All of this takes us to the next volume of the book “Invasion and Mind Control (volume 2)” in which even more thorny issues that complement what we saw in volume 1 will be discussed.
You will learn about advanced techniques for the use of neural weapons, in what context they are used, the history behind their emergence, their origin and the direct connection with illegal experiments conducted on humans by governments in the 60-70s with the codename MK -ULTRA. Therefore, you will become familiar with the way in which all these devices were designed during the Cold War, and under what circumstances they were developed as a weapon until their incredible evolution nowadays.
High technology, cover-up, disinformation and destruction of human lives. The technology of direct manipulation and remote physical interaction of thoughts, previously unknown to the general public and which was exclusive to developed countries, has already arrived in Brazil and has caused havoc wherever it goes. The Mind Control Technology (MKTECH) is an advanced electromagnetic weapon that interferes with the bioelectric functioning of the brain of any evolved animal on the planet, such as mammals, and that includes us, human beings.
Welcome to the best kept secret of the last 60 years. It’s by far the most important one since the Manhattan Project, a period in which the discovery of nuclear fission and the development of the atomic bomb changed civilization. Today the technology of control, invasion and psychological torture has been doing the same thing. So, prepare to embark on the path of profound transformations in society. We are going to deal with new paradigms never considered in history, which includes the end of cognitive privacy and the content of our thinking.
Invasion and Mind Control Volume 2
TITLE: MKTECH: Invasion and Mind Control – Volume 2
Autor: Author: Felipe Saboya de Santa Cruz Abreu
felipessca@gmail.com
Diagrams: : Felipe Saboya de Santa Cruz Abreu
Text formatting: Felipe Saboya de Santa Cruz Abreu
Illustrations: Eloy Rondon
eloyartes@hotmail.com
Translation: Luene Langhammer Alves
luene.langhammer.alves@gmail.com
Book design: Rubens Lima
https://capista.com.br/
Now on sale in digital format at Amazon. You can read it on any device: Kindle, iOS, Android, Mac, and PC
Introduction
Introduction
In this book, we are going to discuss how technology and science are advanced to the point that electronic equipment directly interacts with the functioning of the brain and its bioelectric functions, all of which is conducted remotely using electromagnetic waves. Moreover, we are going to focus on the people or groups of people who use this technological arsenal to torture, defraud, steal and murder all over the world — or just to have fun with the suffering of others.
All the topics covered in this book are the result of careful research based on scientific approach. They are the result of seven years of direct contact with this technology in full operation, following human test subjects and their suffering, day by day, and unraveling a complex and intricate, macabre system that involves disturbing phenomena and extensive reflections to understand them in order to show the danger to which we are exposed today. We are going to cover the reading of thoughts directly from the brain, theft of information and intellectual property to torture, murder and fraud in civil service competitive examinations.
Microwave antennas, satellites with instruments and sensors specialized in hacking the human brain and invading the mind using several advanced systems, programs specialized in analyzing and monitoring brain waves and their content, thus creating from a distance the most potentially destructive weapon ever developed by humans.
The book is also intended to alert readers to the arrival of this technology and its consequences on society as a whole, as well as the direct implications for humanity’s basic social interactions. It’s a complete violation of our constitutional rights perpetrated by these electronic devices. In their essence, they are modern weapons of the 21st century capable of reaching thousands of people at the same time while they are not even aware of what is happening or even draw incorrect conclusions about such an event when perceived.
As this technology has been in the dark since it was conceived, with restricted access to the military environment and intelligence institutions like CIA, KGB, MI6, BND, MOSSAD, MSS, among others, it’s extremely complicated for people to believe that this type of event is real. Even people with advanced knowledge in science are unable to form a general picture of what is going on in the world lately.
Based on that, I am going to prepare the reader for what is happening behind the scenes of modern society, since we are facing a reality that is difficult to adapt; a fact that will change practically everything that we constitute as societies and their foundations: it is possible to remotely monitor the electrical brain activity of entire regions, or selected parts, through the transmission and reception of electromagnetic waves at several different intervals, which interact directly with the human mind of any individual on the planet. Thus, the ability to read the content of thoughts, to hear vocalized thoughts, to see visual thoughts from visual memories — which opens unique precedents — becomes possible.
Furthermore, they are massacring people across the Earth using the voice-to-skull technology (V2K), a terrible device that inserts sounds and voices directly into an individual’s brain, driving them insane. As if that were not enough, there is still a powerful weapon capable of completely replacing a person’s dreams while sleeping, as if they were a TV broadcast or a computer game, causing unprecedented disruption. This is happening right now with thousands of people.
We are going to discuss these technologies that together make up the Mind Control Technology (MKTECH). We are going to differentiate technologies in terms of their functionalities, that serve for spying, surveillance and unauthorized access to thoughts, and how they are being used for torture and murder. Then we are going to understand the role of the organized crime that was born along with this technology, as well as the techniques used to accomplish shady, hidden goals. Finally, we are going to get to know MKULTRA 2.0, which provides the infrastructure and protocol to carry out attacks on victims, as its namesake — called MK-ULTRA— did in 1950.
This book shows the reality behind this technology hidden from most people, but which has become popular in Brazil and worldwide. We are going to know the most nefarious weapon ever conceived by humans after the nuclear bomb. It’s invisible, can modify and interfere physically and remotely in the mental content of living beings, altering the entire cognitive process. Modifying dreams when we are in deep sleep, changing behaviors, paralyzing animals, reaching thousands of people without leaving a trace and completely transforming society: this is the transformation of human lives at the push of a button!
DOWNLOAD A SAMPLE OF THE SECOND VOLUME IN PDF FORMAT
CONTENTS
CHAPTER 4
MK-ULTRA 1950 – THE ORIGINS OF psycho-electronic/neuroelectronic/electromagnetic WEAPONS AND MIND CONTROL EXPERIMENTS
4.1 – MK-ULTRA
4.1.1 – The Experiments
4.1.2 – Experiments conducted in Canada
4.1.3 – Frank Olson
4.2 – Evolution to “non-lethal” electromagnetic energy weapons
4.2.1 – Delgado’s Researches
4.2.2 – Publications
4.3 – MK-ULTRA and electromagnetic weapons
4.4 – Montauk
4.5 – Summary of Acronyms and Cryptonyms
4.6 – Patents
4.6.1 – Microwave Voice
4.6.2 – Behavior change
4.6.3 – Silent subliminal presentation system
4.6.4 – Transmission of EEG Signals to the Brain
4.6.5 – Radio Frequency Hearing Effect
4.6.6 – VHF and electromagnetic radiation
CHAPTER 5
MKULTRA 2.0 – Mind Control Experiments in the 21st Century
5.1 – The 80s
5.2 – The 90s
5.3 – 2000, 21st century
5.4 – Modern MKULTRA 2.0 – 2001 to 20XX
5.5 – About the Targeted Individual
5.6 – Operators
5.7 – Organized Professional Stalkers (OPS) / Organized Professional Torturers (OPT), Gang-Stalking or “Cyberstalking”
5.8 – Winter Soldier, “Programmed” Killer or “The Manchurian Candidate”
5.9 – Full picture of the MKTECH universe
CHAPTER 5.10
HOW ELECTRONIC TORTURE WORKS IN PRACTICE, “ELECTRONIC HARASSMENT” OR “CYBER TORTURE” INVOLVING ORGANIZED PROFESSIONAL STALKERS, MKTECH AND MKULTRA 2.0
5.10.1.1 – Zero Hour
5.10.1.2 – Proceeding with plan A…
5.10.1.3 – EMR (Electronic Mind Reading), V2K
5.10.1.4 – EMR, V2K, D2K (Synthetic Electronic Dream)
5.10.1.5 – SYNTELE (Synthetic Electronic Telepathy)
5.10.1.6 – EMR, V2K, D2K AND SYNTELE
5.10.2 – My house is the worst place ever
5.10.3 – Car
5.10.4 – Bathroom
5.10.5 – Personal Data
5.10.6 – Trips
5.10.7 – Paranoia
VI – Tips. Rule #1 for psychotronic warfare targets
5.10.8 – Techniques employed by operators around the world
VII – Tips for the targets
VIII – Tips for the targets
IX – Tips for the targets
5.10.9 – Side effects of the attacks
5.10.10 – Peace and Quiet
X – Tips for the targets
CHAPTER 5.11
ADVANCED TORTURE TECHNIQUES USING MKTECH
5.11.1 – Advanced tactics used by OPS using MKTECH
5.11.1.1 – Macabre and resilient companion
5.11.1.2 – Controlling the environment
5.11.1.3 – End of privacy
5.11.1.4 – Bathroom: taking a bath without privacy
5.11.1.5 – Your home becomes the most unbearable place in the world
5.11.1.6 – Surveillance 24 hours a day, 7 days a week, 365 days a year
5.11.1.7 – Cognitive deprivation
5.11.1.8 – Decimate the will/Self-esteem/Motivation
5.11.1.9 – Moral and sexual harassment
5.11.1.10 – Fear
5.11.1.11 – Tension
5.11.1.12 – Maintaining emotional superiority over the victim
5.11.1.13 – Anxiety
5.11.1.14 – Chronic stress
5.11.2 – Electronic Psychophysiological Warfare Protocols (Psy Warfare)
5.11.2.1 – SYNTELE + D2K = a havoc combo
5.11.2.2 – Reliving the past
5.11.2.3 – Night attacks, nightmares and screams
5.11.2.4 – Sleep deprivation, the mainstay of modern electronic torture
XI – Tips for the Targeted Individual — Psychotronic Warfare Tactics
5.11.2.5 – Psychic driving
5.11.2.6 – Thought filter
5.11.2.7 – Keeping the mind busy, “clogging” the primary reception systems with
useless content
XII – Tips for the Targeted Individual — Psychotronic Warfare Tactics
5.11.2.8 – Using hatred to destroy the target, to make them “implode” in their own rage
5.11.2.9 – Ability to cease attention and divert the focus
5.11.2.10 – Classic brainwashing techniques
5.11.2.11 – Intensity of attacks during long periods of exposure to microwave voice (V2K), Synthetic Electronic Telepathy (SYNTELE) and Synthetic Electronic Dream (D2K)
5.11.2.12 – Activity levels
5.11.2.13 – Computerized Swarm Attack
5.11.2.14 – Electronic narcosis
5.11.3 – Advanced and complementary techniques employed in the use of SYNTELE
5.11.3.1 – Mind bridge, electronic transfer of vocalized thought
5.11.3.2 – Hidden interlocutor
5.11.3.3 – Directed murmur
5.11.3.4 – V2K audio for everyone
5.11.3.5 – Crossed thoughts
5.11.3.6 – Echo in thought
5.11.3.7 – Electronic gaslighting
5.11.3.8 – Artificially-induced suicidal ideation
5.11.4 – Torture content
XIII – Tips for the Targeted Individual — Psychotronic Warfare Tactics
5.11.5 – Altering raw brain waves to modify the victim’s behavior
5.11.6 – Consequences of persecution, torture and long-term exposure to the technology
CHAPTER 5.12
Detailed techniques for extracting information from the human memory
5.12.1 – What is memory and how does it work? – part 2
5.12.2 – Information extraction via Synthetic Electronic Telepathy and Intracranial Voice
5.12.3 – Direct interference in memory
5.12.4 – Evoking memories
5.12.5 – Digging up memories
5.12.6 – Complete the sentence
5.12.7 – First impressions and associations
5.12.8 – Disrupting the mental defense mechanism against associations
5.12.9 – Electronic amnesia
5.12.10 – Paramnesia
5.12.11 – Access restriction
5.12.12 – Electronic hypermnesia and memory triggers
5.12.13 – Keeping secrets in the hacked mind under constant MKTECH attack
5.12.14 – Mental defenses against mind reading and invasion
CHAPTER 6
DANGER IN THE USE OF THE TECHNOLOGY (PART 6) – “WINTER SOLDIER” AARON ALEXIS
6.1 – Attack on the naval base
CHAPTER 7
Use of the technology for fraud in civil service competitive examinations
7.1 – The big fraud! The fraud of the century: civil service competitive examinations in Brazil
7.1.1 – The scheme
7.2 – A step-by-step of how this fraud works
7.3 – Radio frequencies and electronic/spectral tracking
7.3.1 – Amplitude modulation (AM)
7.3.2 – Frequency modulation (FM)
7.3.3 – Frequency bands
7.4 – Techniques for sending questions from inside the exam site to the HQ in a secure way
7.5 – Getting questions answered
7.6 – Signals intelligence
7.7 – The steps to take to identify the signals
7.8 – Conclusion
CHAPTER 8
DANGER IN THE USE OF THE TECHNOLOGY (PART 9) – TERRORIST ATTACK ON THE U.S. EMBASSY IN CUBA AND CHINA (HAVANA SYNDROME)
8.1 – Embassy War
8.2 – Official preliminary medical/neurological assessment
8.3 – A summary of the article
8.4 – Conclusion about attacks and known problems with microwaves
CHAPTER 9
COMPUTER SYSTEMS, AI AND SATELLITES USED IN MKTECH
9.1.1 – Artificial Intelligence of the MKTECH system. The Dark Side of AI
9.1.2 – Computational intelligence
9.1.3 – AI – Infrastructure
9.1.4 – AI – Raw brain waves
9.1.5 – AI – Mind reading and emotional states
9.1.6 – Emotions and Feelings
9.1.7 – Distorting the perception of reality
9.1.8 – Answers and surveys
9.1.9 – Conclusion
CHAPTER 9.2
TERRORIST SATELLITES, SATELLITE ELECTROMAGNETIC WARFARE, NEURONAL SATELLITES — SATELLITES, SATELLITES AND MORE SATELLITES
9.2.1 – But what is a satellite?
9.2.1.1 – Types of orbits
9.2.1.2 – Frequencies
9.2.1.3 – Transmitters
9.2.1.4 – Terrestrial and space antennas
9.2.2 – Military/Intelligence/Neuronal satellites
9.2.3 – How many satellites currently orbit Earth?
9.2.3.1 – How many satellites are currently in operation?
9.2.3.2 – Whose satellites are these and what do they do?
9.2.3.3 – The satellites in operation are divided into:
9.2.3.4 – Who uses what?
9.2.3.5 – Earth observation – Intelligence data collection and environmental monitoring
9.2.3.6 – Some relevant data
9.2.3.7 – Multiple uses
9.2.4 – Range of satélites
9.2.5 – Thoughts on Hertz (Hz) frequencies and data transmitted through MKTECH
satellites
9.2.5.1 – Input
9.2.5.2 – Output
9.2.6 – Data transmission techniques
9.2.7 – Conclusion
9.2.8 – National sovereignty and terrorism using space, neuroelectronic weapons
CHAPTER 12
PRESENT, FUTURE AND CONCLUSION
12.1 – Future of intimate relationships
12.2 – Neural computing, Digital neural manipulation or Neural programming
12.3 – D2K – Synthetic Electronic Dream and its thousand facets
12.3.1 – Online (neural) multiplayer matches and Virtual Relaxation Room
12.3.2 – R.E.M Games
12.3.3 – Operating robots and machines unconsciously via D2K
12.3.4 – Cryptocurrency mining and mental data processing
12.4 – A Decade and Century of the Brain and of the Mind
12.4.1 – Regulations and human enhancement
12.5 – Dark Mind Web, Brain Net, Deep Brain Web, Brain/Neural Satellites
12.6 – Kidnapping minds
12.7 – State monitoring thoughts. Cognitive morality police
12.8 – Secret police (as per NKVD)
12.9 – HAARP
12.10 – The future of war
12.11 – Artificial intelligence using MKTECH in the future
12.12 – Final conclusions and considerations