-term memories using D2K (BYPASS) by deceiving the brain.

2.5.8 – Mixing reality with dreams and dreams with reality. Déjà vu and Déjà Rêvé

2.5.9 – Creating the “Manchurian Candidate”

2.5.10 – “Bypass” or alternate path to insert commercial images

III – Important tips for the Targeted Individual

IV – Important tips for the Targeted Individual

V – Important tips for the target

2.5.11 – Exploring the sleep transition state

2.5.12 – Dream management using V2K

2.5.13 – Sex-related dreams and testing of indiscreet situations

“Dates” or pornographic encounters

2.5.14 – Inserting familiar faces in dreams

2.5.15 – REM rebound

2.5.16 – Creating test models about the target

2.5.17 – “Tunguska Sound” or Night Bang

2.5.18 – Dislocated Thought or Dissonant Mind

2.5.19 – Altered time perception

2.5.20 – But, after all, how is it possible to replace dreams?

2.5.21 – Conclusion

CHAPTER 2.6 DANGER IN THE USE OF THE TECHNOLOGY (PART 1) – A BOY CALLED JAMES

2.6.1 – What really happened to the boy?

CHAPTER 2.7 V2K – sound within another sound

CHAPTER 2.8 DANGER IN THE USE OF THE TECHNOLOGY (PART 2) – Mayday! Mayday! Mayday! Danger to civil passenger aviation

CHAPTER 2.9 DANGER IN THE USE OF THE TECHNOLOGY (PART 3) – “WINTER SOLDIER” ESTEBAN SANTIAGO

2.9.1 – Esteban Santiago, 26

2.9.2 – “Hallucinations”?!

2.9.3 – A Brief Reflection

CHAPTER 2.10 EMRo – ELECTRONIC MIND READING (optical)

2.10.1 – The sight

2.10.2 – Visual memories of thought

CHAPTER 3 – PHYSIOLOGICAL MONITORING – NEURAL BIOMETRIC SIGNATURE – REMOTE POLYGRAPH

RNM – Remote Neural Monitoring

3.1 – Neural Remote Biometrics

3.2 – Telemetric EEG, Electronic Brain Link, Remote Neural Monitoring

3.3 – Body position in space

3.4 – Brain waves

3.5 – Motivations and intentions

Factor 1: Primary emotions:

Factor 2: States of consciousness:

3.6 – Target location anywhere in the world. Neural GPS

3.7 – Remote Polygraph – The most efficient lie detector ever created

How normal polygraph tests work

Experiments captured in the face of the remote polygraph

3.8 – How can they see me all the time, inside my house, in the bathroom, in the bedroom, at work, at the beach, in the park, on the street, at friends’ houses, in distant places in the countryside, at my cousin’s or sister’s house? How do they “see” everything I do everywhere I go? They see what I see and they hear what I hear all the time

3.9 – The technology

Epilogue

Glossary I

Glossary II

References