should read MC Realities?
Read a Sample from MC Realities on Detecting Mind Control
About the Optional Reference CD-ROM
ORDERING INFORMATION - and a Special Offer
Who should read MC Realities?
Anyone who SUFFERS SYMPTOMS OF ATTACK (described here)
Any STUDENT of PSYCHOLOGY, PSYCHOLOGY PROFESSIONAL
Any SOCIAL WORKER INVOLVED WITH MENTAL HEALTH
Any ACTIVISTS, WHISTLE BLOWERS, or INFORMANTS
Anyone interested in BIG BROTHER issues (spying , abuse of power)
Anyone who is WEALTHY or FAMOUS
Anyone who is a GOVERNMENT EMPLOYEE or is in POLITICS
Any member of LAW ENFORCEMENT or the LEGAL SYSTEM
Anyone involved with INTELLIGENCE AGENCIES or the MILITARY
Any HIGH-TECH or DEFENCE CONTRACTOR EMPLOYEE
Anyone wo is a member of a FRATERNAL ORGANIZATION or CULT
Anyone involved in a 12-STEP REHABILITATION PROGRAM
Anyone who wants to be PREPARED FOR THE UNKNOWN
About The Author
Personal Privacy and Security expert, H. Michael Sweeney, is author of 2 books on topic: The Professional Paranoid, & M C Realities. Mr. Sweeney has over 45 hours of national and international radio talk show guest spots and his Web site has enjoyed nearly two million page hits since 1998. Mr. Sweeney offers Web-based consulting to victims who cannot obtain helps through traditional sources, and is the spokesperson for NOILWAR!. He also writes fiction and film scripts, including the highly prophetic Electronic Apocalypse, which was based on various conspiracies and crimes of the intelligence community, and tried to project the future from these building blocks. Electronic Apocalypse foretold of airliners crashing into and destroying the World Trade Center as part of a terrorism campaign, and a resulting war in the Middle East -- written and posted to his Web site in 1999.
H. Michael Sweeney likes to view himself as everyman, one who was once satisfied with his Huntly and his Brinkley view of the world. A computer expert with aspirations of writing fiction and movie scripts, he was entrepreneurial at heart with a history of owning his own businesses. As a family man he lived with his wife, two kids, a Vietnamese foster daughter in a relatively nice home overlooking the valley. But this view, his aspirations, and the sanctity of family and home were shattered when he came into possession of what should have been an innocuous and worthless document...
This event triggered a running battle with rogue elements of the intelligence community. With a prior background in the security industry and experience working with FBI and Secret Service as consultant, Mr. Sweeney was able to establish the identity and purpose of his covert attackers, survive two attempts on his life, and work to establish an insurance policy suitable for establishing peace with his antagonists. Learning the hard way that the system fails to help persons who talk about being followed, surveilled, harassed, or targeted... preferring to label them as paranoid, instead... he decided to write the Professional Paranoid in order to help others who find little help or solace elsewhere. This evolved to a greater body of work to cover any potential threat to personal privacy and security, including the exotic topic of mind control.
However, in his first book, The Professional Paranoid, less than 2% of the text covered mind control, it thought to be an exotic and rare matter. This proved to be wrong thinking, as approximately 85% of all persons buying the book and contacting Mr. Sweeney for helps as a client were victims of mind control, largely of the electronic weapons variety. This revealed a need to research and write a companion or sequel book to The Professional Paranoid which focused on political control technology. That book is MC Realities: Understanding, Detecting, and Defeating Mind Control and Weapons of Political Control Technology...
Table of Contents
Chapter One: Defining MC Issues
Chapter Two: MC Tech
Chapter Three: MC and The Intelligence Communities
Chapter Four: MC and Law, Law Enforcement
Chapter Five: MC and the Pscyhiatric Community
Chapter Six: MC and Religion
Chapter Seven: Case Study in Soft Core MC
Chapter Eight: Case Study in Hard Core MC
Chapter Nine: Detecting MC Attacks
Chapter Ten: Defeating MC Attacks
Chapter Eleven: Dealing With the MC Aftermath
The Victims Own Stories
Appendix I: CIA MC Related Fronts List
Appendix II: MC Victim Resources
Lists and Tables
your comments welcome.
Lots of options and ways to save dollars. MC Realities, is available either as e-book or paperback. There is also an optional Reference CD-ROM available,
The e-book version is available NOW, and it includes color text and several color images not found in the paperback version. e-books are sent as .pdf formats readable with Adobe Acrobat Reader, which comes free on every computer sold, and which is available free from Adobe.com. Web TV users cannot read e-books on their system, but EVERYONE ELSE CAN. $10 - but special bundle prices and order options apply.
The paperback version ships early 2003, and can then be ordered through the usual resources (i.e., Amazon.com, traditional bookstores, or even requested at public libraries.) It does not have color or images, price to be determined. Advance orders are now being accepted NOW. You can order direct from the author, inscribed and signed, for $20 post paid (U.S. - add $5 for foreign orders,) Special bundle prices and order options apply.
A companion collection of materials for readers of The Professional Paranoid and MC Realities, or students of the intelligence community, NWO, mind control, and/or conspiracies. Contents: Approximately 150 assorted official open access and public domain documents and works from this author and others on all of the above.
A searchable file lists all files sorted both alphabetically and by relevance to the following topical areas: DOD (Pentagon), FBI, GOV (Congress, non intel agencies), GVE (good vs. evil as it relates to mind control, government manipulation), JFK, MIL (military), MOB (includes CIA drugs as well as Mafia crimes), NSA, NWO, OKC, PCT (Political Control Technology, Mind Control, Non Lethal Weapons), PUB (Publications, references, and some unpublished works), SEC (Personal Privacy and Security), 911 (Terrorism and Fascism issues) Summary follows:
Includes files from 1977 Congressional
Hearings on CIA Mind Control, The U.S. Constitution and Bill of Rights,
plus the Constitution of The Newstates of America, and two different
World Constitutions with comparative analysis; extensive lists of NWO
memberships, meetings, and CIA proprietaries (half are mind control related);
excerpts from Fatal Rebirth including extensive material
on the OKC blast, material of great strategic value to militiamen, survivalists,
patriots, and Constitutionalists; the film script for The Electronic
Apocalypse which, though written in 1999, predicted terrorism involving
planes crashing into NY skyscrapers, downing of the WTC, and resulting
in a war in the Middle East (the end game scenario.); sample chapters from
Alice in Amerikaland, an experimental work on mind control based on a composite
of real-world programmable assassins; the first 12 issues (most in color)
of The Professional Paranoid Newsletter which includes: a list of
over 250 political control technologies and terms with proofs; 33 Traits
of Fasiscm; extensive examination of 9-11 as domestic state sponsored terrorism,
and as being Satanic in nature, and much more; hundreds of Web links to
killer sites on these collective topics; some amazing e-mails and little
bombs here and there - in short, something for everyone. Documents are
either in .pdf, .htm, jpeg, or.txt formats.
Detecting MC attacks is a not exactly a simple matter. There are typically three obvious components in the equation which should be addressed before a final conclusion is drawn, which will dictate the merit of seeking proof in the form of a fourth component. The first is physiological symptoms felt or perceived by the victim. The second is physical changes or impact upon the environment; environmental clues which are tell-tale traces left behind by some attacks. The third is what I call the spookiness factor; the background facts and circumstances surrounding the matter which suggest there may be spooks in the woodwork or good reason to be wary of same. Spooks, in this case, being the term the industry often applies to intelligence operatives or agents plying their trade.
Where the sum of these indicators is high, the fourth component can be
entertained with some confidence of success, which will require some form
of investment or third-party helps. This is the electromagnetic evidence
typically indicative of various electronic weapons being applied. Magnetic
or electric fields, audio, light (laser,) microwave, radar, and radio emanations
are used against the victim while at the same time employing electronic
eavesdropping devices which rely on similar technologies.
There are many victims who assert that new and previously unknown technologies exist which cannot be detected, and/or insist that there is no way to test for signals in MC applications because the perps can always detect the intentions and activities leading up to the tests. They then simply temporarily shut down during the testing. With respect to the former concern, I maintain that very few victims are likely targeted ONLY by the latest and greatest advancements (state of the art) simply because it is extremely expensive and experimental in nature, and because all attacks are generally multi-faceted and thus require reliance on multiple and older technologies for support.
While it may thus be true that detection of specific exotic weapons may be difficult or even impossible with todays test gear, the overall detection of the attack should not prove impossible. Likewise for the later concern, as there are methods and strategies available which allow for and actually take advantage of the perps ability to have advance knowledge of tests. Put another way, the act of shutting down is itself a useful test reading and thus, primary indicator. Further discussion on this is put off, for now.
Supportive symptoms (below) may allow the victim or any observer to reasonably conclude that MC attacks are involved, but great care should be taken in forming such conclusions. That is because almost every clue or symptom can have an alternate and innocent explanation. More often than not, we must rely upon the totality of all clues before drawing even a speculative conclusion. In most instances, certain clues or symptoms can be challenged with very plausible alternative explanations, or even disproven by additional evidence. It will not be helpful to become paranoid over such clues if they are indeed not truly symptomatic of attackÖ or even if they may represent attacks but the fact cannot be well demonstrated.
Careful and open evaluation can often be extremely useful, because you might actually disprove MC attack in favor of some other issue which is equally valuable to discover (i.e., an environmental health issue.) But it is also possible that even this conclusion is misleading; an MC attack and other more innocent causes may both be true and accounting for the experience. Thus, if we test for and find innocent explanations, that does not necessarily resolve any remaining clues still suggesting MC. If this seems confusing and unhelpful, let's start with a brief overview and see why it is necessarily so. For most suspected victims, it should prove more helpful than the discussion thus far suggests at a glance.
Physiological symptoms felt by victims from electronic weapons are often easily detected, but as stated, each symptom can easily have alternative explanations which makes claims of MC attack to others a risky matter. It would seem to be a grab bag of every known ailment to man, but it is the cumulative collective of such clues more than the individual evidences which is telling, especially where the victim has some notion of why they might be a logical target (spookiness factor) or supporting environmental clues. Most symptoms seem rather sudden, with no apparent cause, perhaps light at first notice but growing in intensity over time, or varying in intensity as the victim moves about the attack area (into and out of the maximum strength area of the signal.) These clues may not help isolate the type of weapon used, as individuals may react to them in different ways, and the various combinations of MC tech in use at a given time can cloud determinations. There are exceptions. Physiological symptom include:
o Headaches, dizziness, drowsiness, wooziness, dissorientation, distorted spatial perception, blackouts, seeing stars, tunnel vision, temporary blindness, audio tunnel or echo (akin to taking laughing gas in a dentist's chair.)Victims may further find unexplained scars, bruises, shaved areas, needle marks (sore red spots or bruises, perhaps with swelling,) or small lumps under their skin not previously noted. These are not only physiological in nature, but also physical evidence which is as important as environmental evidences. These wounds may be directly (by means of radiated energy effects) or indirectly associated with the electronic attack (surreptitious entry into the home while the victim was asleep.) When this is the case, the victim may recall having bad dreams or specific dreams of the actual entry events which had otherwise been assumed to be dreams. There may be evidence within the environment to support this notion, such as signs of entry, objects not in their right places, cat or dog now out when they were in when retiring, etc. All of this should be documented with witnesses, images, and written statements.
The cause for and purpose behind these symptoms might be drug injections (so-called ëtruth serums or drugs designed to improve victim response to the attack process,) rough handling of the body in moving, repositioning, or from struggles with the attacker, taking of tissue samples, or installation or removal of bioimplants ó which will be discussed separately. Any such clues may be accompanied with a strange sense or ìI just know itÖî feeling, or concrete knowledge that someone has been there even in the absence of environmental cluesÖ
With respect to impact on the environment, the effects of mind control are typically less dramatic; subtle and dependent upon a lot of variables which make absolutes difficult. As with bodily symptoms, each of these effects can typically have some plausible alternative explanation, making it hard to convince others that the problem is as suspected. However, some clues do imply specific kinds of MC tech in use. All of the following environmental clues can apply regardless of if the electronic attack is intended to be lethal, physically harmful, or simply part of a general MC attack project of some lesser intensity, but in the later instance, such clues may indicate improperly adjusted or applied technology, as earlier described; the idiot/amateur factor in play. This may still mean dangerous or even lethal attack levels, as noted.
o Fluids in containers may misbehave: carbonated drinks may suddenly try to dispel gasses, even in sealed, cool, and unjostled containers; fluids may ripple as if from drips (suggests extra-low frequency sound attacks); pressurized or vacuum sealed containers may rupture (also true of non fluids, such as vacuum packed vegies.)
Contact The Professional