Artificial Telepathy

From…
https://talesfromtheloublog.wordpress.com/2016/07/15/90000-secret-cia-files-on-telepathy-clairvoyance-and-mk-ultra-public/
Artificial Telepathy 101*

Thank you John Finch (This is so factual!)

The experience of “Artificial Telepathy” is really not that extraordinary.
It’s as simple as receiving a cell-phone call in one’s head.

Indeed, most of the technology involved is exactly identical to that of
cell-phone technology. Satellites link the sender and the receiver. A
computer “multiplexer” routes the voice signal of the sender through
microwave towers to a very specifically defined location or cell. The
“receiver” is located and tracked with pinpoint accuracy, to within a few
feet of actual location. But the receiver is not a cell phone. It’s a human
brain.

Out of nowhere, a voice suddenly blooms in the mind of the target. The
human skull has no “firewall” and therefore cannot shut the voice out. The
receiver can hear the sender’s verbal thoughts. The sender, in turn, can
hear all of the target’s thoughts, exactly as if the target’s verbal
thoughts had been spoken or broadcast. For this reason, the experience
could be called “hearing voices” but is more properly described as
“artificial telepathy”.

Now, if artificial telepathy were entirely voluntary, like a conversation
between friends sitting across the room from one other, it might be kind of
cool. One could talk back and forth with one’s friend, exchanging verbal
thoughts exactly as if speaking on the phone, but without ever using one’s
voice or mouth. It’s a completely silent, subvocal form of speech. Between
lovers, this would be beautiful.

The problem is that artificial telepathy provides the perfect weapon for
mental torture and information theft. It provides an extremely powerful
means for exploiting, harassing, controlling, and raping the mind of any
person on earth. It opens the window to quasi-demonic possession of another
person’s soul.
When used as a “nonlethal” weapons system it becomes an ideal means for
neutralizing or discrediting a political opponent. Peace protestors,
inconvenient journalists and the leaders of vocal opposition groups can be
stunned into silence with this weapon.

Artificial telepathy also offers an ideal means for complete invasion of
privacy. If all thoughts can be read, then Passwords, PIN numbers, and
personal secrets simply cannot be protected. One cannot be alone in the
bathroom or shower. Embarrassing private moments cannot be hidden: they are
subject to all manner of hurtful comments and remarks. Evidence can be
collected for blackmail with tremendous ease: all the wrongs or moral
lapses of one’s past are up for review.
Like a perverted phone caller, a hostile person with this technology in
hand can call at any time of day, all day long. Sleep can be disrupted.
Prayers can be desecrated, religious beliefs mocked. Business meetings can
be interrupted, thoughts derailed. Love can be polluted, perverted,
twisted, abused. Dreams can be invaded, fond memories trashed.

The attacker cannot be seen or identified, the attack cannot be stopped,
and the psychological damage is enormous. But there is no physical damage,
not one single mark is left on the body and there is absolutely no proof
that any crime or any violation ever took place! Everything that “happens”
to the victim happens inside the victim’s head. What physical evidence is
there to give the police? Without physical evidence, how can one photograph
the “crime scene” or fingerprint the stalker? There are no footprints
leading to or from the scene. Indeed, there is no physical scene at all,
and no evidence that an attack ever took place.

Most people who experience this abusive form of “artificial telepathy” feel
as if their mind has been raped. They find themselves hunted, stalked,
harassed and abused by a person or persons who refuse to give their names,
who defile one’s mind with the most foul and perverse language imaginable,
and who refuse to hang up or go away. The caller or callers delight in the
perverse and sadistic torture of their targets. Furthermore, they delight
in violating the privacy of their targets, reading the target’s mind and
commenting on everything the target thinks, in an effort to demonstrate as
brutally as possible that the target has no privacy at all.

The callers act, in short, exactly like rapists or perverted stalkers.
Imagine what a man might do if he found a “magic cell phone” that allowed
him to dial into the heads and the private thoughts of anyone on earth. The
temptation to choose a target at random and start spying on or abusing that
person would be enormous, almost irresistable. It could become a sick and
twisted hobby, a guilty pleasure very quickly. Put into the hands of a
secret police unit, the potential for abusing such technology is even more
chilling.

Now, the natural reaction of a normal and intelligent person who undergoes
the horrible experience of mind rape for the first time is to panic and
reach for a real phone. They call family, contact their doctor or call
police with a bizarre complaint that “someone is beaming voices into my
head.”

But if the police are the ones behind the abuse, the victims aren’t going
to get much help, are they? And if the police are not the perpetrators,
then how are they to make an arrest? It’s much more convenient and easy to
believe that the caller is a nutcase.

In short order, the victim of mind rape finds herself or himself undergoing
the additional humiliation of being carted off to the psych ward, often
being committed involuntarily by a loved one “for one’s own good.”

The more vehement the efforts to prove that the voice or voices in one’s
head are “real”, the more smug become the smiles of the medical doctors,
who gently insist that such technology does not exist, that the voices
cannot possibly be real, and that on …

Advertisements

About mstmha

Another Victim Of Gang Stalking...Digging In The Dark View all posts by mstmha

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: