Governmental surveillance, uncover systems, psychophysiological manipulation tactics

Government Surveillance and Undercover Systems

Governments worldwide employ extensive surveillance and intelligence capabilities to monitor both foreign threats and their own populations. Modern civilian surveillance spans from ubiquitous CCTV cameras and biometric systems in public spaces to large-scale interception of digital communications. Intelligence agencies also conduct foreign monitoring via signals intelligence (SIGINT), human intelligence (HUMINT), cyber-espionage and data sharing (e.g. Five Eyes). In many cases, surveillance is paired with behavioral profiling and psychological tactics – using data analysis, social media manipulation and covert influence to “understand and shape” people’s actions. For example, researchers note that after the Cambridge Analytica scandal, public awareness grew around states using surveillance to manipulate citizens’ opinions. Below we examine key methods and programs globally.

Civilian Surveillance and Data Collection

One ubiquitous form of civilian monitoring is the network of CCTV and other video surveillance in public spaces. Advances in AI enable widespread facial recognition: for instance, UK police have deployed facial-recognition cameras to scan crowds, helping locate missing persons, wanted criminals and out of the norm behaviour. Equally pervasive is digital tracking: smartphones and apps constantly emit location data, which can be harvested by state agencies through partnerships with data brokers. In the US, military and law-enforcement agencies legally purchase consumer cellphone location datasets, used to trace people at home and abroad. Telecommunication companies may also be compelled to retain metadata (records of calls, texts, email logs) and at times may use hidden cameras, echolocation devices to monitor domestic behaviour, within national security laws and at times for exceptional cases such as those imposed on criminal organisations. Privacy organisations warn that such mass surveillance uses “mass interception of communications”, bulk data collection and automated analysis on large numbers of people and data collection on certain individuals which classify as model cases and outliers. In practice, this can mean routing all internet traffic through taps (e.g. NSA’s Upstream program) or harvesting social media and metadata streams.

Key civilian-surveillance methods include:

  • Bulk data interception: State programs capture vast volumes of emails, chats, and voice calls. For example, the NSA collected communications from hundreds of millions of Americans and foreign citizens under broad legal orders. The UK’s GCHQ similarly tapped global fiber under its “Tempora” program, scooping up “every single communication that passes through the UK”. These bulk datasets may be searched later for targets and behavioural analysis .

  • Biometric monitoring: Government agencies deploy facial recognition, gait or iris scanning in crowds and at borders. The UK’s Home Office is actively expanding live facial-recognition for police use (resulting in ~1,300 arrests in two years). Similarly, China’s vast CCTV network (sometimes called “Skynet”) combined with its Social Credit System tracks citizens’ behaviour and assigns scores or blacklists for rule-breaking.

  • Mobile and Internet tracking: Tools like stingray IMSI-catchers (fake cell towers) allow police to locate phones on a location, radar basis. Internet services, by law or secret order, may hand over user data. Data brokers compile profiles from apps and ad networks; intelligence agencies can buy this indirectly to augment surveillance. Even social media posts and online activity are monitored: police often use social-media surveillance at protests, large gatherings or to identify “extremist” content, or in order to filter captured data such as photos or videos from cameras.

  • Undersea cables and satellites: Coastal cable-tapping stations and spy satellites enable foreign communications interception. For example, the American “MYSTIC” program captured 100% of calls from certain foreign populations under Executive Order 12333.

  • These large-scale collection methods combine to create a “data exhaust” range of ordinary life patterns. Privacy advocates warn that such indiscriminate collection (metadata, internet content, location trails) poses serious human-rights concerns.

          

Foreign Intelligence Monitoring

Intelligence services also engage in targeted surveillance of other nations and threats. Signals intelligence (SIGINT) remains a core tactic: agencies like the US NSA, UK GCHQ, Russian FSB, and Chinese MSS intercept communications abroad to track foreign governments, militaries, and terrorism networks. The Five Eyes alliance (US/UK/Canada/Australia/NZ) shares intercepted data and analyses. For example, leaked documents describe GCHQ and NSA programs that tap global internet backbones (e.g. PRISM, Upstream) and databases to spy overseas. Executive orders such as the US EO 12333 permit warrantless surveillance on foreign soil: under it, the NSA’s MYSTIC program collected 100% of a targeted country’s phone calls.

Other methods include:

  • Human intelligence (HUMINT): Deploying undercover agents and informants overseas or within suspected groups. This traditional spying includes embassy personnel or local operatives gathering secrets covertly.

  • Cyber espionage: State hackers infiltrate foreign networks, implant malware or ransomware, and steal information from other governments or multinational companies. Recent years have seen sophisticated state-sponsored attacks (e.g. the SolarWinds hack by Russian-linked hackers).

  • Satellite and drone surveillance: Reconnaissance satellites and aerial drones collect signals (radar, RF) and imagery for military intelligence.

  • Intelligence sharing alliances: Countries exchange raw data. Besides Five Eyes, organisations like NATO, bilateral treaties, and INTERPOL facilitate cross-border intelligence flow.

  • Economic and travel monitoring: Passports, visas, credit-card and travel records (e.g. Passenger Name Record databases) feed into counter-terrorism intel. For instance, the EU maintains a global terrorism watchlist database (PNR, SIS-II), and India’s NATGRID aggregates multiple citizen databases for national security use.

Russia and China also focus on foreign monitoring. Russia’s SORM system, originally built for phone calls, now enables FSB agents to tap internet traffic, emails and social media for domestic and foreign targets. Similarly, China’s state monitors dissidents abroad via its networks and has extended surveillance technology (like cameras) to allied nations.

Behavioural Profiling and Psychological Tactics

Beyond raw data collection, modern surveillance increasingly involves understanding and influencing behaviour. Intelligence agencies employ behavioural science and covert influence (often called psy-ops) as part of security operations. This includes profiling individuals’ personalities, behaviour patterns, response times etc, deploying propaganda, and manipulating information flows.

Techniques include:

  • Predictive profiling: Algorithms and analysts sift personal data (social media, travel, purchases) to identify suspicious behaviour, location prediction. For example, UK security specialists note that more than 60% of “lone wolf” terrorists accidentally leave clues in their personal life (e.g. sudden loan repayments, finding materials) before an attack. Agencies maintain databases of such behavioural indicators to flag threats.

  • Social engineering and disinformation: States conduct online influence operations to sway public opinions and influence behaviour patterns, such as hiring individuals with certain traits as public figures e.g black people as rappers. Research shows over 70 countries run deceptive social-media campaigns. UK and US agencies create fake online personas and bots to support government narratives or discredit adversaries. The Guardian and Wired reported that Britain’s military psy-ops unit (the 77th Brigade) and GCHQ’s Joint Threat Research Intelligence Group (JTRIG) have actively shaped social media content. Leaked NSA/GCHQ files described tactics like manipulating online polls, artificially boosting web traffic, amplifying certain YouTube messages, and planting false social-media posts for entire countries. Similarly, Russian and Chinese agencies systematically spread propaganda and fake news (e.g. via troll farms) to influence foreign publics.

  • “Nudge” and influence operations: Some governments fund research into behavioural science to subtly steer population behaviour (e.g. public-health campaigns or counter-extremism messaging). Documents have shown militaries seeking “targeted manipulation of information” to “understand and influence human behaviour” across overt and covert means.

  • Surveil-to-manipulate doctrine: Analysts warn that mass surveillance can be used proactively to shape attitudes. A recent study notes that intelligence agencies may conduct operations “in the name of national security” that deliberately influence citizens’ perceptions. This blurs surveillance with propaganda and social control.

Undercover Operations and Covert Influence

Intelligence and law-enforcement agencies also resort to undercover and covert tactics to infiltrate groups and carry out influence campaigns:

  • Infiltration and agent provocateurs: Historically, agencies have inserted agents into dissident or extremist groups to gather intelligence or to disrupt them from within. For example, the FBI’s notorious COINTELPRO (1950s–1970s) actively infiltrated civil-rights and anti-war organisations with undercover agents. It employed wiretaps, fabricated documents, disinformation, and even agents provocateurs to divide and “destroy” targeted groups. Similar tactics have been used by other regimes (e.g. East Germany’s Stasi embedded spies in churches and workplaces).

  • False flag operations: Sometimes intelligence services create fake organisations or narratives to flush out enemies or justify crackdowns. For instance, clandestine groups have been spun up to lure or monitor extremists (notable from Snowden leaks is a GCHQ project to create fake jihadist forums).

  • Psychopharmacology and mind control: In the past, agencies like the CIA researched behavioural drugs (MKUltra) to manipulate subjects without their consent. While most such programs were scandalously unethical, they illustrate how psychological techniques have been applied in intelligence contexts.

  • Targeted harassment: Modern secret units may use cyberstalking or “doxing” (revealing personal details) to intimidate or neutralise individuals. Reports from whistle-blowers suggest that agencies like GCHQ have considered campaigns to “discredit, disrupt, and deter” activists and hackers online through harassment tactics.

These undercover and covert methods combine surveillance with direct psychological pressure. By monitoring communications and embedding agents, intelligence services can not only collect information but also provoke or preempt threats in secret.

United Kingdom

The UK maintains an extensive surveillance apparatus led by its intelligence agencies. GCHQ (Government Communications Headquarters) is the UK’s signals-intelligence arm (headquartered in Cheltenham), working closely with the NSA and Five Eyes partners. MI5 (the Security Service) handles domestic counterintelligence and security, while MI6 (SIS) manages foreign espionage. Under laws like the Regulation of Investigatory Powers Act (RIPA 2000) and the Investigatory Powers Act (2016), these agencies can compel companies to hand over bulk data and intercept communications e.g from their own operatives within the company. An Investigatory Powers Tribunal ruling (2015) famously declared that GCHQ’s bulk collection and sharing of communications (via NSA) had breached human-rights protections.

UK Surveillance Programs

The UK uses both traditional and modern surveillance tools on its population:

  • Bulk communications interception: GCHQ’s Tempora program taps undersea fiber-optic cables, collecting vast amounts of internet traffic. This “full-take” collection (every email and message passing certain links) was revealed in legal challenges. UK agencies also gather phone and internet metadata from providers under new data retention and warrant rules.

  • CCTV and facial recognition: Britain has one of the highest CCTV densities in the world. Police forces have trialed live facial-recognition cameras at airports and city centers. The UK government is now consulting on expanding facial-recognition use nationwide, citing thousands of arrests already made with the technology.

  • Communications data and devices: Investigators can obtain encrypted data by compelling companies to decrypt, or by remotely installing spyware. UK law enforcement and MI5 collaborate on malware campaigns to exploit suspects’ devices.

  • Public databases: The UK controls extensive citizen data (ID records, driver licenses, travel entries). While not exclusively surveillance, these databases can be queried by security services for intelligence.

Behavioural Surveillance and Psy-ops in the UK

Britain has explicitly invested in psychological and behavioural intelligence:

  • Behavioral Science Unit (BSU): MI5 employs psychologists to analyse patterns of would-be attackers. Its analysts look for tell-tale behavioural shifts (e.g. increased grievance language online or planning behaviours) that indicate radicalisation. Over 60% of “lone actor” terrorists unwittingly reveal intent through such clues, which the BSU uses to thwart plots. MI5’s new “Minority Report” research unit (staffed with forensic psychologists) specifically studies how insiders and potential traitors might be detected.

  • Army 77th Brigade: Formed in 2015, this unit specialises in information warfare. It produces online content (social-media campaigns, “podcasts and videos”) intended to shape narratives at home and abroad. With about 1,500 personnel engaging on Facebook and Twitter, the 77th Brigade’s mission is to “control the narrative” by disseminating UK-favourable messages and countering hostile propaganda.

  • GCHQ’s JTRIG: GCHQ’s Joint Threat Research Intelligence Group is known to use sophisticated online techniques. Leaked documents show JTRIG developed methods to manipulate digital environments: it could falsify online polls, inflate web traffic, censor extremist content, and even plant false social-media content “for entire countries”. Although ostensibly aimed at extremists or hostile states, these tools demonstrate how the UK can conduct covert psychological operations.

  • Academic and military research: The UK Ministry of Defence has sponsored studies on “psychological operations” and the targeted manipulation of information. Leaked MoD documents noted a priority on “understanding and influencing human behaviour” using both overt and covert means. British universities have even been approached to help research behavioural manipulation in warfare contexts.

Legal and Oversight Issues

The UK’s surveillance regime has faced legal challenges. In 2015, the Investigatory Powers Tribunal (IPT) – Britain’s secretive spy-court – ruled that indiscriminate sharing of communications between GCHQ and the NSA had been unlawful under human-rights law. (Later revelations about the Investigatory Powers Act gave retrospective legality to some bulk collection.) Nonetheless, oversight remains contentious: privacy advocates warn that UK law still allows “industrial-scale” interception. The UK has also pledged to regulate biometrics: a 2025 Home Office review began consultations on formal oversight for police use of facial recognition, amid public debate about privacy.

Known Cases and Controversies

High-profile disclosures have spotlighted UK surveillance:

  • Snowden revelations (2013): Showed GCHQ working hand-in-glove with NSA. For instance, GCHQ reportedly gave NSA engineers access to its data-sharing systems (the “Squeaky Dolphin” program), and was itself intercepting telecom networks globally.

  • Investigatory Powers Act (2016): Known as the “Snooper’s Charter,” it expanded data retention and hacking powers. Civil society groups challenged parts of it as too broad.

  • MI5/MI6 infiltration fears: News reports in 2022 revealed MI5 set up a “Behavioural Science” research centre to detect spies in the UK security services. A recruitment advert described psychologists analysing officers’ vulnerabilities to foreign recruitment, even talking openly about “hacking their serotonin” to influence behaviour.

  • Biometric trials: Police forces using live face-recognition have faced court scrutiny. The London Mayor’s tech czar warned of errors and discrimination in early deployments (though the Home Office finds the public increasingly supportive).

  • Undercover policing scandal: (Outside intelligence services but relevant to trust) Decades-long revelations about covert police spies dating back to the 1970s have highlighted how state agents have sometimes abused undercover identities. These cases prompted public inquiries (though not directly intelligence agencies).

 

In-Person Undercover Operations

In-person undercover operations are a core method used by intelligence agencies and law-enforcement bodies to obtain information that cannot be accessed through technical surveillance alone. Their defining feature is the physical embedding of an operative within a real social environment, allowing direct observation, interaction, and influence while concealing the operative’s true identity and purpose.

1. Strategic Purpose and Targeting

Undercover operations are initiated when authorities determine that overt investigation would be ineffective, premature, or compromise intelligence goals. Common targets include criminal networks, extremist groups, espionage threats, organised crime, or covert political actors. The objective is typically intelligence gathering, threat disruption, or evidence collection, rather than immediate arrests.

Before deployment, agencies conduct extensive threat assessments and risk analyses, evaluating:

  • The target group’s structure and trust mechanisms

  • The potential legal and ethical implications

  • The likelihood of escalation or exposure

This planning phase ensures that undercover activity aligns with national law, agency mandate, and proportionality principles.

2. Identity Construction and Legend Building

At the heart of undercover work is the creation of a legend, a fully constructed false identity that the operative inhabits. This includes:

  • Biographical details (education, employment, family background)

  • Supporting documentation (IDs, financial records, digital presence)

  • Behavioural consistency (speech patterns, habits, values)

Crucially, legends are designed to blend naturally into the target environment. Rather than appearing exceptional, the operative’s persona is usually intentionally unremarkable, reducing scrutiny. Long-term operations may involve years of maintaining this identity across multiple contexts, however most often the cover is based around the individuals actual identity, e.g recruiting mr y as an operative collecting info within their profession and individuals who meet their habitual and professional environments .

3. Social Integration and Trust Development

Once embedded, the operative must integrate into the group’s social fabric. Trust is rarely immediate and is often built through:

  • Shared routines and proximity

  • Demonstrated reliability or usefulness

  • Emotional mirroring and social conformity

This phase relies heavily on behavioural psychology. Operatives are trained to read group dynamics, hierarchies, and unspoken norms. Importantly, they must avoid over-performance; excessive eagerness or competence can raise suspicion.

Trust development is incremental, and access to sensitive information usually comes after prolonged exposure, not direct questioning.

4. Information Collection and Observation

Information gathering in undercover operations is primarily situational and observational rather than interrogative. Operatives collect intelligence by:

  • Observing conversations, behaviours, and decision-making processes

  • Noting power structures and interpersonal tensions

  • Identifying vulnerabilities, resources, and intentions e.g entry points and exit points within an organisation

Memory discipline is essential, as note-taking or recording may be impossible. Information is often relayed through secure, indirect communication channels during scheduled check-ins.

5. Psychological Management and Role Maintenance

Undercover work requires sustained psychological control. Operatives must:

  • Maintain emotional distance while appearing socially engaged

  • Suppress personal moral reactions when witnessing illegal or harmful behaviour

  • Manage cognitive dissonance from living dual identities

Long-term operations pose risks of identity drift, emotional attachment, and stress-related harm. As a result, agencies increasingly provide psychological monitoring and post-operation decompression.

6. Influence and Disruption (Selective Use)

In some cases, undercover operatives are authorised not only to observe but to subtly influence outcomes. This may involve:

  • Steering discussions away from violence

  • Introducing doubt or delay into planning

  • Encouraging internal conflict or disengagement

Such influence is tightly regulated, as excessive manipulation risks entrapment, legal invalidation, or ethical breaches.

7. Oversight, Legal Boundaries, and Exit

Undercover operations are governed by legal frameworks that define:

  • Permissible conduct

  • Limits on participation in illegal activity

  • Authorisation levels and duration

Operations are periodically reviewed, and exit strategies are planned from the outset. Exits may be gradual (fading from the group) or abrupt (extraction following arrests or exposure). Post-operation reviews assess intelligence value, legal compliance, and psychological impact.

8. Strengths and Limitations

Strengths:

  • Access to intentions rather than just actions

  • Insight into motivations, beliefs, and internal dynamics

  • Ability to detect threats before execution

Limitations:

  • High personal risk

  • Time-intensive and resource-heavy

  • Ethical and legal complexity

  • Potential for abuse if oversight fails

 

 

Concluding Perspective

In-person undercover operations function as a human complement to technological surveillance. Where data collection reveals patterns, undercover work reveals meaning, how individuals think, relate, and decide. However, because they operate at the intersection of deception, psychology, and power, they demand strict oversight to prevent misuse and protect democratic norms.

 

– Governmental Psychophysiological manipulation tactics-

 

 

 

NHS ,  medical organisations –  covert agency

Medical organisations such as the NHS use covert agencies such as the use of actors and undercover agents in order to manipulate individuals into believing they require medical attention for reasons such as belief system manipulation, crime deterrence, interrogation, physiological manipulation and to set up/arrange criminals and those the government wishes to outcast, through the use of psychological, hypnotic and medical procedures which can be used in conjunction with the targeted individuals belief system such as the beliefs in supernatural entities ghosts, demons, possession etc, in order to manipulate them into believing they require medical treatment. They use social environments such as the church in order to gain access to the targeted individuals life as they already have undercover agents which operate in such social environments, these covert agencies use the assistance of religious organisations such as the church in order to help monitor and manipulate the targeted individuals.  they can use a range of tactics from the following :

 

 Domestic monitoring & covert fear mongering tactics

 

  • Domestic lining manipulation:  domestic lining, meaning pipe lines, water systems, lighting, air conditioning, heating systems can all be manipulated in order to make sounds, vibrations shifts in lighting and to communicate hidden messages, in example a pattern of 1 2 , 1 2 , 1 2 3 4 , 1 2 3 , 1   ( 1 you 2 should, 1 think 2 about, 1 what 2 you 3 were 4 doing, 1 at 2 the 3 park, 1 today) can be communicated with different sounds or through different devices, upon implementation of some sort of stimuli that would trigger a memory of the park e.g a green bottle which the target had at the park or to make the targeted individual believe they are preciving supernatural entities.

  • coded communication: such as Morse code communicated through body language, this sort of communication can be developed within an individual as a form of synesthesia which is the relation of non-related senses and perceptions such that of movements with words, in this sense the targeted individual will precieve the coded-conversated topic within the movements of agents and non-agents in order to make them believe they are seeing or precieving information and if someone is to have supernatural beliefs they will slowly believe they are going crazy.

 

  • they use a range of tactics such as formations in order to surround their targets and make them precieve that everyone around them is part of this organisation and they are signalling the target,

 

  • the use of medical grade drugs such as morphine are used in order to euphonise the targets body, however their mind remains aware, then the target can be manipulated in a variety of methods such as physically, through the use of hypnotic tactics shock delivery and stimulation to various parts of the body, as well as psychological manipulation by telling the target different things within their ears and using certain frequencies of sound and vibrations to create associations between movements, twitches and sounds, if the target has any supernatural beliefs they may precieve themselves to be possessed, these tactics can also be used in order to reduce the health of a targeted individual such as the development of arthritis within their joints.

 

 

  • entering the target’s house, domestic environment to manipulate the order of their home, which can cause paranoia if the targeted individual has any supernatural beliefs.

 

– Mechanism –

This organisation uses a psychological manipulation tactic which is aided by ( environmental context dependant memory ) the use of environmental and behaviour patterns of the targeted individual which can be used to make associations with a cycle of thought, this cycle of thought can be activated through certain frequencies of sound and patterns of movements, this cycle can be carried out in order to overstimulate the targeted individuals conscious mind, whilst their conscious mind is distracted ideologies, methods of thinking, can be placed within their unconscious mind and their mind can be manipulated within a variety of ways.such as  memory loss , memory change ideology manipulation.

 

the targeted individuals behavioural patterns can also be adjusted, by bringing unconscious physiological processes such as breathing to the conscious mind, distracting the conscious mind through signalling and sensory over stimulation, adjusting/impacting the physiological process, which the unconscious mind then registers as a new pattern of behaviour. in this manner the target can be made to behave out of the ordinary, increasing the likely hood of the target passing as medically unfit. within the targeted individuals unconscious mind, negative ideologies such as suicide “kill yourself   1,2 ” or entity related “demonic” phrases “i am a demon 1,2,3,4” can be placed, upon reactivation of this pattern of though physiological processes such as the movement of the tongue or upper esophageal sphincter will unconsciously move, in the pattern of the phrase/sentence and the unconscious mind remembers the meaning of this pattern, this occurs because the targets mind has been put in a constant state of conversation due to this morse coded communication which the agents surrounding the target daily use to constantly communicate with the target, and then whilst the target is home, sleep and fully unconscious these patterns of thought can be re-enforced through pattern revival by auditory visual stimulus, through domestic lining manipulation such as gas entering the heating system at a pattern of ( 123, 1234, 1 )(1 you 2 will 3 go, 1 to 2 the 3 park, 4 tomorrow, 1 again) or agents who live adjacent to the target creating patterns of sound to communicate with the target through this synesthetic coded communication.       whilst the target is away from habitual environment morse coded communication of movement and over stimulation is constantly implemented which causes the body to mix thought processing and physiological processes as the brain thinks it is in a talking phase   (       During conversation, the mind is primarily in an active, focused, and high-arousal state, characterised by the production of beta brainwaves (12–30 Hz). This state is designed for concentration, mental processing, and alertness, allowing the brain to decode speech, analyse meaning, and formulate responses in real-time.Active Cognitive Processing (Beta State): When engaged in conversation, the brain is actively working, with the frontal lobe managing speech and the temporal lobe processing auditory input.       )      which also explains why the targeted individual is in a state of noise sensitivity and why their body such as their upper esophageal sphincter moves in the previously precieved/externally placed pattern, upon reactivation of the previously precieved pattern of thought, leading the target to believe they are possessed if they have any supernatural beliefs, leading to them becoming medicaly unfit, either due to their belief or the over stimulation of the brain which can cause a reduction in cognition .

the hypnotic state requires :

  • A constant auditory stimuli e.g the sound of wind produced by moving vehicles or buzzing produced by the domestic lining manipulation
  • multiple visual distractions
  • induced constant attention diversion
  • conscious mind distracted, through the knowledge of the targets pattern of thought,   thought pattern can be identified based on environment
  • thought procedure identified, then diverted in the agent’s chosen direction  (thought procedure hijacked)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Induced command performation :

  • A constant auditory stimuli e.g the sound of wind produced by moving vehicles or buzzing produced by the domestic lining manipulation
  • multiple visual distractions
  • induced constant attention diversion
  • sudden auditory stimuli such as a bang or a specific frequency sound which has been previously programmed to match a certain movement of the target
  • synesthesia sound -> movement association   ( command performed )

 

 

 

    • -first the targets pattern of behaviour is identified. During the drugging session, different forms of twitching are induced into the target through the previously stated processes. through the signalling & the domestic lining manipulation the targets brain is first overstimulated with auditory & visual stimuli as the targets brain must process multiple stimuli & multiple communicated concepts at once the hypnotic state is achieved, then whilst the conscious mind is distracted different ideologies, concepts, patterns of thought are communicated and planted into the targets mind through the signalling, refer to image above for outcome >

the twitching is to provide an entry opportunity for the agents, as the target’s body recognises this is an out of the ordinary physiological response, as the twitch occurs the thought pattern of the target can be identified and therefor manipulated in the chosen direction of the agents.

– priming –

The target is primed whilst they sleep, certain frequencies of sound are matched with their movement whilst they sleep

synesthesia induced memory          Audio-> Movement

-The brain will learn to automatically  perform movement upon stimuli induction

 

 

Any of the targeted individuals patterns of behaviour from physiological to thought patterns (targets ideology) can be identified, e.g thought pattern can be identified, interfered at an identification point such as a twitch or prediction, external pattern (ideology) can be placed, pattern can be re-recognised ideology can be replaced until target forgets what their own ideology was, therefor manipulating the targets behaviour or action. This principle can be applied to any physiological process.

 

  • This is what people thought was voodoo, black magic, shamanism etc and still to this day people who are not educated on this topic or people with supernatural beliefs will misunderstand this scientific, psychological manipulation process as the stated.

 

 

  • Alongside the government, such as the NHS, cults, grooming gangs, religious groups and people claiming to have supernatural authority will use these tactics to deceive & manipulate their target audiences beliefs & actions

– Procedure –

this process can be achieved via 1 drug session with a medical grade drug such as (morphine) administered to the target via an agent, someone trusted by the target such as a relative or a lover who can enter the life of the target through deception. when the target is drugged 2 paramedics per target enter their habitual environment and then various processes can be used to manipulate the target’s physiology and ideology.

first the target is prepped with a medical examination, then the target is interviewed in order to understand their pattern of thought and terminology used in thinking, this can be used further in the process to build a cycle of thought by the agents. Then the paramedics place the target in a position of comfort with their dominant leg placed under the other, the target is allowed to watch an overstimulatory epileptic video in their phone which is held in their dominant hand, this video contains photo sensitive, musiogenic, reflex stimulus whilst the target is overstimulated the paramedics try to distract the target from both sides whilst shocks are delivered to the targets non dominant hand which causes over-stimulation of the brain as well as the nervous system, this process is continued for several hours in order to place these shocks within the memory of the target, then the target in seated in a chair opposing a mirror with there forearms placed with tension on the palmaris longus and flexor capri ulnaris on the non dominant hand, the paramedics stand behind the target on the left and right, the paramedics signal the target via movements of their own hands on the left and right side of the target which diverts the attention of the target, whilst certain auditory triggers are delivered to the target through headphones, (sounds which can further in the process be used for the development of synesthesia )  placed on their dominant side the target is overstimulated and distracted which tricks the targets brain into believing the paramedics hand is their own, causing twitching of their non dominant hand this process is continued for several hours in order to make the targets memory create associations between the hands of others and their own in the same way musculatory memory is developed for the twitching. Then the target is made to focus on 1 point whilst they are told to spin around as fast as possible, the target being under the influence of drugs will follow the command given to them by the paramedic, this process is done in timed intervals and repeated in order for the targets memory to maintain the pattern of events which leads to dizziness. The dominant eye is covered then the target is placed straight on their back, the non-dominant eye is covered with an eye shield, then the distancing process of the retina is ruined as the dominant eye is made to focus on a distance and the non dominant eye is made to focus up close on the reflex stimulus. then the target is allowed to remain in a sleep position and as soon as they are to reach a state of sleep a shock is delivered to them alongside a loud noise which would rewake them, this process is repeated until heart rate change is achieved (fight or flight nervous response), whilst all this occurs the paramedics also observe and note the physiological processes of the target such as their digestion rate.  Then the target is allowed to sleep, reawaken allowed to see the paramedics in order to make the target believe they are envisioning supernatural entities. the target is fed statements like swallow your thoughts which can then be used for the previously stated process of ideology placement and reactivation in order to make the target believe they are in possession. The target’s behaviour pattern is known and can be communicated to them via the morse coded communication in order to manipulate their behaviour and make them believe they are seeing supernatural entities and are subject to possession, and to reduce the physical and cognitive capability of their targeted individuals, they do this in order to make targeted individuals accept disability as they can claim more funding from the government, they choose their targets based on mainly, family disability history, as one can not appear to be too healthy, or grow too quickly out of the range of their families socioeconomical range, as the councils will always need individuals to house and the hospitals will always need individuals to treat.

Lesson Explainer: Reflex Actions | Nagwa

 

The same mechanism is demonstrated in this photo however rather than the hot object it is the shock which causes the impulse to reflect, this mechanism can be recycled in the next image

 

 

Anterior Forearm Flexor Muscles | Anatomy & Innervation

The forearms of the target are rested on the handles of the seats at an angle which allows, blood flow due to gravitational pull causing an exaggeration of heart beats within the hands, shocks are delivered in conjunction with heart beat rhythm meaning twitching will occur automatically in future instances as heart rate reaches similar conditions. an emotional state is reached by scaring the drugged and unconcious target via a loud noise upon a certain beat of their heart rhythm.

this mechanism can be repeated as the target is sleep on a time relative basis e.g if the shocks were delivered at 12.30 am loud auditory stimuli can be induced at the same time frame by the adjacent agents in order for the targets nervous system to re-register the memory. such as in the pattern recognition mechanism introduced previously

This principle can be applied to any physiological process.

 

 

 

The positioning is quite similar to that of this image with the target placed in such a manner in the seat and ( P1, P2 ) paramedics behind the targeted individual. giving hand signals which will cause the target to twitch. The twitching can be used for various deception and thought intervention tactics

 

 

– synesthetic morse coded signalling –

 

Signal Detection Theory (SDT)

Signal Detection Theory (SDT) is a psychological and statistical framework used to explain how individuals distinguish meaningful signals from background noise under conditions of uncertainty. Originally developed in radar research during World War II, it was later adapted to perceptual psychology and is now widely applied in neuroscience, medicine, decision science, and behavioural research.

At its core, SDT proposes that detection is not simply about whether a stimulus is present, but about how a person makes decisions when sensory information is ambiguous. Every decision involves two components:

  1. Sensitivity (d′, d-prime) – the ability to accurately discriminate between signal and noise. Higher sensitivity means the signal stands out clearly from background variation.

  2. Response criterion (β or c) – the decision threshold a person sets for saying “yes, the signal is present.” This reflects bias. A liberal criterion increases hits but also false alarms; a conservative criterion reduces false alarms but increases misses.

SDT describes four possible outcomes:

  • Hit – correctly detecting a signal

  • Miss – failing to detect a present signal

  • False alarm – incorrectly detecting a signal when none exists

  • Correct rejection – correctly identifying that no signal is present

Importantly, SDT shows that perception is influenced not only by sensory input but also by expectations, motivation, risk tolerance, and context. For example, a radiologist screening for cancer may adopt a liberal criterion (accepting more false alarms) to avoid missing a real tumour.

In essence, Signal Detection Theory reframes perception as a probabilistic decision-making process shaped by both sensory capacity and psychological factors.

Morse code

Morse code is a method of transmitting textual information using a series of short and long signals, known as “dots” and “dashes.” Developed in the 1830s and 1840s by Samuel Morse and Alfred Vail for use with the electric telegraph, it assigns a unique sequence of dots and dashes to each letter of the alphabet, number, and some punctuation marks. These signals can be sent through sound (beeps), light flashes, radio waves, or written symbols, making Morse code highly adaptable.

For example, the letter “S” is represented by three short signals (···) and “O” by three long signals (–––), forming the well-known distress signal “SOS” (··· ––– ···). Although largely replaced by modern digital communication, Morse code is still used in aviation, amateur radio, emergency signalling and coded communication due to its simplicity and reliability.

this same principle can be applied to movements instead of dots, dashes and letters movements can be a certain stimulus will be present e.g a green bottle which the target had in the park when the target is reintroduced to this green bottle movement can be used to model the sentence the agent wishes to communicate to the target e.g  ( 1 were 2 you , 1 at 2 the 3 park , 1 last 2 week)     12, 123, 12 it is quite like an algo-rhythm where the number of words in a sentence can be modelled within an unrelated rhythm such as that of the rhythm of movement. this concept only works for simply structured sentences and non complex terminology,

Basics of Algorithm Structure - Data Science Workbook

 

the input is the number of words within the communicated non complex sentence, the steps between are the other external stimuli which put the mind of the target towards the correct topic which the agent wishes to communicate, plus the rhythm at which the movement is modelled e.g (1-2 short pause 1-2-3 ,    1-did 2-you , 1-go 2-to 3-the)  the output is the point being communicated

 

 

 

over time as the target is primed whilst they sleep, during hypnotic sessions and signalling whilst they are in public spaces by the hired agents, the targets brain will begin to associate certain movements with certain sounds which begins to develop into synesthesia, triggers such as single movements and sounds will automatically trigger the response within the brain for the previously placed topic of thought or action associated with those triggers. it is very difficult for non targeted individuals to see the signals as there is a process of priming, induction & completion involved. the target is first deceived as to the meaning and reason behind the signalling the target has been previously primed with.

 

 

 

 

 

– Signalling & synesthetic Morse coded communication –

 

signalling can be done via simple movements or movements of attention grabbing objects such as shiny objects, phone screens,smart watches, radios and necklaces

The best smart watches you can buy at every budget45,790 Phone Hand Outdoor Stock Photos ...

These objects can be used to signal targets covertly as they shine and have a beginning and an end.  ( 123,12   flash flash flash, flash flash   did you go, to the )

 

 

 

 

 

 

 

 

The communication will not be visible to those who have not been primed or targeted however if close attention is paid, they can be identified as they are patterned, exaggerated movements :

 

 

(1-did 2-you 3-go, 1-to 2-the 3-park, 1-yester2-day )(123,123,12,)

 

 

(1-what 2-is 3-your 4-first 5-name)(12345)

 

 

(1-did 2-you 3-go, 1-to 2-the 3-park, 1-yester2-day )(123,123,12,)

 

 

(1-what 2-is 3-your 4-first 5-name)(12345)

 

 

(1-did 2-you 3-go, 1-to 2-the 3-park, 1-yester2-day )(123,123,12,)

 

 

 

(1-what 2-is 3-your 4-first 5-name)(12345)

 

Agents which are overt such as public services workers (police officers, paramedics, public transport workers) can also use radio screens to communicate messages to targeted individuals as these shiny objects have a beginning & an end therefor they can be used to communicate ( 123,12   flash flash flash, flash flash   did you go, to the )

 

 

– AGENTs –

The agents can range from both genders a variety of ages, disguised to meet the requirements of the socioeconomic area they are in and to meet the requirements of the roles they play, they range from homeless people to looking like wealthy individuals.

there are agents in all fields of occupation and they can monitor behaviour as well as the agents who surround and psychologically torment the targeted individuals they use carrier bags to communicate different messages to targeted individuals such as the following :

Green Shopping Tote Bag Waitrose & Partners Green Core Pouch Bag - Reusable Shopping Tote, Genuine UK Made, Eco-Friendly RPET Waitrose Tote Bagthe waitrose bag which signifies repetition, if you are commiting an act or behaviour which they wish to manipulate you into believing is a good habit or behaviour which should be repeated they use this bag to symbolise that, many may not notice however the unconscious mind will.

 

 

 

Primark makes announcement that will impact all shoppers from May 12 | Wales OnlineThe primark bag signifies commonality, cheap, if you are commiting an action or behaviour which they wish to manipulate you into believing is a cheap, undesirable habit or behaviour which should not be repeated they use this bag to symbolise that, and maybe they can manipulate you into adjusting that behaviour as your mind has the ability to create association

 

 

Printed Non Woven Carrier Bag for Life Ref Sainsburys

 

The sainsbury bag can carry 2 meanings, “did you see that” and strength

 

 

 

 

 

 

Why this M&S turnaround should finally stick

The M&S bag is used in order for the agents to identify one another as well as capture the attention of the targeted individual

 

 

 

 

 

 

– Agent formations –

 

 

The agents surround the targeted individual, especially in the underground or public transport systems. which are a public encasement’s and based on human psychological prediction they place themselves around the targeted individual, in this manner the target has no choice but to receive the signalling, because they happen to see many individuals, some may believe they are precieving entities, and it is much easier to place them in the hypnotic state within this encasement as well as the carriage being controllable to produce auditory signals.

 

 

 

 

The agents surround the targeted individuals within a formation and move around different targets therefore the same target does not come in repeated contact with the same agent, in this manner the agents can create a story around the targeted individual, in example making them believe that everyone is part of their operation or to ensure the target does not harm the agents involved, the agents operate in different locations on different days therefor randomising their appearing.

 

 

 

 

 

 

in this mock image, the agents can be observed around the target, the use of different bags to communicate different messages to the targets as stated previously.

 

 

 

 

 

 

 

The agent can be observed approaching the target the use of her phone can be made in order to signal the target, the target will have been previously primed to be sensitive to shiny surfaces, the whole point is (covertly) therefor non targeted individuals will not know what is occurring, meaning if the target was to act violently, the agents can be witnesses to the occurrence and in this method “set up” the target

 

 

 

 

 

 

The agent can use individuals in front as “carriers” the agent will give the first signal and as the targets mind reactivates the memory of the previously placed sentence the movement of the carrier in front will complete the signal e.g  ( dont do that again  1,2,3,4, ) the agent will give the first 1, 2 movement and the unaware “carrier” will complete the signal 3,4

they also hire child actors, lie to the child actors about the target, therefore they are kept in the dark on the true motives of the process(why the individual is targeted), the child actors will signal the target or complete the action they are required to do, in order to create the illusion that it is everyone who is in on this process or make the target think all this is occurring in their head

 

there are 2 types of undercover operatives, retention operatives & formation operatives :

 

Retention & Relation operatives

These types of operatives retain their cover and are under the same cover for a prolonged period of time, such as that of people who work in social environments or have access to some sort of a key entry, exit or manipulatory position such as builders, maintenance men, paramedics, elderly neighbourhood watchers, cafe workers, council workers, cleaners etc

They also hold social circles which they use to monitor those individuals within their social circles.

some examples being companies such as mitie which is nationwide and have operatives which partake in manipulating targeted individuals electrical,water,gas systems to signal different messages to them, in order to make them think they are experiencing hallucinations, or to monitor them.

Mitie-Interserve facilities management deal to face competition probeG4S plans 1,000 job cuts in cash handling unitThe hidden costs of neglect: why regular commercial heating maintenance is crucial - Cleanheat Engineering Excellence How should I choose and work with a builder on my home improvements? | Front DoorOffice for National Statistics | HR Grapevine

 

 

Formation operatives

These types of operatives change locations and are under different covers based on the time periods required e.g daily,weekly or until the desired outcome is reached. They can range from previously modelled agents who disguise as the public to friends or sexual partners.

 

 

 

 

 

 

 

 

 

 

 

– Testimony –

 

Firstly an agent entered my family through a relative of mine, she was a sexual partner and therefor could leverage her position to get closer to her chosen targets (my family),  i am British & Iranian therefor both governments have a hand in this occurrence. The British government approached my family through the church, lied to them deceived them and made them believe a variety of things about me that are not true, then when i attended the church agents who were disguised as old people claimed to be from oxford, foreshadowed the events which were to follow. Then a gathering was arranged at my family house where relatives of my family who are covert agents for the Iranian government plus the women who was a sexual partner of my close relative who is a covert agent for the British government, all attended the gathering. at the gathering alcohol was consumed, unaware the alcohol was spiked with morphine, all participants drank apart from the Iranian agent, once the gathering was over, the British agent and my close relative left the gathering, the Iranian agents stayed over for the night. Once the drug began to work paramedics were allowed into our home by the Iranian covert agent, the procedure was carried out, i was awaken in order to see the paramedics to make me believe i was envisioning supernatural entities, they placed the sainsburies bag near by to me the next morning in in order to communicate “did you see that”. Once the procedure was over, we woke up the next day, to attend the church, at the church the ceremony was completed. once i left i was told by my parents that we would be taking a trip to Iran, i went to the embassy where different individuals were shown to me resembling that of people i know foreshadowing events to follow. The Iranian government told the British government various lies about me, because they take religion very seriously, religion is part of the governance system there and therefor any national or ethnic Iranian who speaks against religion is considered an enemy, once we went on a trip to Iran, the Iranian government set me up on the plane, an agent acted violently towards me, i retaliated and this was done in order to create the illusion to my parents that i am a danger, they also lied to them about my sexuality.   Wherever we stayed i was deprived of sleep, i was told to sleep in a certain manner for example on my left side, in order to cause furhter sleep deprivation and worsen the twitching communicated through this signalling code. I was made to believe i am in a spy recruitment plan so that i would go along with what was happening. Planned routes were taken each time we would travel and individuals from this governmental organisation would surround us in order to either make me think i am going crazy or to make me think it is all in my head and through the feeling of unsafety they desired for me to commit an illegal action so they could either hospitalise me or put me in prison. Then the process of Priming began. Alongside this feeling of unsafety, my parents were told the sleep deprivation is a form of punishment however the true reason was in order to push me towards violent action and furhter create the illusion this is occuring in my head, hypnosis was then used in order to make my nervous system sensitive and to make me associate the movements of the hands of others with my own, causing shaking and twitching of the hands upon certain visual and audio stimuli such as certain sounds and movements as modelled previously. This twitching would be used in order to try to scare me into believing i am in possession and to scare me into believing i require medical attention. I was deprived of sleep in order to make me believe it was surreal and to push me towards criminal actions so I could be arrested or hospitalised. Each time they would push me towards an emotional state in order to make each hypnotism session more effective, i was then put on house arrest for some days however they made sure i got plenty of sunlight and food so nobody would notice i have been put under emotional and psychological stress, colour association was also used to make links between behaviour patterns they wished me to have such as praying being green and negative or undesirable behaviours being red this was a distraction from their true intentions as they tried to adapt to my belief of the occurrence. This signal language would be used to further create synthetic association in my brain and to try and plant negative ideologies in my thoughts and to corrupt my thinking pattern and clarity of thought, through over stimulation. They used my right ear and left ear for different associative patterns of sound in order to create different trigger mechanisms (meaning sound A would trigger memory A or pattern A) as explained in the previous sections. The times of day when azan is sang (prayer time) was the only time of day when the signalling would stop in order to further create the illusion that this was in my head (supernatural) and to try and influence me towards conversion to Islam to put an end to this psychological stress. i was continuously threatened through this signalling in order to push me closer and closer towards criminal action, i was further threatened of hereditary loss by governmental agents within my family. The agents would follow us daily and surround us in Iran following the procedures stated previously, my parents were deceived to believe the lies stated below to go along with the governments plan and i was told i am in a spy recruitment program in order for me to go along with learning the signalling & process and each time i would realise a section of their plan they would shift the story in order to mask their true motive and each time i learnt a new piece of relevant information they would repeat this information to me as if they were revealing it to me. The reason they send international individuals back to their ethnic nation is if they are to commit criminal action they would do so upon a non-British individual or establishment and would be charged by their ethnic law in order to reduce the number of individuals within the British justice system. Upon my return to the UK, the governmental agents changed from Iranian agents to British agents, and through the previously stated processes, such as domestic lining manipulation, further continuous priming and formation creation they surrounded me and continued to try to make me believe i was precieving supernatural entities or to make me believe i was schizophrenic, they understood my thought pattern and used the twitches as entry points for planting external thoughts in my mind and through continuous, processing as the processes stated previously they tried to set me up to hurt my parents or to explain to the police what has occurred in order to arrest my parents. They are in a process of trying to “set up” > (arrange a false story where internal individuals cause the downfall of each other) my family, immediate and distant. Once at the police station i realised what is occurring they told my parents to  “do to me as i do to them” & to take me to the hospital, which was a deception tactic to get them to hold me within the home by blocking the door in order to make me act violently as they were told to contact the ambulance service, unknowing of the governments true motives my parents followed their commands all this was to separate my family from one another in order to slowly ruin our relationship, and to put me on disability which the council & the NHS could use as an excuse to arrest us for medical fraudulent behaviour, slowly the government would adapt their story along as i realised what was occurring. They lied to people in my university in order to ruin my reputation therefore once they fail me and send me out no one would notice. They have been watching us for the last 2 years and have tried on multiple previous occasions to “set me up” so they can go along with this plan. They planted the idea of suing the university i am a part of as they tried to make me believe it is the university which has planned this whole process, if i was to try to sue the university i would require witnesses, if i was to convince my parents to be witnesses they would deny the whole operation call us liers and arrest the 3 of us.

The whole point of this coded signalling is no one would notice what is communicated and if they succeed in pushing me towards criminal action, they can say they had nothing to do with it and that i am crazy and also in order to place the brain in a state of conversation and inability to process new information. Continuously each night they continue the process of priming, during my outings surrounding me and signalling > over stimulation >  & the process continuation, at one point they put emetic (nausea and vomit inducing) medication in my food which made me throw up at work causing loss of occupation. They have entered my family through various agents, lied and deceived each one to believe a different story so everyone would follow through with their plan and they could ruin us from within, sort of like a civil war. This is a process they put countless groups through such as those stated in the previous sections.

Lies told within my family the communities i am a part of :

  • antisemitism & racism
  • paedophilia
  • homosexuality
  • told i am a danger
  • anti-religion
  • test for some sort of reward
  • punishment for actions
  • heavy drug use

 

The government uses Deception, disguise and manipulation tactics in order to enter the lives of those they disagree with, or wish to outcast from society in order to slowly ruin them and cause them to ruin one another.

 

 

 

– Reference list –

 

Amnesty International. (2015). UK mass surveillance ruled unlawful. Amnesty International. https://www.amnesty.org

Andrejevic, M., & Gates, K. (2014). Big data surveillance: Introduction. Surveillance & Society, 12(2), 185–196. https://doi.org/10.24908/ss.v12i2.5242

Ball, J. (2013). GCHQ and NSA targeted charities, Germans, Israeli PM. The Guardian. https://www.theguardian.com

Ball, J., Borger, J., & Greenwald, G. (2013). Revealed: How US and UK spy agencies defeat internet privacy. The Guardian. https://www.theguardian.com

Bradbury, D. (2022). How governments use facial recognition technology. Computer Fraud & Security, 2022(2), 6–10. https://doi.org/10.1016/S1361-3723(22)00019-9

Bennett, C. J., & Lyon, D. (2008). Playing the ID card: Surveillance, security and identification in global perspective. Routledge.

Borger, J. (2015). GCHQ’s surveillance ruled unlawful by UK tribunal. The Guardian. https://www.theguardian.com

Buncombe, A. (2014). Britain’s secret cyberwar unit: 77th Brigade. The Independent. https://www.independent.co.uk

Crawford, K., & Schultz, J. (2014). Big data and due process. Boston College Law Review, 55(1), 93–128.

Deibert, R. J. (2015). Black code: Surveillance, privacy, and the dark side of the internet. Signal.

Department for Digital, Culture, Media & Sport. (2023). Biometrics and surveillance camera code of practice. UK Government. https://www.gov.uk

European Court of Human Rights. (2018). Big Brother Watch and others v. the United Kingdom. https://hudoc.echr.coe.int

Foucault, M. (1977). Discipline and punish: The birth of the prison. Pantheon Books.

GCHQ. (2023). About GCHQ. UK Government. https://www.gchq.gov.uk

Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Metropolitan Books.

Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622. https://doi.org/10.1080/00071310020015280

House of Commons Intelligence and Security Committee. (2023). Annual report. UK Parliament. https://committees.parliament.uk

Investigatory Powers Tribunal. (2015). Liberty & Others v GCHQ. https://www.ipt-uk.com

Lyon, D. (2018). The culture of surveillance: Watching as a way of life. Polity Press.

MI5. (2023). How MI5 works. UK Security Service. https://www.mi5.gov.uk

NATO Strategic Communications Centre of Excellence. (2020). Behavioural science and modern influence operations. https://stratcomcoe.org

National Security Agency. (2013). Section 702 overview. https://www.nsa.gov

Office of the United Nations High Commissioner for Human Rights. (2014). The right to privacy in the digital age. United Nations. https://www.ohchr.org

Privacy International. (2023). What is mass surveillance? https://privacyinternational.org

Snowden, E. (2019). Permanent record. Metropolitan Books.

UK Home Office. (2016). Investigatory Powers Act 2016. https://www.legislation.gov.uk

UK Ministry of Defence. (2019). Joint doctrine note: Information advantage. https://www.gov.uk

Wardle, C., & Derakhshan, H. (2017). Information disorder: Toward an interdisciplinary framework. Council of Europe.

Wired. (2014). GCHQ’s covert online operations revealed. https://www.wired.com

Zuboff, S. (2019). The age of surveillance capitalism. Profile Books.