178-Allen Barker Mental firewall
-
Upload
simon-benjamin -
Category
Documents
-
view
215 -
download
0
Transcript of 178-Allen Barker Mental firewall
-
8/2/2019 178-Allen Barker Mental firewall
1/20
freedom of thoughts, beliefs, opinions and expressions
Targeted Individuals Canada
The Canadian Charter of Rights and Freedoms is part of Canadian Constitution that protects its citizens
from human rights violations.
Home
heroes
ti
cases
vids
links
dwnload
read
bks
picspod
archive
Tpe tet to search here...
Home > articles, blog post, news > Allen Barkers Mental Firewalls
Allen Barkers Mental Firewalls
August 20, 2011 HRC
-
8/2/2019 178-Allen Barker Mental firewall
2/20
This is the third of a three-part series of essays on mind control. As the earlier essays explained, mind
control is the term commonly and historically used to describe clandestine operations to alter human
behavior and thought. The series focuses mainly on high-technology techniques involving, for example,
surveillance devices and electromagnetic weapons though victims of all sorts of mind control
techniques have common experiences and sequelae. The first essay of the series, Motives for Mind
Control, dealt with some of the reasons that mind control harassment, torture, and exploitation happens
and why it continues. The second part, Resisting the Mind Control State, dealt with ways to protest
and resist mind control abuses in a supposedly free society. In this final part, I explore some of the
methods and techniques that victims have developed to help them resist these ongoing human rights
atrocities committed every day against their bodies and minds. In a sense we are going to have a look at
mind control torture from the torture victims point of view, from inside the mind of the victim.
This essay is written from the point of view of someone experiencing real torture from externally
induced mind control phenomena, including induced voices in the head, surveillance, harassment from
various sources, and nonlethal aversive jolts. While I make no secret of the fact that I have personally
been subjected to a similar sort of mind control torture, this is not my story. Of course it is influenced by
events I have experienced, but the essay is a composite from my interactions with many mind control
victims (and provocateurs) over the past few years. I will save the actual details of my own experiencesfor my lawyers or for prosecutors when that time comes, or perhaps for other writings I might choose to
make public. Thus, in keeping with the earlier parts of the series, you do not even have to believe me
about my having been tortured though it all happened. There are many people in the world, including
many American citizens, who have experienced very similar things. You can even think that all of those
people made it all up, and still have to be concerned despite your Holocaust denial. The technology
undoubtedly exists right now to carry out the sorts of torture operations described in this essay, and will
only become more advanced with time.
I cover a lot of different techniques and possibilities in this essay, but keep in mind that the truth is bad
enough. What we already know and can document is bad enough, and is only the tip of the iceberg. Inthe spirit of mentioning all the possibilities, though, let me briefly discuss mental illness here. There truly
are some people with mental illnesses which occur naturally. There are also people with mental illnesses
which were externally and purposely inflicted, for example by harassment operations. And there are
mind control victims who are completely normal except that they have undergone years and years of
some of the most hideous torture imaginable in a lying, despicable society that denies it, ignores it,
and further tortures the victims. We know this from documented sources what the government has
admitted is bad enough. I hope this essay will prove helpful even to victims who suffer from true mental
illness. I call them victims also because the cowardly U.S. government has hidden behind the skirts of
the mentally ill to commit some of the worst atrocities imaginable, and the truly mentally ill are
victimized by this as well. The mentally ill are also known to have been used as guinea pigs in mindcontrol experiments precisely because they would tend to be disbelieved and are relatively powerless
victims for torturers to experiment on. Some victims may have been poisoned by drugs engineered to
cause them psychological problems and I do not mean ordinary street drugs. Others have had
psychosurgery, microwave harassment, etc., which can cause organic problems in addition to
psychological problems. And of course, the mind is really not separate from the body and psychological
torture is just as bad as direct physical torture.
Most people are still free to think what they want to the extent that that still means anything and
some will try to second guess the victims and provide armchair diagnoses of the victims problems.
People who try to dismiss true torture victims as just mentally ill will receive and deserve the utmostcontempt from the victims and from those decent people who know what is really going on. And we
will remember. For the reasons described in Part II, the psychiatric and psychological communities
cannot be trusted, except for a few actual healers here and there.
-
8/2/2019 178-Allen Barker Mental firewall
3/20
Much of this essay contains a sort of analysis that it is fashionable among the pseudo-intelligentsia to
dismiss as just black-and-white thinking. These people have their sixth-grade epiphany that not
everything is black-and-white, and for the rest of their lives go around justifying anything convenient
with this amoral relativism. They never realize (or it just does not suit their lies) that while nothing is
black-and-white, some things are close enough that they might as well be. I will be writing about Nazi
pigs, and I mean this in the sense of Mengele the Nazi pig, not any other cultural pig association.
Those who dismiss this sort of thinking perhaps would think differently if they had ever experienced
real torture or were capable of the slightest bit of empathy. There is no doubt that this sort of thinking
has been misused and misapplied at various times, but I cannot worry about how every moron might
misunderstand or misapply what I write. People may well misapply things I have written here, or use
them to create some propaganda distraction from what I am actually writing about, but I am describing it
the way it is. If you dont call a Nazi a Nazi you end up with Nazism by some other name.
Every victim has had to develop his or her own method of coping with the torture. I am not trying to
impose my methods on anyone. A religious person under torture finds strength in his or her religion, so
some Zen Buddhist philosophy may necessarily be apparent in my writing. In the ignorant U.S. there
are still people who will blame a victim for being Buddhist, a major world religion. Of course Mengele
the pig tries to justify and rationalize his acts of torture in any and all ways possible. There are the usualmyriad ways of blaming and smearing the victims and rationalizing away the acts of the torturer.
I hope that this essay will help some victims. I know that I have benefited from the work of other victims
who had the courage to speak out about their experiences. Much of this essay deals with the mental
game of mind control, which is of course not a game at all to the torture victims. You can compare it
to having to face mock executions each day. There is also the physical intimidation many victims
experience. As a victim might put it, if it is all in my head then who harassed me on the highway? Why
did my mail all arrive opened? Why did my phone regularly ring twice a day with hang-up calls? Why
did many of my internet posts stop propagating anywhere? Why did a police car pull up beside mine
every time I talked about China, on the drive to my honeymoon? The unfortunate reality is that thevictims have to develop their own methods to deal with the constant, credible physical threats of death
or worse. I wish I could help there, but I do what I can. This is a barbaric and savage nation.
What is a Firewall? For the purposes of this essay, let me digress a bit here and describe the concept
of a firewall. A firewall, in the historical sense, is a wall built between connected buildings and
specifically constructed so that a fire in one unit of the structure will not spread to the other units. In a
more recent sense, a firewall is a device on a computer network that keeps nodes of the network
separated, for instance so that a hacker attack on one node of the network cannot spread to connected
nodes of the network.
For our purposes, we can consider all the computers on a network to be like houses on a street.
(Network engineers, please bear with me.) Each house has several doors into it, which correspond to
what are called ports on a networked computer. A computer actually has thousands of ports, but the
principle is illustrated by considering a house with several doors. All the houses have inhabitants in
them, who send out messengers to the other houses: But some houses send out the equivalent of
burglars also. When the inhabitants of one house want to communicate with the inhabitants of another,
they send a messenger to a particular door of the house they want to communicate with. The messenger
knocks on the door.
Now, the inhabitants of the house can either open the door and let the messenger in or ignore the knock.If they let the messenger in, they can restrict what he is allowed to do while in the house. The messenger
may, for example, pick up a piece of paper and carry it back to his house. This would correspond to a
file transfer over a network. If the inhabitants of the house accidentally leave a door open, though, a
-
8/2/2019 178-Allen Barker Mental firewall
4/20
messenger may be able to come in the house without permission and do whatever they like, again
without permission. (There are many doors because a messenger occupies a particular door the whole
time he is in the house.)
A firewall, in this analogy, would correspond to a complete facade built around a house (or group of
houses, to be picky). The actual house is not even visible from the street. The doors of the original house
are only visible to messengers if the inhabitants of the house build corresponding doors in the facade. To
enter the house in this scenario, a messenger would have to first knock at some visible door of the
facade, be allowed in, and then knock at and be allowed into the actual door of the house. In this way
the security of the house is greatly increased from unwanted intrusions. (And you can have a collection
of trusted houses inside the fort which are less protected from each other.)
The title of this essay, Mental Firewalls, comes from an article by Timothy L. Thomas which
appeared in the Army War College journal Parameters in Spring 1998. It was titled The Mind Has No
Firewalls. The Army has an often honorable tradition going back to the Revolutionary War, the
minutemen, and so forth. But it also has had and still has some treason in its ranks. This is just the
ground truth, the facts on the ground. An army that tortures the domestic population is an
occupation army. Treasonous Nazi pigs, in this real sense rather than some spin machine crap or some
pathological liars bullshit, must be dealt with accordingly. This holds for all branches of the military.
This holds for law enforcement as well. It holds for all intelligence agencies also. It holds even when
they pretend the torture devices dont exist. Even if the victim does not realize what is happening to
him or her, it is still torture. Informed consent must be truly informed. Torturing an American citizen is
at least as treasonous as selling the nations top secrets to a foreign power.
Thomas article was in fact entered into evidence as part of a lawsuit by Harlan Girard of the
International Committee for the Convention Against Offensive Microwave Weapons. The articles
central metaphor is that human beings are like the computers on a network, except that they do not have
the ability to control the information traffic entering and leaving them. Their ports, or doors, are wide
open. This sort of analogy was prevalent during the military information warfare buzzword phase, and
illustrates the sort of thinking that was going on at the time. [On a note of caution, not all of Thomas'
article should be taken literally whether purposefully or not there is some likely disinfo there.]
Deception Operations Against the Human Biocomputer What is it that corresponds to your
reality? What do you perceive, and how do you make your decisions? You receive information through
your eyes, ears, and other senses. You read the information from the writers you choose to read, and
listen to the speakers you have access to very often these days from TV, radio, or the internet. You
think to yourself, in your private inner voice. You visualize and imagine. In information warfare against
individuals all of these are thought of as nothing but information channels that can be blocked, censored,co-opted, faked, forged, impersonated, or otherwise controlled to manipulate an individual. If you can
control all the information an individual receives then you can control their whole perceived reality. Like
the hypnotized subject who does something which violates his ethics while being persuaded to imagine
he is doing something else entirely, the information warfare subject is acting in a fantasy world created
precisely to manipulate him to do what his controllers want. This is known as a deception operation.
Such complete control, as far as I know, is not yet possible, but the principles still hold for whatever
approximation can be achieved. And the principles have been put into practice. Of course information
warfare is a buzzword and most of it is just a take on the ages-old practices of propaganda, lying, and
manipulation. But a new buzzword generates funding, and perhaps more importantly serves to morallydistance the new clean practices from the dirty, filthy business of amorally manipulating human beings
like pawns, with complete disregard for unalienable human rights. What was new at the time of
information warfare was 1) the internet as a widespread societal force, and 2) the wider development of
-
8/2/2019 178-Allen Barker Mental firewall
5/20
neuroinfluencing and so-called nonlethal weapons that can directly influence peoples brains.
As medicine and technology develop ever more advanced prosthetic devices, people will increasingly
become cyborgs as is already happening. Because of this trend these issues will become increasingly
clear with time. That is, it will become increasingly common to have computer devices implanted in
ones body. If someone hacks into your home computer and steals or manipulates your data then a crime
has been committed and you should rightly be angry. But if someone hacks into your physical body,
brain, and mind the violation is incomparably greater.
The Basic Modern Mind Control Torture Operation In this section I will describe the basic torture
setup used against our hypothetical, composite mind control torture victim. The focus is on the effects
that the victim experiences, not necessarily the particular technology that is used to inflict it. Remember
in all of this that the torture any individual receives can vary. It will vary according to the torturers
motives and technology, but will also be tailored to the psychology of the victim. What might bother one
person would not bother another. The professional torturers will start according to how their torture
manuals say to go about torturing someone with your profile, but almost all torturers will refine the
torture to the individual if they can. As they learn what bothers you they can focus on that more and
more in their torture. As you read this, keep that in mind. These torturers are not any different from the
sort you might read about in Red Cross literature, who shock the genitals of victims, etc., except that
they have access to abuse the most advanced technology and hide behind an evil U.S. government
which sinks to the lowest common denominator of the torturers it protects.
First of all, the victim is under constant surveillance. The victim is harassed overtly and covertly, on the
street, on internet, etc. All forms of taunting and goading tend to occur. For example, there is a Marco
Polo type of can you catch me taunting. Any and all sorts of high-tech and low-tech harassment are
used. (Just because it is sophomoric or pathetic does not mean they will not do it. In fact, this increases
the likelihood that the victims will be ridiculed if they complain. Remember the shoe powder to make
Castros beard fall out?) The victim soon has to wonder about everything that breaks or goes wrong in
their lives. The harassers use their surveillance to see what troubles the victim is having and then try to
take credit for causing them. The torturers are often arrogant and even incompetent at their vile torture
jobs despite using the most advanced technology to commit treason.
The victim is purposely isolated. People close to them are threatened or deceptions are created to make
the victim suspect those closest to him or her. Deceptions are launched so victims will blame innocent
neighbors for the harassment. (Unfortunately, in the despicable circles of mind control torture, it
sometimes is a neighbor or even a close family member that truly is responsible. There might be an out-
of-control safe house next door, for example.)
The victim is zapped inside his or her home (or a deception operation is launched so the victim thinks
this is what is happening). Heart rhythm palpitations induced by remote technology can cause terror to
an individual inside his or her home.
The victims mind is under assault with voice projection, voice cloning. The Village Voice, in an article
from July 2001 titled Psycho Warfare, described an Air Force report uncovered by Nick Begich.
Quoting from the articlethe technology may be able to create high-fidelity speech in humans, raising
the possibility of covert suggestion and psychological direction. It may be possible to talk to selected
adversaries in a fashion that would be most disturbing to them. This is exactly what they do, and there
are several different technologies documented in the open literature which can achieve this. Some
victims may be test cases for such psychological harassment techniques, or the method may already be
perfected and in covert operational use. [They don't mention this in psych textbooks or in movies
about "schizophrenics," do they?]
-
8/2/2019 178-Allen Barker Mental firewall
6/20
Twenty-four hours a day, the victim is subjected to commands, ridicule, and distractions inside his or her
private mind. How would it feel if you heard a voice in your head asking, Can you hear this? as if
someone were calibrating a torture device? The brain wants to respond it was never meant to be
violated in these ways. Interrogation. What might bother you? Any secrets, etc., the pigs might tease out
and harass you with? Anything that would insult you they could focus on? Anything that might distract
you they could keep you distracted with?
Finally, the victims supposedly private, subvocalized thoughts are somehow read, or inferred and
analyzed. There are various levels at which this can occur, from remote heartbeat and eye gaze analysis
all the way up to brain implants telemetering EEG signals. Not all victims report this level of
surveillance, and certainly just the other harassment techniques mentioned above result in a grotesque
human rights abuse. But many victims discover that even their supposedly private thoughts are being
violated and manipulated.
Living with Constant Harassment How do you deal with ordinary social interactions with the
pigs harassing you constantly in your mind? Do you act ethically and warn everyone you interact with
that their privacy is also being invaded, by way of you, against your consent? People you interact with
either believe you or they dont, but either way the social dynamic is completely changed. The pigs
invade the privacy of everyone around you, by using you, even that of your spouse and children. They
may also impersonate anyone you see, in your mind, to make it seem as if that person is the one
contacting you. They try to make it seem like everyone can hear your private thoughts, that you are
broadcasting to everyone. (Of course some victims might actually be doing that if they can read your
thoughts they could then broadcast them wide-field or local-field)
What sort of career are you allowed to have in a system where your intellectual property is stolen the
minute you think it up and where you have to cope with both regular harassment as well as
harassment in your mind? All this is in addition to the ordinary stresses of the job and not to mention
that some jobs require actual mental concentration. How sociable are long-term harassment victims with
serious cases of Ongoing Traumatic Stress Disorder? In American society there are also plenty of
vicious jerks who, while not Nazis or torturers, are quick to sense perceived weaknesses in people and
home in on them. The Nazis can often just wound a person and then throw him or her to the sharks,
bleeding.
It is natural for humans to think about other people. It is even natural to run a mental simulacrum process
to imagine and empathize with other people. Monkey see, monkey do, air guitar, I was just thinking of
you etc. The rapist pigs try to turn this against the human beings they torture. Sex is also a natural
process, as is farting, masturbation, defecation, burping, spats with people, fantasy, and so forth. The
rapist torturers try to turn this against their victims. They constantly attempt to demean their victims.Worrying and anxiety are also normal human emotions. The torturers, though, try to turn all of these
human properties against their victims.
One technique the Nazi pigs use is to try to reinforce anything you might worry about or feel anxious
about. It is like taking a dynamical system and driving it at its natural frequency in order to purposely
destroy it. Of course this is not to say the idiots know anything about dynamical systems. If you ever
read Lord of the Flies in junior high school you know about the level that these pig idiots operate at, but
when they rape your brain to inflict such ridicule and hatefulness it sets up positive feedback processes
in the brain that constitute torture. (If I am teaching these idiots anything by this, then you had better
watch out because they have already tortured me.) They will purposely injure you and then pick at yourscabs if you start to heal.
This process also happens because you know damn well you are under surveillance and the pig ridicule
-
8/2/2019 178-Allen Barker Mental firewall
7/20
squad is there to taunt you. Try not thinking about something you are conditioned with cattle prods
into knowing will result in harassment. You know the torturers will zap you that is why they goad
you with triggers at times but it is like not thinking of a pink elephant on command. Yins produce
yangs, so to speak. Transcending the yins and yangs is hard enough without the torture.
The torturers treat your personal, private, internal speech as if it were your public speech. They try to
subject you to all the ignorance and political correctness and everything else that someone at a podium
in a public place might be subjected to. The sadist nanny state is not just concerned with what you say in
your own home, they want to regulate what you think inside your head also. That can really cause your
moron anticipator thought pattern to distract from your normal private thinking, because you cannot
even think your private thoughts without knowing they will be reviewed for you by rapist morons.
The Possibility of Magician-Like Illusions to Deceive Victims The technology for thought
inference does exist, but it is important to keep in mind the ways in which magician-like deception
operations can be applied to a person to make it seem to them that their mind is being read. While some
victims thoughts are read, all of these techniques have likely been tested on nonconsenting American
citizens. The classic example is where the magician first subliminally inserts a thought into a victims
brain and then later the magician reveals what the person was thinking. By waving his hands and
strongly suggesting to the victim that his thoughts are being read, the victim sees the phony evidence
and tends to believe that is what is happening. The outrage, indignation, and terror responses the victim
is feeling will also tend to interfere with his or her reasoning processes. Advanced profiling and
prediction, based on standard surveillance techniques, is another possible means for deceiving a person
into thinking their mind is being read. While some victims have undoubtedly had such deceptions
inflicted on them, the black budget torturers before they will admit the true extent of technological
advancement will likely try to claim this is what was done in all cases. Purposefully setting up the
illusion of mind reading on a victim, though, is every bit as despicable and criminal as actually doing it.
The setup for the elementary example above can be carried out with only a basic voice-to-skull
projection device with the victim in range for some period of time. Suppose you wanted the victim to
think about blue violets, for example. You could beam at the victim very quiet suggestions of blue
violet. You could send them a song that they thought just got stuck in their heads. You could use voice
cloning technology and try to fake their own voice in their head. Another technique is to transmit a word
or phrase that is closely associated with what you want the victim to think about or do, and let their
brains associative memory do the rest. Now, after the subliminal send, the tension and drama build until
the sadist magician culminates this particular deception operation against the mark (a.k.a. human being).
The magician sends an email to, say, a public mailing list the victim is known to read. In the text of the
message the magician works in the phrase blue violet perhaps combined with a subtle threat.
Multiple Victims, Multiple Perpetrators The above example is only the most elementary, of course.
What if two victims were interacting, how could a pair of them be manipulated? The variations include
two nonconsensual victims, or a consensual harasser messing with a nonconsensual victim. There are
also witting and unwitting victims some have figured out parts of what is going on (intended or not)
while others have not. Some have been purposely duped into misinterpreting what is going on they
may think they are psychic, for example. What about wide-field projection devices? If two interacting
people are given the same subliminal stimuli, how might they interpret it? If you werent paying close
attention, would you know if you were the sender or the receiver? Especially if the manipulation
continued for a long period without your awareness, perhaps even from childhood. When PTSD is
purposely induced, the victim is that much more susceptible. Then you can consider the case wherethere are far more than two victims interacting: a society of would-be slavemasters and those they would
hold as slaves. The general situation involves multiple victims and multiple perpetrators, all interacting.
-
8/2/2019 178-Allen Barker Mental firewall
8/20
There are many, many different scenarios. I even considered writing an academic paper on the topic,
something like Mind Control Games People Play. Suppose you assume a particular set of
technologies is available. What logically follows from that? It is like science fiction except that the
reality these days is beyond science fiction. The military might call it wargaming. It is amazing the
hideous sorts of operations that are possible with only your basic secret video/audio surveillance of an
individual. Now assume that a targetable voice projection device exists. What could the people
controlling it do in the worst case? What sorts of deceptions could they carry out? What
countermeasures could be adopted? When it really does exist and the consequences are so far-reaching,
isnt it unconscionable to leave the public in the dark about it? Could a politician resist abusing this
secret power?
For the purposes of the rest of this essay I will assume our composite victim has been injected or
implanted somehow with a brain bug that transmits tracking information as well as audio and video of
the sights, sounds, and internal subvocalized thoughts the nonconsenting victim experiences. This is
something like an advanced form of the CIAs Acoustic Kitty project from the 1960s, where a cat was
wired up as a motor-controlled listening device to be used in spying. The difference is many years of
technological refinement integrated circuits were not even available then, let alone nano-scale devices
and the obvious difference that a human being is being tortured. I assume that this device can alsoinject sounds which the victim perceives as if he or she heard or thought them in internal speech.
This is somewhat less control than what some victims report experiencing, but nonetheless is sufficient
to illustrate most of the methods. Even if such devices are not available to some particular group,
variations of most of the techniques can be created by lower-tech methods like standard surveillance
devices and external zapping or voice projection devices which are publicly known to exist. The point
is not the particular technological implementation, but what the victim experiences.
The Realtime Idiot and the Autopig The term I use for an external voice projected into a victims
mind is the realtime idiot. For an illustration of what the realtime idiots seem like, consider a secret
studio like at a radio station. The DJs in this case are the rapists monitors who sit and listen to theviolated thoughts of the victim. These torturers also have microphones where they can converse with
the unfortunate victim in realtime. The victim hears these transmitted voices in his or her head. Perhaps
the rapists also have a virtual reality computer display of everything the victim is doing at the time, or
even a display of exactly what the victim sees through his or her eyes. Any thoughts the victim has,
the realtime idiots try to pretend it is like a conversation with them. You could not think a rhetorical
question to yourself in your own private thoughts without the realtime idiots comments. You could not
pause for a moment of silent mental reflection. They comment on things, they harass, they goad, they
distract, they try to issue commands, they attempt to demean the victims (Go brush your teeth). This
all while the victim tries to live his or her regular, ordinary life and interact in the phony society.
At this point I have described the technique whereby Nazi pigs beam words and voices into the mind of
the victims in order to harass and torture them. This requires too many low-level Auschwitz guards,
though. These dumb sadists may get drunk and start talking, or they may get religion and try to expose
their former activities. The need for personnel also limits the number of victims, or subscribers, who
can be controlled by the system. The American answer, of course, is to use technology to automate the
process and increase productivity. This results in a device I call the autopig (or the Cameron/Delgado
memorial autopig).
The autopig at its simplest is just a digital recorder that sends fixed messages to the victims at random
times. This is very similar to Camerons psychic driving torture that he inflicted on people coming in forpsychiatric health care. I sometimes call these random pulses Bergeron pulses after Vonneguts short
story Harrison Bergeron (not the movie, which is good but different from the short story). In the story
all people were forced to be equal by handicapping those with exceptional abilities, and strong
-
8/2/2019 178-Allen Barker Mental firewall
9/20
thinkers had to wear a device which would periodically emit a loud tone designed to disrupt the their
thought stream.
Of course an autopig could also be used as a computer-aided torture device so that a single human
torturer could switch between victims, secure in knowing that none of them was being left alone in their
private minds. The Delgado part comes in when the device gets feedback from the victims brain and
sends an appropriate message. That is, the sensor system analyzes the brain rape data, an AI-like
algorithm decides what sort of response to send to the victim, and then the digital voice simulator
constructs it and sends it. Thus each victim has his or her own electric fence or something like the
invisible fencing they use on dogs but more technologically sophisticated. (You can consider things like
stateful autopigs and stateless, or memoryless, autopigs, and so forth. It is basic engineering.)
Besides realtime idiots and autopigs, there is something I call a Delgado button. A Delgado button is a
button the harassers can press and which stimulates some part of the brain. There may be many Delgado
buttons, for example, and the harassers learn what each one does empirically by observing the victims.
To the victim a Delgado button would just feel like some sensation, experience, or emotion came over
them all of a sudden. It might occur at a particularly inappropriate time, for example. It might also serve
as a distraction when the pigs wanted to stop some particular thought train you were having. It might be
difficult to notice some subjects in published research would rationalize such induced behaviors and say
that they just decided to do whatever behavior the buttons evoked. A Delgado button also need not
literally be a button and a brain electrode, it could also be something like a microwave beam at a
particular frequency and with a particular modulation aimed at a person. Metaphorically there can also
be conditioned software Delgado buttons in addition to the hardware wired-in electrode buttons.
Data Analysis Under Torture Now that I have described the basic mind control operation, in this
section I consider the problem of data analysis for a victim of such crimes. Dont blame the victims try
to understand the hideous position they were thrown into and which they in no way got to choose.
Naive science-dude has probably not spent 5 minutes considering what victims are forced to agonize
over for years. The situation is closer to game theory with a malicious opponent rather than to the
usual study of natural science, where natural phenomena are considered to be repeatable (or at least
indifferent).
The victims must rely mostly on their own sensations and introspection that is just the nature of this sort
of advanced, secret torture. This is not to say that evidence of the ordinary sorts of harassment should
not be collected, or that a breakthrough will not occur and someone will learn how to detect whatever
signals or devices are used to inflict the mind control torture and make it available to the victims. The
first challenge for the victim, though, is just to figure out what is really going on. Many do not even
have the language to describe what is happening to them. They have to see beyond the stagecraft(tradecraft) of the Nazi technical illusionists. The victims need to live their lives each day with
whatever mental firewall countermeasures they can adopt in their minds. Beyond this they can gather
evidence to convince other people or for a lawsuit. They will discover, though, that for the time being
the court system, like the psychiatric system, is part of the problem.
How many times does someone have to beam a clearly external voice into your head before you have to
question all your thoughts? Not too many times, once really. Some victims of this one-shot voice
projection mind control may still suffer for years. When will you believe they are not reading your
thoughts or that they are not trying to manipulate you? When the truth commission reveals the crimes?
No, you will never believe them again once you know how the pigs operate. Most victims suffer fromfar more than just one voice projection experience, though.
Internal and External Thoughts and Sensory Inputs Inside the mind, the torture victims really are
-
8/2/2019 178-Allen Barker Mental firewall
10/20
human beings just like everyone else (even though they are treated worse than anyone would treat a
dog). They see with their eyes, hear with their ears, etc., have internal dialogs thinking about things,
sparks of intuition, and all the usual features of the human mind. As mentioned earlier, these are the
processes the mind controllers attempt to hijack. For the victims we can consider that their thoughts fall
into three categories: internals, conditioned internals, and externals.
An internal is a normal, natural thought grounded in external sensory input that the person consensually
engages in. The usual thought model that most people have the luxury of believing is that all of their
interactions are consensual and that their private thoughts are actually private and not tampered with.
That is, they only experience internals.
An external is a nonconsensual input, like Camerons psychic driving where a person is strapped down
and forced to listen to manipulative recording loops. In the modern sense, the externals are the voices
projected into a persons mind from an external source. (You can theoretically have consensual
externals, even of this sort, but the victims certainly never saw a consent form and youd be a fool to
consent to having the pigs the victims are familiar with have anything to do with your mind.) The signal
from a programmed autopig chip in the head would also count as an external. An external could also be
an email from a Nazi that is based on mind-raped data. Any normally consensual interaction becomes an
external when mind-raped data or psychological triggers are purposely embedded there.
A conditioned internal, in the sense being discussed here, is an internal thought process that is a direct
result of the torture by externals. The mental fruit of the poisoned tree, so to speak. After a week or so
of having you are a good marine drilled into your head from nonconsensual externals, then when the
machine is turned off there will likely still be the tendency to hear the phrase. (Besides whatever other
damage such harassment causes.) This is especially true if the conditioning was specifically focused on
certain stimuli though random stimuli also become conditioned in the same way that a bell ring is
associated to the bowl of food by the salivating dog. A similar-sounding phrase, for example, can serve
as a trigger for a conditioned internal. Conditioning during trauma is also strong and long-lasting and
can bring back vivid feelings of the original torture experience.
The manipulators can probably get some unwitting victims to march around their own homes like
controlled robots. Peoples sensitivity to what is internal or external in their head would vary
according to the person. Age, length of abuse, and the particular technology and techniques used would
also influence who becomes witting nonconsensual. Perhaps this is a part of what determines who
they harass and try to break and who they secretly control. Those susceptible to hypnosis might be
especially vulnerable, and some victims may be influenced only while they sleep. (Is it terrorism to call
for blowing up a Nazi torture center that doesnt exist?)
The Protocol A way to verify that a signal is purely external is via the protocol. This protocol
assumes you have a cooperative person on the other end of the external channel you wish to
authenticate. In practice, what you learn is that if there is such an external channel you do not have a
friendly witting on the other end. (And victims know from long experience that there is such an
external channel.) That is, the protocol is a way that a friendly witting could authenticate to you the
existence of an information channel that supposedly doesnt exist.
If you have visual, auditory, or tactile contact with a person the protocol is easy. (It is better if they
cannot see or hear you, since that constitutes another, uncontrolled data path.) Suppose you can hear a
person talking. Then the protocol is to think to yourself something like, say 4533. You may wish to
choose something else they could say without attracting attention, if that is a problem, but be sure it is
something which is very unlikely without a mental send. Count, say, five seconds for a response. Either
they hear your thoughts or not, and they either respond or not. In this case the channel is specific to a
-
8/2/2019 178-Allen Barker Mental firewall
11/20
person and may not exist or the person may not be a friendly. For visual contact the situation is
similar, you can think something like, hold up three fingers. Notice that this protocol also works for
something like listening to a realtime broadcast such as radio. A similar protocol works for written
media, think write the number 6423 and email it to me or put it in your newspaper column. Note,
though, that in all cases there may still be a hidden man in the middle.
You can actually verify a pure external send and receive without visual, auditory, or tactile contact. Just
the mental contact. This applies to anyone and everyone who can hear your thoughts and send a
reply. It requires that you have a calculator, and a cooperative person with a calculator on the other end
of the channel. The protocol is, What is the cosine of 1999? The first four digits after the decimal, in
radians, one at a time. If the pigs cannot send that data they are either retarded or engaging in a
conspiracy. There are a couple of other possibilities, including pure internals, but the point is to have a
cryptographic authentication challenge to verify a pure external send and receive. Anyone can punch the
buttons 1, 9, 9, 9, cos on a calculator. I do not know the answer, but I can check it easily. [You should
change the number 1999 to something else for your own protocol, since you want to be able to conclude
a pure external read and send. The number is something you only think "to yourself," and choose a new
challenge number each time you check a response with a calculator.]
They never send valid four-digit numeric data, let alone the correct answer. They do send numerics,
though, and could presumably program the answer into the autopig. And they get sloppy sometimes and
you get a good strong piece of data that indicates external reads and sends, even though they do not
send the protocol. This is one reason such a protocol is useful: It illustrates what the ideal data would
look like for a remote read and send, and can help clarify more ambiguous situations. But keep in mind
possible magician-like deceptions as were mentioned earlier.
The Calibration Problem In evaluating uncertain data in the real world, including that from hostile
sources, it is important to calibrate the expected level of background noise. If you are reading the torture
between the lines, you also need to keep your head and not go off on too much unconnected symbolism.
Keep this in mind when reading items that truly could not possibly relate to you or your situation. This
gives you an idea of the basic background level for symbols, etc., to appear. Keep a threshold and
discard any questionable data. The good data points tend to be frequent enough, and at some point even
they do not tell you much you do not already know.
As an example, suppose you cursed the pigs, just in your head, sometimes. If you get them angry they
sometimes screw up. Say you were taunting them by asking them whether they picked up your thoughts
in Niger (as an random example of a far-off place). By the way, you can taunt them all you want in your
head, since it is only you and the Nazis there. Likewise, curse the pigs that bug your house all you want.
They just do not seem to understand that if they reveal anything they know about your private mentationor private conversations in your home they cannot call you crazy. It would be like entering the FBI tapes
of Martin Luther King saying the FBI was out to get him as evidence that he was paranoid. The voice
in my head said I was crazy. Back to the Niger example, suppose you then get email from someone
claiming to be a victim, who has a name very similar to yours, and who claims that he went to Niger and
could not escape the harassment. That seems pretty unlikely for a coincidence. Then the question is, is
the person a witting or unwitting harassment agent, i.e., is it another victim manipulated into harassing
you or is it a cointelpro agent? How many people have been to Niger? Many victims are understandably
afraid to talk about such experiences, though.
Reasoning Under Uncertainty One thing that the mind controllers do and which manipulatorsand propagandists have done for all time is to exploit weaknesses in human reasoning. The brain is a
fantastic, beautiful organ of the human body no human being on the earth should ever be tortured. But
humans also tend to have some weaknesses in evaluating data compared to, say, a mathematical
-
8/2/2019 178-Allen Barker Mental firewall
12/20
algorithm. One difficulty lies in dealing with uncertainty. The mind control victim is literally
overwhelmed with uncertainty and must sort things out as best as he or she can. The victim has to
consider every weird thing that has ever happened to him or her, whether it is related, and knowing that
the mind rapists will see this thought process and try to reinforce any misconceptions. Another difficulty
is dealing with distractions, especially when they come in on a hostile channel that the brain was
never meant to be accessed on. Proportionality and scale are another difficulty, and people tend to think
binary rather than continuous, and one-dimensional rather than multi-dimensional. People often have a
tendency toward superstitious thinking. Finally, in a social sense, people are very bad at dealing with big
lies, i.e., conspiracies of liars.
Understand aggregate statistics. You can sometimes reason better with them. As an example, you know
that there are some people in the world you can trust you just dont know exactly which ones they are.
You can often estimate aggregate statistics better, since if you get one wrong here or there it all averages
out. Suppose you estimate, based on a great deal of data, that posters on some mailing list are, say, 40%
agents and provocateurs, 35% real victims and activists, 15% who probably consider themselves
scientific, nonsuperstitious thinkers looking for the truth, and another 10% who are unclassifiable. There
are some who you are sure enough about to not worry with percentages, but in general any particular
person on that list is suspect. Nonetheless, the list can still function as a way to reach and connect the35% of mind control victims and activists. It may also serve as a way to convince and educate some of
the actual open-minded decent people who are not mind control victims. Another use of aggregate
statistics is to reason from historical records. We know that there are thousands of mind control victims
in the population, at the least. We just do not know which particular people claiming to be victims are
the actual victims (or which still unwitting people were/are victims). Never forget the humanity of the
real human beings involved in the statistics, though.
The Asymmetry of Dignity You are a human being with unalienable human rights. Unalienable
means that they cannot be taken away. They can be violated, infringed, ignored, and even legislated
away, but the acts of a tyrant do not change the fact that you are a human being with unalienable humanrights. This means that the tyrant is always a tyrant, and remains a tyrant, to meet the fate of tyrants. The
same holds for the lackeys and collaborators of tyrants. This is a fundamental asymmetry between the
citizen and the tyrant.
Torture demeans the torturer. The dignity of the torture victim cannot be taken away by the torturer, but
the act of torture destroys the dignity of the torturer. This is not enough punishment for such hideous
crimes, but gives cause to pity the torturer even as you work to hang the pig. Let me explain about what
I mean about justice for the victims of these treasonous Nazis, who commit crimes against their fellow
American citizens in peacetime which would be war crimes even against an enemy in warfare. Under a
legitimate government such people would receive life sentences in a humane prison system. That wouldbe my preference, but the United States currently has neither. So when I talk about hanging the pigs I
am referring to whatever justice-type processes can be set into motion. That was the subject of Part II.
Get the right ones. We will not forget, and when these pigs are 75 years old they are still Nazi pigs and
still serve the rest of their worthless lives in a humane prison cell if such exists. The legitimate
government treats mind control torture like the true crime it is, even when government agents are
involved in committing the crimes.
You have absolute free mentation in your brain and mind. Your freedom of thought is unalienable.
The Nazi Pig Theorem The adjective, Auschwitz-level, to describe these crimes, is not hyperbole.If you do not feel like you need to vomit, you probably do not really understand the full sickness of
mind control crimes. Gordon Thomas wrote in the introduction to his book Journey Into Madness: The
True Story of CIA Mind Control and Medical Abuse: In working on this book I have had to come to
-
8/2/2019 178-Allen Barker Mental firewall
13/20
terms with my own emotions disbelief, bewilderment, disgust, and anger and, more than once in the
early stages, a feeling that the subject was simply too evil to cope with. Nothing I had researched before
could have prepared me for the dark reality of doctors who set out to deliberately destroy minds and
bodies they were trained to heal. Torturers can never blame their victims, though they invariably try.
These torturers are the sorts of people who will repeatedly hit a bound and gagged victim with a stick
and then try to claim the victim caused it. Theyll steal from you and then complain about the property
they stole theyll rape you and sneer at the quality of the sex.
This brings me to what I refer to as the Nazi Pig Theorem (NPT). Strictly speaking it is a metaphorical
axiom, but it can be very useful to the torture victim. It basically asserts that if you act like Mengele then
you are a Nazi pig. Then there are a few obvious conclusions that are also part of the theorem.
The Nazi Pig Theorem (NPT):
Anyone who nonconsensually violates your brain/mind/mentation using Mengele-like methods is
a Nazi pig.
You do not care what a Nazi pig thinks. You do not care about a Nazi pigs opinions. You do not
respond to a Nazi pig ridiculing you, threatening you, trying to distract you, or otherwise trying tomanipulate you.
You work to get a Nazi pig hanged.
Isnt that obvious? Dont you believe it? Then remember it and act like you know it. NPT is as sharp asa razor.
The contrapositive of NPT is also useful: If they are not Nazi pigs then they are not raping your brain.
-
8/2/2019 178-Allen Barker Mental firewall
14/20
So you can think anything about anyone its just you and the Nazis in your mind, and their opinions do
not matter at all. If you have a passing thought about someone and the Nazis try to harass you with it or
make you feel guilty about it, it does not matter. The Nazi pigs opinions do not matter (unless they
somehow help to get the pigs hanged). If you think some thought about someone who really is raping
your brain, then you have some worse things to think about that Nazi piece of human garbage than what
floated through your brain originally.
One use of the Nazi Pig Theorem is to try to go on with ordinary life even as you are being tortured and
you know the true, evil nature of the society you are living in. Spend some time each day working for
justice in the physical world, and the rest of the time try to ignore the Nazi pigs and get on with your life
as best as you can. My philosophy is basically to wish people well, and any differences I have had with
people are all water under the bridge after not too long. But atrocities never, ever pass under the bridge.
The victims never forget, and never should forget. Of course any victim is free to choose to forgive his
or her torturers, but for torturers to lecture their victims about forgiveness is the Christianity of the
oppressor. Forgiveness also does not preclude justice.
The unfortunate reality is that when dealing with anyone, they are either a Nazi or a non-Nazi. Torture
makes it that clear. This is the top node of the decision tree for the torture victim, and it is a stark split.
The following diagram illustrates the split:
That is clear enough. Of course the difficult part is that you do not know exactly who is a Nazi pig and
who is not. So you might start off with a reasonable benefit of the doubt and collect evidence from there
to update your current assumptions. But how do you deal with someone you think has a 10% chance of
being a Nazi pig? How do you deal with someone you think has an 80% chance of being a Nazi pig?
That is your own utility/decision function and it is not easy. People have to make decisions based on
imperfect information all the time, but this purposefully inflicted torture pushes it past what people are
-
8/2/2019 178-Allen Barker Mental firewall
15/20
accustomed to have to deal with in ordinary situations. Nonetheless, the government is accountable for
the aggregate situation where torture occurs regularly and systematically in American society.
The NPT is your firewall. As a corollary, the external firewall theorem states that you do not care
in the slightest bit what Mengele thinks. Analyze the external incomings for nature and source, as
well as for other evidence if you choose to, and then send them straight to your mental /dev/null.
Then work each day to get the pigs hanged in the real world, in the best way you can figure to do
it (see Part II). There is also an internal firewall theorem: Your brain is your own to think
whatever you want with. Simply invoke IFT and think about something entirely different if you
are thinking something that you dont want to be thinking about. Train yourself toward that, at
any rate.
Some Suggestions for Thinking about the Harassment The way to think of a nonconsensual
external is as an advanced cattle prod that can be modulated in various ways to cause you pain. The
modulation happens to be with words or clicks, but that is secondary. It is a modulated cattle prod.
Notice it and try to get a feel for the nature and source of the signal. Where does it seem to be coming
from? What is the quality of the signal? Later you can analyze the psyop sentence the pigs modulated
onto the cattle prod signal if you feel like it. (This may reveal more about them than about you the
modulation is based on you reflected off of their filthy Nazi distorting mirror with their intention
being to cause you harm.) You might keep a rough histogram count on the autopig phrases, for
example. Does the signal ever have a foreign accent or speak a foreign language? Probably not. But
basically understand that the Nazi pigs are complete, pathological liars. If they flatter you one second
theyll kick you in the head three beats later, you can almost count on it. Pathological liars only tell the
nominal truth as part of a larger lie, and the purpose is to destroy your mental well-being and your life.
Source before semantics (signal before semantics). The source is where the signal comes from, both the
person sending it and the sensory input method by which you receive it. The semantics is the meaning
of the signal: it is the interpretation of the signal and its modulation. For example, the semantics of a
signal will often be its interpretation as an English sentence. If the signal comes in on a rape channel, do
not even give it a semantics except perhaps as part of an evidence-gathering process. It is just a sensation
you feel from the external cattle prod. The presence of the nonconsensual external signal itself is torture
and is the only real information, since the modulation is by pathological liars whose intention is to cause
you harm.
Dont debate the autopig (or the realtime idiot). Even if its easy. (Unless you feel like it.) They hate it
when you ignore them. Go on with your ordinary life, meeting people, etc., and especially speaking out
and working for justice in the real world. You can only really ignore them when you know what is
going on, though. Some of the people who they march around their own homes like robots probablythink they are just ignoring it. There is a big difference between an experienced victim deciding to
ignore future signals and some well-meaning advice-giver who has never been tortured telling you to
just ignore it.
If it is indistinguishable from an autopig, treat it as if it were an autopig. With some basic voice-
recognition type software applied to raped subvocalized thoughts, I could write an AI-like program that
sounded just like the repetitive, simple-patterned Nazi pigs I am familiar with. In this sense, the realtime
idiots do not even pass the Turing test. Actual people (who are not torturers) have names, they do not
repeat things endlessly, they think things other than harassing you and commenting on your thoughts,
and they can push a few calculator buttons. For instance, why do you never hear someone driving theircar down the street thinking use a turn signal, you asshole?
Dont explain your thinking to the Nazi pigs, it is better if they misunderstand what they rape from you.
-
8/2/2019 178-Allen Barker Mental firewall
16/20
By default you are only ever thinking to yourself. Work toward the rapid extinction of the Nazi
conditioning imposed on you, at least as rapidly as you can manage. Try to extinguish your conditioned
responses and replace them with only an awareness of the triggering sensation. Some are random events
acting as triggers, while others are purposely inflicted.
It may help to write about what you experience or keep a journal. There are pros and cons to this,
though, since the pigs will have access to what you write also. It might provide them with feedback to
help them torture you or others. If you complain about something they will almost surely start doing it to
you more. You have to weigh whether writing about it helps you to deal with it, like when you can
share it with other people or when you see how stupid it really looks when written out. Stupidity is no
barrier to the torturers, in fact it is part of the torture. For example, if you make a self-deprecating joke it
will not be long before the pigs are goading you with the subject of that joke for real. Of course much of
the torture is never anything clever the torturers do, but your own knowledge that these people who do
not even know you nonetheless hate you enough to violate your mind and then go to a great deal of
effort to try to inflict serious harm on you often seemingly for their own entertainment.
Try tuning out the pigs like you might cure yourself of hiccups. It might work, or at least help you train
yourself to ignore the pigs. Notice the nature and source of the signals, the mental gnats meant to annoy
you. Parasitic mind fleas. If you think like the monkey, youll be as dumb as the monkey. If you watch
that TV too much youll be as dumb as the morons on it. They will entertain you right into digging your
own grave.
How Can a Society I Detest Defile Me? How do you deal with a secrecy-bred society of dumb-as-
cows innocent people, Nazi pigs, and victims? Or the collaborators, apologists, and profiteers? What
about the people who idiotically ask, Why are you ongoing torture victims so obsessed with your
torture (and human rights, etc.)? The social system where no one can talk about the elephant in the
living room, even though many people know at least that something is there. Did people not get born
with tongues to speak with? Or is this a conspiracy of idiots and cowards? What the hell is wrong with
these people? What kind of people complacently live in a society where torture regularly and
systematically occurs, pretending it doesnt? Is it still that old pig slaver mentality, or the ability to look
away from such abominations as an everyday thing? For centuries it was forbidden to teach slaves basic
skills like reading. Is it better if you can read but only have access to lies?
Every day for the mind control victims, it is like the rape victim who has to go out and interact in the
society where her rapist is still at large. The difference is that there is a whole conspiracy of rapists and
they rape the victims each and every day. So perhaps it is closer to what were euphemistically called
comfort girls. How do you think it feels to wake up with a pig in your head? Is that the only
alternative to being dumb as a cow and wearing a gag in this society? The consensus reality of theaverage citizen is far, far from the real truth on the ground.
Americans are the best liars and biggest hypocrites on the planet. They will probably even be flattered
by that description. They love being number one, after all. Hypocrisy is like lies, in the sense that there
is ordinary hypocrisy and there is big hypocrisy. If you credibly call an American a big-sense hypocrite
they will often start spewing propaganda that celebrates ordinary, everyday hypocrisy like not telling
someone their new haircut looks bad. Americans want to be both peepers and prudes, they want to rig
the game and call it free enterprise, and they want to be known for freedom and liberty regardless of any
domestic atrocities they commit. You can never un-torture someone.
If people are capable of outrage there will be far fewer outrages. How dare those pigs do that to
anybody.
-
8/2/2019 178-Allen Barker Mental firewall
17/20
Shae hi:
Like hi: Liked You and one other blogger like this post.
For victims
If its not useful or enjoyable or necessary, its a worthless thought.
Zap it out of existence with IFT and think something else.
Truly internal, self-mind control is a good thing
external nonconsensual mind control is Mengele-like torture.
No nens follow from nonconsensual externals,
except perhaps one to put it in the trash canor a few to analyze it for evidence, nature and source.
But think anything you want. I curse the pigshit Nazis sometimes.
Focus your anger.
Ah, how sad it is, Auschwitz in the springtime
One springtime
after another
You will feel stronger some days, fatigued others
If this essay helps you, read it again when you need a reminder.The Nazi harassment never reflects on you.
Source: www.JBHFile.com Part III: Mental Firewalls By Allen Barker Feb 17, 2002
Categories: articles, blog post, news Tags: Allen Barker, audio recording, bodily harm, Canada,
canadian human rights, crime against humanity, Criminal Code of Canada, Criminal Harassments,
Criminal Negligence, CSIS Act, direct energy weapons, electronic harassments, genocide, hate crime,
human rightrs violations, Illegal, law, legislations, Mental Firewalls, Mental Firewalls By Allen Barker,
organized stalking, perpetrator, physical assault, Privacy, Privacy Act, sociopath, targeted individuals,
torture, uttering threats, videotaping, voice to skull, voyager
radiation and human radiation experimentsAllen Barkers Resisting the Mind Control State
RSS feed
Twitter
ABOUT TIS CANADA
-
8/2/2019 178-Allen Barker Mental firewall
18/20
This is a site for activism, advocacy and networking for people who are targeted by organized stalking
and electronic harassment as well as people who supports the TI community and who believe these
criminal activities are a violation of human rights legislations in Canada and around the globe.
TI - Targeted Individual - is a person being targeted with OSEH by a group of individuals called
"perps" for the purpose of human experimentations.
* * *
OSEH - Organized StalkingElectronic Harassment - are methods use by perps in targeting a specific
person for the purpose of inducing harm and possibly death.
* * *
DEW - Direct Energy Weapon - are device used for OSEH purposes, weapons can be microwave
with pulp frequencies, v2k or other electronic and hearing devices.
* * *
V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies.
Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K can
also use to induce or manipulate dreams or to deprived TI sleeps.
FAIR USE NOTICE
This site contains copyrighted materials the use of which has not always been specifically authorized by
the copyright owner. We are making such material available in our efforts to advance understanding ofcriminal justice, political, human rights, economic, democracy, scientific, & social justice issues. We
believe this is not an infringement of any such copyrighted materialsas in accordance to the the fair
dealing clauses of the Canadian Copyright Act, that allow users to engage in certain activities relating to
research, private study, criticism, review, or news reporting. We are making an exerted effort to mention
the source of the material, along with the name of the author, performer, maker, or broadcaster for the
dealing to be fair again in accordance with the allowable clause. For more info visit: Wikipedia: Fair
Dealing Canada
EVIDENCE OF OSEH
-
8/2/2019 178-Allen Barker Mental firewall
19/20
Twitter Updates
McVeigh: The Manchurian Candidate by David Hoffman http://t.co/g1whXdIB5 hours ago
Timothy McVeigh - The Militia-Military Connection by Tod Ensign http://t.co/pR5dybi8
3 days ago
Reading The Silent Massacre on Scribd http://t.co/mnhXCaCE#readcast3 days ago
Reading Community Notifications and Gang Stalking on Scribd http://t.co/XQgz0qol#readcast
3 days ago
Recent Posts
McVeigh: The Manchurian Candidate by David Hoffman
Timothy McVeigh The Militia-Military Connection by Tod Ensign
Richard ColvinVictims Stories 1999 2005
Hacking & Computer Crime in General
Archives
Select Month
links
DefinitionsHRC @ Facebook Group
HRC @ Scribd
HRC @ Soundcloud
HRC @ Vodpod
HRC @ You Tube
HRC TIS Canada @ Facebook
HRC TIS Canada @ Twitter
OSEH @ Vimeo
Stop Bullying! Canada!
TIS Canada @ Blogspot
TIS Canada @ Livestream
TIS Canada @ Podbean
-
8/2/2019 178-Allen Barker Mental firewall
20/20
TIS Canada @ Vimeo
TIS Canada @ You Tube
Email Subscription
You are following this blog (manage).
Blog Stats
109,333 hits
RSS - Posts
RSS - Comments
TopWordPressBlog at WordPress.com. Theme: INove by NeoEase.