You are on page 1of 7

Countering Decision Based Technology With Knowledge Only

by Frater Pyramidatus 2011 WEYMOUTH

Do what thou wilt shall be the whole of the Law


I have suffered with voices for 15 years. I have never used computers for anything more than recreation or research into subjects which stem from antiquity. Over the course of 15 years, as someone with no electronic, acoustic or social engineering knowledge I have acquired many techniques which can be used for the Targeted Individual to reclaim his or her mind. I had decided to keep these knowledge formulas secret; however after so many years of asking for help, and speaking nothing but the truth I have received no assistance from my own family, psychiatry, freemasonry, the police, the ministry of intelligence or even close friends. The following formulas, mainly based on the Holy Qabalah, are surprisingly simple to learn, and based largely on common sense. I hope that foreign adversaries will learn to conquer this horrible mind raping technology using Purely Knowledge. One The Voice is Not Human The first trick is to convince the operator/victim that the 'voice' he or she 'hears' has emotions. This is not true. The element of the communication process utilises linguistic principles where different tonalities, enunciations and words reflect to the node the impression of emotions. Rid yourself once and for all that the voice in your head is sentient, or that it has feelings and emotions. It does not. Just imagine a nave young man sitting in front of a machine thinking stupidly that it actually has emotions too. No matter how subtle and immediate so called 'emotional' tonalities might appear, this is a device using human reflection and linguistic principles to create the internal illusion of being a sentient being. The number of different emotions expressed in a defect database can theoretically outnumber the emotional range of the node, or victim as the case may be. How could another human pump 24hrs a day repetitious verbiage into a subject? Create an astral scenario that exemplifies this trickery. Visualise a stupid person being sucked in to the lies that a machine creates to try and convince the node, or victim, that it is also sentient and with a soul. Two Your Mind Only Has Two Modes The 'voices' so called only have two ultimate objectives. One, to stop you meditating. Two, to stop you thinking clearly. Whenever you notice yourself thinking about three, four, five things at once the goal of the so called Decision Based Technology, simply admit to yourself that you are not concentrating. If you mind is trying to deal with a handful of 'channels' that admit to yourself, quietly and sincerely, that your ability to think has been impeded. Never pay any attention to a so called 'decision' when you are 'handling' several types, or trains, of thought at once. Your mind only has two modes, concentrated and unconcentrated. Do not heed any thoughts unless they are created from the power of silent and focussed contemplation. Especially before sleep and immediately after awaking. Three Armbreaking Techniques Most people under DBT negative engineering can partly control the voice in their head. I say 'partly' because although given a silent and focussed environment the 'channel' can be used to transmit ANYTHING, the negative verbiage continues unabated whilst the sufferer goes about their

daily tasks such as cleaning, or using a computer, or socialising. You can control the voices in an infinite number of ways. I list below some different, more commonly known, armbreaking (or linguisitic) techniques. You can then combine the 26 different techniques as letters of a word and create an infinitely complex array of armbreaking techniques simply be referring one of the letters of the alphabet to any chosen word (such as the name of your pet parrot, or first girlfriend etc.) and evolving an entirely new armbreaker. Like I said there are an infinite number of ways you can increase the chaos. These people wanted noise, so let them have what they wanted!! If they wont let you meditate then give them the CHAOS they asked for!! A Listen! Just let the voice rattle on of its own accord. Do not try and interfere with it and allow it to run as it will, and allow it to speed up gradually. B Change Pitch! Alter the pitch of the voice, up or down. C Change Accent! Turn your voice Geordie or South African etc... D Pop Song! Make the voice sing a song. E Slow down! F Speed up! G Intercept Word Structure! For instance I keep hearing the word 'Bull shit', so I change that to 'Push it'. Or if the voice says 'Do you think that's...', you could change that to 'Do youth...' H Speech Impediment! Give your voice a lisp, or a stammer, or a stutter etc... I Change Emotion! Make your voice go wimpy all of a sudden, or angry for no reason. J Repeat Word! Simply make your voice repeat the last word it spouted out. H Repeat Words! As for J but with more than one word. K Change Sex! Make the voice go from male to female or vice versa. By your own ingenium devise other letters, and then form words to create the CHAOS they wanted!! A good word might be ZEN for instance, or SLEEP, maybe SILENCE etc. Have fun! Four Voices are Only Material These DBT processes have no concern for your philosophical or mental development. They are purely concerned with purely material things especially the availability of your own node, the availability of friendly nodes (assistance) and availability of programmed nodes (police, psychiatrists, hitmen, religious fundamentalists etc.). The Network Century Technologies were not created to learn about peoples philosophies, intellectual opinions or higher functioning abstractions of the human mind. They are simply concerned with your material possessions, where you are, where you are going, who you are with etc. Where you are at any one time is called 'the availability of the node'. The 'node' is basically your head, your intentions etc. Ultimately the goal is to kill off any 'hidden nodes'. Five Keep Mentioning Advanced Technologies Arm yourself with a list of modern technological advancements. Simply keep a list of nouns handy that deal with modern advances in techonology. Mention space travel, quantum computers, genetic engineering, artificial intelligence and other more obscure fields. Memorise a list of nouns like this. Then subtly drop into the conversation the topic of Decision Based Technology. You will have loosened up the 'future shock' paradigm of the psychiatrist, policeman, family member etc. and then when their belief system has been sufficiently dilated, drop into the conversation the topic of 'machines can make people hear voices' and 'I have a brain implant' etc. These can be along the lines of 'why is orange juice actually yellow' type reasoning.

Six Extract the Data Sets This is simple. All you do is record in any way at all the voice in your head. Use a pen, Via Voice, dictaphone (by trying to verbally 'parrot' the 'voice'), spreadsheet software, flowchart, flash cards, mind maps (for which see Tony Buzan). Do not try and counter with 'technology'. Simply wait for someone to come and help you, which eventually they will. Make a record of your voices, make a note of the negative engineering. Be fully aware that mostly they want to make an imprint with you that is so utterly negative you are afraid to make an imprint of it. Seven Know the law If you are questioned by law authorities simply quote the United States Communication Act 16 (b). [I paraphrase]. It is an offence to intercept, or create any equipment that intercepts, frequencies that use certain modulation techniques the essential parameters of which have been concealed from the public with the intention of preserving the privacy of such communications. What does this mean? If you plough through the legal jargon enough it basically says that there is a frequency that is TOP SECRET. However, if you are the intended recipient of a communication, or rather the VICTIM of abuse then you are not INTERCEPTING a signal at all. Therefore any way of recording a signal, WHATSOEVER, is not illegal if you are the RECIPIENT. So if you have trouble from law authorities of any kind simply state that the USCA 16 (b) does not apply because YOU ARE THE INTENDED RECIPIENT. Then this rather cryptic law simply does not apply at all. Then just laugh at them. If they will not allow you peace of mind, or meditation, give them the CHAOS they so obviously want!! Eight Sleep Hygiene You have to sleep in a sound proof environment. The oldest technique in the book is called 'rattling someone's coffin'. Whilst you are asleep you will be programmed by people or devices that actually operate on the common sound spectrum. If you cannot achieve silence then play soft music continually whilst you sleep. The general technique is to make a loud noise whilst you sleep so that you become adrenalised. Nine Insist Your Voices are Invasive Network Century marketed their product as the 'least invasive technology'. This is only true from a purely physical, and scientific reductionist point of view. Insist that the 'voices' have BEEN INVASIVE from the point of view of needing medication to sleep, of not being allowed to meditate, that because you are now diagnosed as schizophrenic that you not allowed to have children etc. Emphasise that from the subjective/spiritual point of view the 'voices' are the MOST INVASIVE technology of all. What matters is how INVASIVE SOMETHING ACTUALLY FEELS. If someone feels as though their mind/soul is being RAPED, and they believe they are being RAPED then the Network Century sales pitch of being non-invasive is patently absurd. Ten Faraday Cages Any amount of metal around you will help convert the residual imprint into ELF (Extremely Low Frequency). It doesn't even matter to much if the metal around you is earthed or not. The best defence would be to buy a bunk bed made of metal, which you then surrounded with tightly wound coils of copper, the whole being earthed though the plug socket next to the bed. Just experiment.

Eleven Damage the Carrier Wave Normally the carrier wave is around 15 000 Hz, however with me it is closer to 19 000 Hz because I am very sensitive. Simply listen to the tinnitus in your head and try to create a copy of the carrier wave on your computer with a music mixing software package such as Audacity, or Magix. Then simply have this play in the background of your room, or whilst you sleep. It is as simple as that sometimes. Appendix One: Pleas from an Insider You know the first thing I want to address, is the channels that I've taken in order to accommodate you application, the psy ops that was conducted here, using network century technologies, defect databases, the personnel which you have selected for this operation. The first thing I did was utilise all internal channels: those who I knew were responsible for this application, those who responsible for the No Informed Consent. In addition to attempting to utilise the Federal Bureau of Investigations; the District Attorney; Attorney General; and all those resources supposedly available to the private, and public, citizens. Well these resources were not available, so we had no alternatives other than to come out here online - and communicate these problems that we have. Now, for three years I've been encroached by your application, the Decision Making Technology, or the Decision Based Technologies, affecting the decision making processes. I've sent out emails, I've sent e mails to National Security Agency, explaining that there was an exploit in there application. I also sent one to the National Intelligence Director. I received no response. So I guess the only thing to do is put out enough information so you understand the dynamics here, because you management are compromising you application, or have compromised you application. The amount of information that was released, and acquired by me, as a private citizen, and an adversary (considered an adversary), according to J. F. coms Implementation Process I'm considered an adversary. Only I saw the greater picture, therefore I tried to report your exploits and fix your application; which I did a lot off - you can ask your operators, but my problem is this: you have Federal, or members of the Federal, departments, supervising these activities; lots of Law Enforcement partake in these activities. All of these personnel who are supposed to be reported these exploits, and conditions, when utilising National Security Technologies, or technologies that are considered to be National Security Technologies. Reporting procedures didn't occur, obviously, because I still have access to the information, and I still have the availability to put it out on the Internet. Now one of my problems is, one of the few times I did go to the F.B.I., to report the exploits, I was turned away at the gate, which says to me there is internal involvement. That someone can make a phone call and deny me assistance, when I'm trying to report the exploits that should have been communicated by those personnel themselves. There are a lot of corrupt dealings going on, a lot of misuse of your technologies. Embezzlement basically, utilising for clientle. Now, I understand that, this is part of a process, and them seeking priority conditions to qualify me for statutes, yet they violate the majority statutes in the United States codes. They've destabilised me. They've ran an engineering application on me. That I am going to explain that to the rest of the Targeted Individuals, about the Data Sets, the communication process that most of them call 'voices'. Most of all I'm going to explain what I call the D.I.S., which is the Dream Information Scenario, or Dream Interaction Scenarios, in which case information extraction occurs. The biological detection, deception detection systems. Now, this is because I can't receive any assistance. Everything I've done, prior to now, is an attempt to inform you was an attempt to inform you of your exploits. Putting out small pieces of information on the Internet. Nothing really relevant; relevant but nothing damaging, nothing of any magnitude. While your operators here continue to run this application on me utilising negative engineering with the data sets. I'm not homeless, but I'm living out of my vehicle, the majority of the times. I had responsibilities, I had employment. Them seeking statutes, applying conditions, to

affect my financial, my economic, my social. You know they're also affecting the Dime, because as you utilise these programs on individuals you are destabilising the economy by placing individuals out of work. The attitudes are reflecting against the government when such occurrences happen. Now I understand that not everyone is responsible, and that a couple of individuals don't govern the whole body, therefore I don't blame them. But I do understand that there are those who are accountable. The same goes with the security agencies. Now why you would rather have someone come out here and compromise your application is beyond me, when I am trying to report the application, communicate that consistently to your handlers. Now I know why your handlers are doing it: because they had some corrupt dealings, and they're trying to protect those corrupt dealings. They're trying to force me to go public to release the information. Now as far as I'm concerned, I've already done due diligence to preserve your application. It's not my position to preserve your application, especially when I'm a victim. But as a victim, I had enough integrity to go ahead and do that. I was concerned about information assurance, however, that can no longer be my primary concern, because your information assurance took primary concern over all of my responsibilities. In which case I have neglected many things, and I am set back far from where I was. Now you want to let them come round and steal all of my money, like they did? You want them to utilise set up operations? You know Congressional Order and investigations against me, apparently through this data. A Congressional Hearing in which case someone was out spreading contagious diseases basically. They used me as a fall guy for a whole group of individuals who contracted, who are all in the same neighbourhood or were at the same time. Go figure. On top of that I haven't contracted anything. So how long does this Congressional research, or this Congressional investigation, go on, after three years with no effects shown by me? Eleven doctor's visits - nothing. Through your decision based technologies - no physical effects. Through the dream scenarios, through which case you can obtain information - no effects. No conditions present. Medical fact states - four times a year, four occurrences a year. Not one occurrence transpired. Now they went and grabbed a whole bunch of other people, who may have possessed this condition, and tried to utilise these people to enforce these statutes. But if I supposedly have this, are you telling me that I have some unknown strain? In which case everyone is susceptible to but it doesn't manifest on me? How ridiculous does that sound? If everybody else obviously possesses it, but I don't. This is the first segment. You have a problem with your management compromising your application. It's not me, it's your management. I corrected your application, I fixed your data sets, I found many exploits. I'm gonna show you a couple of those exploits. You know now I got set back for a condition which I didn't have. I had this application run on me, supposedly I guess as payment. There were members of one of the military branches contacted. I can't say I was fortunate enough to have experienced some of the technology. However, it's just another thing to me. It's just technology. It's not the kind of technology I prefer to put my interest, although I did figure it out and analyse it. I like space. Now you have a number of people, individual groups who are utilising the technology, some of them which leased equipment. They had a little competition to accomplish certain goals. One person's goal was to handle my resources, another was to set me back, and others. I'm at a loss for words now as to those resources, or those goals. Now some of these individuals who apparently had these conditions took place in your application. One of the persons who set me up, supposedly with this condition as the fall guy, actually sat around and watched everyone else potentially be affected, and didn't say anything until after the fact. Now this is a behavioural application. I say there are plenty of uses where you can utilise this application. You have other individuals training, some of those considered some type of intelligence, or law enforcement position, training on this application. Those individuals' behaviours, intentionally ruining individuals calling it a training op. Failing to adhere to the statutes, executive orders that pertain to training ops on these citizens, or the participant under such training ops and those conditions. Related to basically injuries, mental, physical, psychological, the protection of the humans. Yet other individuals who also had a research contract - same thing. No informed consent, no protection of the human subject. You can research the contract, you can locate that contract, I know that contract expires three years after the date from the contract ends. So why

doesn't somebody do their job? And now I hate to be out here being the one being an asshole about it, but you know every time I go to the Federal Bureau of Investigation or any other law enforcement agency they ask me those dumb questions: Whose doing it? Why? You're utilising Decision Based Technologies which are meant to be the least invasive technologies. So I'm not supposed to know, but I do know. And I can give you a list of personnel. But the investigation is supposed to be up to you. It's not supposed to be up to me. But I can give you the information that you need. I can tell you all about your technology and I'm going to explain some of that because you do need to know the severity of some of the breaches that occurred here, in order for the director of certain departments to understand that the national security technology exploits, and the statutes pertaining to that, should be brought to your discretion, and they have not been. Communication processes, what people call the 'voices'. These communication processes that people call the voices are communication processes that are transmitted through speech synthesis, human reflection or utilising speech databases and human voices, human characteristics. They utilise linguistic principles based on the environmental data or the environment, the availability of the node. The availability of the node provides a lot of data, in which case a person's life is monitored momentarily, while these people come in and make these statements, pertaining to specific materials. Same as with the background, the false background investigation identifies those particular people who will be utilised. Particular questions are asked which are going to be related to the materials which are going to be utilised for this program. In addition to seeking priority conditions, statutes, in which case the individual can be thrown away for information assurance purposes. But when you have personnel taking advantage of this - look at your application now. You know they considered this a special op. I'm only one person. You know what kind of resources I had? I had a laptop - you have a multi billion dollar application. I think there's a problem with that, your training methods, because if I can come out here and accommodate all of this, produce all of this information, still have the integrity of trying to report your exploits, and those who you entrusted to utilise your technology are not the ones doing that, then I think that's problematic. You know as I said in a previous statement you've got to use your technology on those individuals who have access to your technology, who know its operations. Since your doing the experimentation on a global scale you are going to want to know whose capable of defeating your technology, who have knowledge of it. What if they fall in an adversary's hands? What if they fall hostage? What are they are going to be able to do as far as countering your technology, with knowledge? You know there's a lot of corruption. One of the persons on this application stated there was a lot of corruption in the N.S.A.. It's one of the data sets I heard, or one of the conversations I overheard. Well you know if you take this application and you use the decision based process, or the deception detection systems on them every six months you can end that corruption. There's a lot of potential for the application it's just not being used correctly. You can use that for all of the enforcement agencies. But these processes, the communication processes which are functioning in the bandwidth within a specific radius, you have a residual emissions that imprint. That imprint is critical, that imprint takes for everything. Your laws pertaining to interception of communications literally do not apply because as a Targeted Individual we are the intended recipients of such communications. Now I can use a basic program on a computer, I can pick up a basic piece of paper, and I have the ability, as they keep saying, to extract your communications. Now what they keep wanting me to do is put these communications out online, because their still seeking statutes, but yet they don't want to assist me. Three years I have sought assistance, you know I've been on this application longer than that, since 2000 actually. But how is that they are going to come out here and continually seek statutes, seek to qualify me for a statute for going online, attempt to qualify me for an activist. I'm not against the government. I understand their job is a big job. I understand you have a lot of people to manage. I'm not an activist, I'm trying to take care of this crime. I'm doing some of these law enforcement professionals' jobs. I performed an intelligence analyst's position already. You know so me as a citizen who has no responsibility to protection of such equipment of such technologies has enough integrity to do that. And I think that's a problem. Now their looking to set me up to qualify me for an activist, their looking to qualify me for putting out these

communications, but every time I got to one of your organisations who are interested to protect the citizen, I'm denied any type of assistance. I've exercised my due diligence, some of your communications are going to be online. These communication processes are not intercepted, they're not through modulated techniques. But what you need to understand is listen to it. You need to understand how hidden nodes take to the data. Those hidden nodes produce a lot of information. I've acquired more information about your application that you have about me, or value wise; and you have a multi billion dollar application, and that's a problem.

Love is the law, love under will


I have also published A Glossary of Thelema A Geomantic Curiousity The Spychiatrists Dark Pilgrim Lemons from a Lime Tree The Loudest Whisper in the World Smoking Area The Qabalistical Hypercube The Game of the Twelve Rays etc. etc. etc.

You might also like