Skip to main content

Could somebody activate "ARTICHOKE"-programming by accident?


https://metsantarinoita.blogspot.com/

Kimmo Huosionmaa

In the movie "Manchurian candidate" the psychological specialists program the soldier to make assassinations by using simultaneous repeating infrasound, the medicines, and hypnosis. In the elder version, the trigger was the heart queen, and that launched the effect, what caused the assassination. Or it causes the "dance effect", what makes the human, who is targeted for the brainwashing take the gun and shoot the targeted person. And that process is called as "brainwashing". The "dance effect" causes because the trainer teaches the victim the "katas", series of movements, what can be very dangerous. That kind of things are learned in the martial arts like karate, and that makes those self-defense skills so effective.


In the most advanced method would the brainwasher can use also Virtual Reality for making anger in the person's mind. The anger reaction is called as "trigger", and it would make the person act violently against some other person. In the worst scenarios, those psychological operators might play some kind of police or even play the victims own family. In the VR-method the consequence would be lowered by using chemical stimulants, that the victim would not even realize about that suggestion. Also, the feet or arms can be numbed during that thing.


That suggestion method was tested in the "PROJECT ARTICHOKE", and even if those experiments were ended in 1970's somebody might have thought those methods to some private military corporation. In the real world of science, the scientist, who makes the invention can teach that methodology to other persons, who are so-called the field team. In this case, somebody can play some kind of newspaperman or some activist and then ask about the methodology, what was used in ARTICHOKE-program.


The suggestion is the most attractive method when somebody would be wanted to give money to some other person. In this case, the methodology, what have been used in those mind control programs are using in the normal criminal activities. The trigger, what is used to make person murder, might use to suggest other people get the money to somebody else. But in fact, somebody has been targeted for that kind of brainwashing in "PROJECT ARTICHOKE", and if the trigger is the number 666 in the receipt, would the result be very devastating.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that