Amazon implicated for conducting directed energy weapon testing on its employees on behalf of the federal government.

Bryan Kofron, aka Justin Carter was a security industry specialist.

Security Industry Specialist Tells All. I worked as a Security Specialist For Security Industry Specialists in Seattle, Washington. We had a contract with Amazon and the US government to test Total Individual Control Technology on our own employees. These employees were tortured and experimented on in Amazon owned houses on the Amazon Campus can be found in Seattle Washington.

I am making this information available to the public under the protection of whistleblower statutes that protect individuals who have knowledge of crimes committed by government contractors.

I am also starting a podcast to expose these crimes and raising fund to start awareness-raising campaigns designed to bring criminal charges against those responsible for these crimes. We are also hoping that these efforts will lead to a national campaign against electronic harassment, voice to skull, and gangstalking.

Please support us in our efforts to end these crimes against the American people by donating to our organisation: aStop Social Engineering.a Thank You

https :// about /

Podcast đŸ˜› TAGEND

https :// user/ 9988805/ security-industry-specialist-tells-all

Partial transcription of five part youtube video series đŸ˜› TAGEND

https :// watch? v= ibyjnVJothQ

aIam a security industry specialist who worked for a private security company in Seattle, Washington. I am no longer employed by this company. I chose to leave because I can no longer in good conscience work for a corrupted company that is involved in a highly illegal federal program that is blatantly violating the constitutional rights of American citizens on a daily basis. My company had a contract with one of the largest most powerful corporations in America that is headquartered in Seattle, Washington. During my day as a security expert I became aware of a massive social engineering program taking place in America todaya | a

aThis social engineering program involves the federal government of the Unites State of America, the intelligence agencies of the Unites Nation of America, private security contractors, some of the largest corporations in America, local and state police, and social programs within the inner the two cities of America. This social engineering program experimentations on the homeless, and experiments on the financially struggling, and experiments on individuals that do not have a lot of family and friends or money so that they have no means to defend themselves from this parasitic disgusting program. This program utilizes a technology that most know as voice to skull technology, it is a electromagnetic frequency machine, an electromagnetic frequency technology that utilizes radio frequency signals microwave auditory consequence to induce sound within the cranial cavity of the target.a

aThis technology is also used to manipulate the emotions of the individual.a

aThis technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It runs by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the style a person believes and thus behaves.a

aThis technology can also be used to control the muscle movement of the objectives of the. It can take over oneas hands or feet while driving and attain you press on the accelerator or press on the brake or turn. This can be used to cause collisions it can also be used to prevent accidents from happening.a

aThis technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is insuring and hear what target is hearing. This information is then downloaded and stored under a computer, in a highly procure categorized site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they watch, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.a

aThis technology can also be used to manipulate the feelings of the target. It can induce dread, love, hate.a

aThis technology can be used to beam images and even motion pictures into oneas brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. Itas like a virtual reality 3D rendering that currently exists within the targetas intellect. The images and motion picture show themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.a

aThis technology can also be used to induce and control dreaming. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to simulated spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to attain the target believe that they are having a genuine spiritual experience when theyare not.a

aThis technology can also be used to sexually manipulate the target. Construct them feel sex arousal or turn off their sexuality wholly, it can stimulate them and it can shut them down at a few moments notice. It can also be used to manipulate the hormones of the target, thus lowering and creating estrogen and testosterone levels in women and men respectively.a

aThis technology can also be used to read the thoughts of the target in real time.a

aa | they can read your thoughts verbatim as they occur within your own mind.a

aOne of the reasons Iam speaking out is because this technology, as horrible as it is, can also be used for genuinely miraculous purposes. It can be used to help humanity instead of harming humanity, it can be used to save people instead of destroying them. It can be used to literally stimulate blind people consider, the deaf hear, and the lame get up and walking. It can be used to solve many of their own problems facing our country and the world today.a

aIt can also be used to cure cancers, by healing cells manipulating genes and indeed manipulating the DNA of the target in real period. Iave seen this technology used to repair ACL strains, MCL strains, sprained knees in a period of hours, as if someone laid hands on the individual and healed them instantly.a

aAs an educated man and a man who has spent my life serving others in the security industry, and before that seek an education that was geared towards helping people I am exceedingly thwarted that this technology has fallen into the hands of people that are using it in the manner that they currently are. These people are adolescent and sophomoric in stance, theyare irresponsible in disposition, and they are completely out of control in terms of the style that they are using it against the American people.a

aAs a security expert I insured them use this technology to experiment on their own workers. My fellow security specialists were experimented on in the workplace and outside of the workplace.a

aa | theyare also monitored 24/7 by a system of surveillance that many on the internet would probably recognise as gangstalking. These are security experts employed by private security companies, theyare also highly trained intelligence agents. These personnel are used to monitor the test subject 24 hours a day, both inside and outside of the workplacea | a

aTheyare evil in such a way that I cannot understand, and I do not want to understand.a

“As many of the test subjects a | have already learned, one of the key means of covering up this program is to use the psychological profession to do so. Those who speak out about this issue are funneled to psychiatrist for evaluation. The psychiatrists are working with those who are running this program, many cases they are directly paid by them to render a diagnosis of schizophrenic, multiple personality disorder, delusional, paranoid, depressed upon the test subjects, the targets, so that they will be discredited. So that if they talk out any further, or they ever start making any progress against this program, they are inherently discredited because those who run this program is as simple as release the psychological files and assert that the person is mentally ill.

This is a perfect route to cover up such a technology whose main feature and most popular feature, most well known feature, is voice to skull. Which induces voiced within the cranial cavity of the test subject, of the target themselves, so that when that person goes to speak out about it, a | plainly if members of the general public are not aware of the existence of this technology, which many of them are not, most of them are not, they will interpret that as relate, a | and they will conclude that this person must be crazy. And as a result they will recommend psychological evaluation for that person.”

aAs good people, helpless people, that are being abused and tortured and enslaved and experimented upon in America today, American citizens cry out for help from their fellow Americans, and their fellow Americans say awhy donat you take some prozac, because we think youare schizophrenica when this is a highly technical program, all of the symptoms are induced by a technology that is so fucking sophisticated it is horrifying beyond description.a

aa | these people will actually intercept your sample. And they do this by contracting with labsa |[ laboratory who] provide lab services for employers who are doing massive amounts of medication tests and blood tests, and also the involvement of sperm banks was mentioned in some of the information I saw working for my company. These are perfect ways to acquire an individualas DNA, build a DNA profile on them. And then this information, the DNA of the individual is used to determine the resonant frequency of the DNA itself, the resonant frequency is then used to fine tune the technologya | to tune it perfectly to the resonant frequency of the targeted individualas DNA.a

aIt is out of control, and “its only” getting worse.a

aI know for a fact, having been an insider and actually been a part of this program, and ensure it operate on a day to day basis I am aware that there are now entire cities in America that are nothing more than a massive social engineering experimentation. Because instead of using this, you know as most people suppose simply against the individual the targeted individual, there are applications of this technology I am now aware of that utilize it against entire populations. Anywhere from small groups of people 10 -2 0 to 100, to medium size groups of people several thousand to tens of thousands.

This is done by creating a field consequence, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in its own population or a crowd of people. It can be used to build them passive, it can be used to induce them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop supposes, start believes. Massive mind control on a citywide level.a

aIn addition to the technology, that is commonly referred to as voice to skull, there is also another element a human element to this program that is commonly known as gangstalking. This program involves personnel of the federal government: Americaas armed forces the military, the intelligence agencies of America, military intelligence, private security contractors, private firms, local and state police, and social programs in cities all over America. The personnel in these agencies and companies are contracted and paid very well to follow, and monitor, and surveil American citizens. This is the phenomenon that is now being talked about online as gangstalking. This gangstalking aspect of this program is now becoming an open secret, as the companies that are involved with it do not fear detection.a

aWhen I lived in Seattle, Washington there was a vying security company that was operating an ad online in matters of employment saying ahelp wanteda, the position that was available was a security specialist. The requirements for the position were a cell phone that works with good reception, they must be on call 24 hours a day and they must be ready to respond at a few moments notice. The ad detailed that both static and mobile postures were available. Being a security expert myself I acknowledged this ad immediately as one that was hiring gangstalkers. My company was involved in the exact same activity and I was aware of other private security companies that were hiring gangstalkers as well.a

aTargeted someones everywhere are being terrorized by voice to skull technology and the related gangstalking program, that is used to isolate the individual from household/ friends, interfere with their ability to work, and in short destroy their lives. This leaves the individual hopeless and destitute, depressed and many of them struggle to find a reason to keep on living.a

aThis is a booming industry. Itas one of the most fasting growing industries in America today, the private security industry. And it has run almost completely unnoticed and under the radar to the average American. Even on the internet, in the realm of alternative the investigations and conspiracy hypothesis private security companies are very rarely mentioned. And yet they in my opinion play perhaps the most prominent role. Especially in the gangstalking aspect of the social engineering program that I described but also in the implementation, the experimentation, and the fine tuning of the technology that most know as voice to skull. These private security companies have basically done nothing but hire ex-military and ex-intelligence agents and spies from the armed forces of the United States of America and put them to work here at home.a

aIn fact many of these private security companies on their website will advertise that they are a veteran friendly employer. This is code within the industry to let them know that ex-military and ex-intelligence agents are needed within the private security company for carrying out the exact type of operations that Iam detailing in this podcast.a

submitted by / u/ microwavedindividual
[ connect ] [ comments ]

Leave a Reply

Your email address will not be published. Required fields are marked *

Proudly powered by WordPress | SociallyViral Theme by MyThemeShop.
Web Analytics