Project Soul Catcher and the No Touch Torture Techniques used by the US Government

technology computer head health
technology computer head health
Photo by MART PRODUCTION on Pexels.com
My video on the Subjects

By Robert Duncan, A.B., S.M., M.B.A., Ph.D. “Project Soul Catcher”:

Summary of no-touch torture techniques:

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states
    The idea is to shake up the emotional states of the target because different information can be accessed at each state. Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways. The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.” The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.
  2. Memory Erasure
    The military and CIA have been researching memory erasing drugs for half a century. The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation. There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do. Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes. The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.
  3. Electricity and Shocks
    Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.
  4. Fear and Terror
    There are many techniques to induce extreme fear in the target. In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used. Remember that many targets of torture die from the physical effects. It is torture to death.
    Let us compare the no-touch torture methods used to inflict the same terror and mental anguish. In several of these techniques the target needs to hear their handler’s voice. This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.
  5. Imprisonment and Isolation
    Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche. Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.
  6. Sexually Disturbing Tailored Pornography
    The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.
  7. Mutilation
    Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture mutilation is done by trickery. Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.
  8. Personal and Spiritual Defamation
    In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?” In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.
  9. Psychological Intimidation
    This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.
  10. Rape
    Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding. In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.
  11. Dietary Manipulation, Forced Weakness and Sickness
    The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.
  12. Repetition
    Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.
  13. Sensitization of Pain Impulses
    While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.
  14. Sensory Overload and Deprivation
    Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes. Targets of no-touch torture often hear endless tinnitus.
  15. Sexual Humiliation and Lack of Privacy
    Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.
  16. Maximum Sensory Pain Techniques
    Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering. All suffering can be entrained into the minds of no-touch torture subjects.
  17. Sleep Deprivation
    This is the number one torture method along with the popularity in the press of water boarding. This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.
  18. Stress Positions
    Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

SOURCE: https://projectsoulcatcher.blogspot.com/

===

These techniques are real and some have been practiced on myself and others that I know. This war crosses the boundaries between the spiritual and the physical as well because these technologies came from the fallen ones or the “aliens” the media and Hollywood keep pushing! They are NOT extraterrestrial beings but rather inter-dimensional and they’re intent is EVIL CONTINUALLY and they hate you with a passion!

So take this war seriously and put on the FULL ARMOR OF GOD because you don’t stand a chance without it! God bless and take care!

Johnny

Controlled Demolition

Mark of the Beast

Homeland Security PDF

You can support this ministry and keep us on the internet using the links below.  Patreon is gone so we have PayPal and Cash App left to us below.  We have also added a new monthly support option through the website.  That link is below as well.  Thank you again and God bless!

Monthly Support Option: https://dontspeaknews.com/donations/

PayPal Link: https://paypal.me/johnnystorm

Cash App ID: $jstorm212

6 comments

  • Yes people have been conditioned to wait for an RFID chip and are seeing everything with their physical eyes and they need to saw things spiritually. They are being misled and are waiting for something that is already here.

    • 2930 Rockaway Avenue Oceanside NY is a new black site and the Hispanic Mafia runs the operation internally for Brosnan Security in building IV over the fourth floor while black ops patrol the compound all night. This is a slow kill genocide operation using all kinds of directed energy weapons into my body. The assaults are 24/7 crimes against humanity, atrocities that far exceed the original Holocaust. 24/7 mass surveillance, Pegasus on cells and other products, car tech hacking, poisonings,physical assaults, electronic rape and genital assaults, sexual molestation and bodily humiliation, financial genocide, homelessness, driving a victim from home ownership and stealing real property as well as destroying all property you ever had owned in life, gaslighting, blacklisting, killing your pets, non consensual experimentation mkultra behavioral conditioning linked to torture electronically driven torture as well as other forms, separation of family, from your kids, attacking and subjugation of my children, taking dominion over them,Stasi zersetzung neutralized and scripted never to be with them again. All contacts you have known separated from you, ghosted, targeted till subjugated and controlled as well as scripted. A victim is attacked 24/7 daily till dead.

  • 100 village square Glen cove NY is an illegal black site with a team in unit 335 Hispanic ms13 running the day to day atrocities. Hzz1289 kwk3534 LNLYSTR all Chrysler sedans dhp6634 in a Cadillac suburban hzz6934 Honda hcd5454 Acura hcw4855 Nissan Murano fxd8086 Toyota truck and more. Hacking into chase under this roof here theft ira accounts manipulation of banking using Anthony Lazzaro from Jim organ as they have recruits in every place. This is an extermination program a kill chain electronic concentration camp electronic torture program.

  • Yep, people need to wake up and realize that this has been going on secretly being done on certain individuals for whatever purpose that I have yet to understand why I was chosen for testing of this atrocious nightmare system. Over time I have come to understand that Identity theft is involved that the whole intent of creating the internet was for intelligence purposes already established for the aim to gain the data in every household including financial data and identity theft then became so common something that just happens to help these evil people in their Agenda 21 technocratic plan to hook us all up to the smart grid non consensually hacking us in our bodies and minds and attempting to control every thought and action and essentially our lives from the cradle to the grave. They have already been doing this secretly to some connecting us up with the grid including our cars tracking people with inheritance or insurance claims making sure that they will be able to steal that money from them in one way or another be it through a staged crisis or crash or what have you.

    I have already been under attack for years with this system that has taken them many decades to build but has been in the planning for a very long time. It has been done by way of frequencies and satellites, but it would seem that there is that nano dust and nano particle aspect that really has not revealed itself to the full extant in what way this has played a part. It would seem that these particles were initially various metals and toxins that sought to weaken our body’s various defenses like the blood brain barrier that would make us primed up for launching us unlawfully into the grid to be tracked and manipulated to steal everything from us and extract us including our thoughts and ideas and our creative potential something that Mr. Bill Gates is very adept at doing. He is a thief as is Elon Musk, they are thieves, pirates, and robber barons.

    They take and then claim it for themselves. It is why Mr. Gates speaks in the the third person collective saying we this and we that as though he is filled with demons, he probably is. These people have been spraying the atmosphere with metals that can be verified and also putting them in vaccines also verified all to break down our bodily defenses as it just so happens. Why are so many people deficient in certain essential nutrients and coming down increasingly with autoimmune diseases, neurological conditions, and cancers? Because those nutrients that guard against these illnesses are being extracted from us through the radiation frequencies and our food supply has been robbed of these essential nutrients making it impossible to get those nutrients from our foods. I would suggest a plot by the Klaus Schwab, Gates, Clinton, Soros, Zelenski, Davos, Rothschild, CERN, DARPA, HAARP, NATO, etc to establish a cradle to the grave system in which no person is free to chart their own path that every person is hooked up and can be tracked to ensure there is no escape from the mind/body prison they are attempting to create, where no person owns anything and everything is in their total control. The technocrats like Bezos, Musk, Gates, Zuckerberg, etc have all been tools in this plot, they all have just followed orders from those who have long been planning to do this just waiting for the right crisis to implement the final stages of the ESG, Agenda 21, Operation Gladio, totalitarian, fascist, communist, nazi, fabian, freemason, Luciferian, satanic Babylonian, nightmare world.

  • There are ways to defeat and defend against them. Gotu kola decalcifies the pineal gland thus reopening the ability to recall dreams and lucid dream again (in lucid dreaming you stop their nightmare projections and take control of the dream yourself). Blocking the ear canals for a few hours each day can stop certain frequencies interrupting homeostasis functions, especially glandular functions. Chamomile tea helps kidney function (for when they dehydrate you by frequency). White willow bark made in a tea is a great non pharmaceutical pain killer. Shutting of the electric to your house at night (except the refrigerator of course…. don’t shut that off), stops frequency pain associated with wiring and metal springs in furniture. Find the info, fight these fuckers and prevail so we can put them in trial for crimes against humanity!!!!

  • Duckduckgo gave me a heads up on a Google owned site called Electrocution in genitals. I did not copy the link and duckduckgo said there is no protection from trackers so….surprise. I am being electronically sexually assaulted and raped by a man of all things so I was looking for websites all around the web. Now Duckduckgos app really helps. I can see Facebook, amazon, Google and many others tracking me. I had no idea. I also use duckduckgos email for my Gmail. It removes trackers. It picked up about three on your website. And I see you are confronting targeting biblically.
    Be careful if you are supporting Targeted Justice their lawyer is saying he is proud of the lawsuit he lost but Targeted Justice lied to me saying that I must be CONFUSED that there was no lawsuit, so… The lawyer also banned me from talking on his website. Scandal. A true crime scandal. Criminals.
    He we are fighting this and they want to continue the crimes instead.
    Like what makes you think I’m confused. I told them I was no more confused than them.
    Get a chance check out CodyITC on YouTube it’s spirit communication but man it’s powerful because it shouldn’t exist. He is biblical. I think anything may help us solve this electronic crime going on.
    I’m having it terrible 24 hours a day electric rape, and conversation, invisible hallagrams like seen on the TV show Quantum Leap but unlike Quantum Leap it’s the police in the house watching me, harassing me, watching and monitoring me as everyday people, like my home is an incarceration center. Only prisoners are not intitled to having any privacy by being watched all the time.
    There has to be a way to prove this stuff.
    Just had to be some way.
    Thank you.

Leave a Reply