SOLUTIONS,  TECHNOLOGY

Loosen Technology’s Grip on Your Mind

Isn’t it funny how industry leaders believe that turning off lights, finding a channel on the TV, or turning on the radio constitutes as something being “smart.” Are these difficult tasks for human beings? When did humanity get so lazy? Nowadays, everything is “smart,” except for you of course. They want you to believe you are incapable and need their help, while they turn on the mic, the camera, implant subliminal messaging or frequencies, and spy on you through constant surveillance systems running across the entire grid.

Most people don’t even realize the damage that is being done to them, the mind control they are sipping in, and the constant energy-sucking distractions that are steadily stealing their lives.

There was a CBS reality television series called ‘Hunted’ that aired back in 2017, whereby 18 every-day people set off in 9 groups to try to get off grid by evading the FBI and US Marshalls in a time where everything is digitally tracked. If they could last the full 28 days without being hunted down, they would win $250k. It was interesting to observe how some of the seemingly obvious things to avoid, they were finding very difficult to live without, and how at every turn and every corner they were picked off due to surveillance everywhere.

Now more than ever, it is becoming increasingly important for people to protect themselves from the various methods of mind control being utilized through technology. It is equally important to protect one’s privacy and preserve their time and energy for living a more fulfilled life. Initially, it will take some time, courage, and support to cut a path toward healthier and safer habits and routines. This is where the Circle comes in and why it is so important. What is the Circle? It is something that The Solari Report has been prompting people to do for years – for people to form small groups of twelve or fewer members that meet regularly to provide a financial and educational support system for one another.

Working together in a Circle will provide a supportive system with loyal people who have each other’s backs, can tackle tasks together, research and coordinate plans, and in this case, some new technology and features that will assist the Circle in moving forward in a safer environment for their home, families, and the Circle itself.

This piece is designed to inspire a discussion of “best practices,” and we expect this to start a rich discussion that can lead to better network intelligence on how to use technology wisely. It can be downloaded in pdf format here for the convenience of having a printable checklist to work through.

It’s important to recognize and understand that nothing is truly 100% “safe” when it comes to privacy on the internet, but we do the best we can to protect ourselves and minimize our exposure and footprint. If the powers that be truly wanted access, we all know they control the doorways.

This article was written by Corey Lynn of Corey’s Digs for The Solari Report. Below is a conversation between Corey Lynn and Catherine Austin Fitts on this information.

The Infrastructure of Influence Operations

The infrastructure is somewhat boundless and seems to seep in from every crevice, but there are ways to minimize and avoid much of it. It’s important to recognize who and where it’s coming from, in order to begin removing and limiting all of this noise.

The Influencers

  • Social and news media
  • Entertainment industry
  • Education system – schools
  • Politicians
  • Big corp, big tech, and big pharma
  • Agents of influencers who make it seem like there is organic support for the narratives being pushed
  • Unknowing individuals who have been manipulated

Applications Used for Mind Control and Tracking

  • TV
  • Radio
  • Internet
  • Smartphones and Smartwatches
  • Video games
  • GPS system in vehicles
  • Cell towers
  • Smart meters
  • Surveillance cameras on every corner
  • Satellites and drones
  • Transhumanism-related technologies
  • AI and robotics
  • Smart devices, such as Amazon’s Alexa or Echo, Apple’s HomePod, or Google’s Nest Cam
  • Materials received in the mail
  • Visual aids such as signs, stickers, and plexiglass walls

Covert Invisible Forms of Mind Control

  • Long and short-wave electromagnetic forces emitted in public spaces to induce certain feelings
  • Frequency manipulation
  • Subliminal programming
  • Brainwave manipulation
  • Entrainment technology
  • Waveform can be transmitted through the entire power grid into our homes

Minimizing Risks & Maximizing Your Circle

This is one of the most important checklists you will ever complete. Sure, it may take several weeks, but that’s ok, this isn’t a race. It’s important to accomplish these tasks sooner than later, but it will also feel like a bit of a transformation, so pace yourself. Much of these can be done by yourself, but some of them will require a group effort. This is a good way for the Circle to come together and select which tasks to tackle first, while assigning some of the items to individuals most qualified.

I would highly recommend working on the items that will impact the Circle first, such as setting up a private open-source cloud communications system for the group, encrypted email accounts, and encrypted calling services, such as Telegram. It might be wise to bring your cell phones to one meeting so that everyone can help one another out while installing these apps, and other cell phone related tasks listed below. Once that is complete, cell phones should not be brought into meetings.

Many of these items are things you can do in your home and on your own, and may be welcomed new habits you find enjoyment in. Other items may be a little more challenging, which is why the support of the Circle is so powerful. You will have multiple people to offer a helping hand.

The Basics

❑ Unplug and turn off your TV, or get rid of it entirely, especially if it’s a smart TV.

❑ You may consider setting up a second phone number on an app such as Kall8 to have forwarded to your phone. This will protect your main number and limit the amount of robocalls and other potential nefarious actions against you.

❑ Clean out and organize files on your computer. Remove the 200 bookmarks you don’t need and only keep a small handful. Remove all the clutter to free your mind. Remove all application software you do not use.

❑ Clear your browser cache weekly. For speed, browsers will automatically cache website information and sometimes they don’t accept change very well. Here’s some handy cache clearing instruction links for MacOS Safari, iOS Safari, and FireFox. We do not recommend using Chrome or Outlook.

❑ Always read the terms and conditions when downloading or installing any apps. Though it is not recommended to install social media apps, these are the most dangerous ones because they sneak in information that allows them to access other areas of your phone. The 2013 documentary ‘Terms and Conditions May Apply’ is a must watch.

❑ Never save your password when asked. If you forgot your password, and want to generate another, you will not be able to override the one you said to save. You will need to go into your Key Chain, find the password and manually delete it from your system. The best policy is to not save your passwords to your computer. To keep them safe, write them down on a piece of paper and put in a safe place. You can’t hack paper. Computer security experts have begun recommending password managers such has Dashlane1PasswordLastpass, and Roboform. There are some major advantages to these services, as they generate and remember your passwords for you. You create one master password to access them. The information is saved onto your devices and powerfully encrypted so it’s almost impossible to hack. Be sure to always setup passwords and logins with double authentication where it’s available.

❑ Unsubscribe to everything you find unnecessary. They can put subliminal messages directly into emails as well.

❑ If you are backing up files from your computer, back them up to an external hard drive, not to an online cloud.

❑ Take some time every day to be out in nature and ground yourself.

❑ Meditate and/or pray several times a week, and consider Qi Gong to clear your energy field each day. This will help ground you as well. Lee Holden is a great source for free Qi Gong videos you can follow along to. Catherine loves Yuan Gong, and also provides a prayer book on the Solari Report, available in pdf download or for purchase.

❑ Keep your computer & mobile phone operating systems and applications up-to-date.

Cybersecurity and Privacy

❑ Ditch the smartphone if you can. If you can’t, we find Apple phones and Linux based phones far preferable to Android. Beware, because both Apple and Linux based phones must connect with telecommunication providers and that is where a lot of the trouble can start. Linux based phones take more knowledge and enjoy less tech support, so appreciate you may need help from a Linux phone pro. Apps are the big problem, so be careful what you download and put on your phone. Consider leaving your phone turned off and in the car. If you want to use a Faraday bag, appreciate that most do not work. Here is one that does, by Select Fabricators.

❑ Remove all tracking apps from cell phone, and all applications you don’t need or use.

❑ It is best to uninstall social media apps from cell phones.

❑ Use encrypted services for phone calls and messaging, such as Telegram, which can also be utilized on a desktop computer.

❑ Don’t sleep with any spyware technology in your bedroom, especially a smartphone.

❑ Turn off Bluetooth on your phone unless it’s absolutely necessary to occasionally turn on.

❑ If using GPS in your vehicle, be sure it is not one that transmits. Some experts believe all of them do, others say no, just some. We are not sure. Consider buying a hard GPS. Never ever use Google maps. It would be a wise idea to pick up some good old-fashioned large printed road maps. Know where you are going using maps and be aware of the institutions and sites around you (like military and enforcement locations.)

❑ No video platform is safe, so understand that you may be recorded.

❑ Avoid corporate operating systems, including all Windows operating systems, Chromebooks, and Amazon Fire computers.

❑ Use Libre Office or OpenOffice instead of Microsoft Office.

❑ Use Thunderbird instead of Microsoft Outlook.

❑ MacOS is recommended, or load a good Linux desktop distribution like Ubuntu Desktop or Mint on your existing PC hardware.

❑ If you’re using MacOS, make sure your firewall is enabled and you know how to configure it.

❑ Use ClamXAV Anti-Virus.

❑ FireFox has a built-in ad blocker or you can use Privacy Badger for FireFox. For all browsers, you can use uBlock Origin ad.

❑ Experts have differing opinions on VPNs, which are virtual private networks that mask and hide your location, providing privacy and anonymity. I personally use VPNs and have found them to work quite well for me. That said, proxy servers are also beneficial and some experts prefer using those. A proxy server is a remote application or appliance that acts as an intermediary for requests from clients seeking resources from serves that provide those resources, which allows you to mask and hide your location. Some popular free proxy servers are: Hidester, HideMe, ProxySite, Kproxy, VPNBook, Megaproxy, and Zens2.

❑ For search engines, consider using Duck Duck Go for a start page.

❑ Avoid visiting questionable websites to avoid viruses and trojans.

❑ Scams are at an all-time high, so be careful not to click on links inside emails, but rather type the url into a search bar instead if you’re not sure the email is legit.

❑ Don’t use unsecured public Wi-Fi. In your home, connect directly by ethernet if you can. If your ISP provides you a router with built in wifi, ask them to turn it off for you, then purchase a Netgear or Linksys mesh router, and plug it into the back of your router, which will allow you to turn off wifi when not using it. Here is a handy tutorial.

❑ Take the time to go into various background search databases and remove yourself from them, along with all other sites, and reduce your digital footprint. Every time you enter your full address and contact info into another website, there’s a good chance it’s being sold off to third parties.

❑ Don’t use email services by large corporations. If you need an alternative, we recommend Proton Mail and Start Mail. If you’re looking for a full-service provider, that can provide website registration, hosting, and email for your domain, we recommend infomaniak.

❑ An often overlooked source of domestic EMF and RF exposure comes from nearby high-tension power lines, AM, FM, Short Wave broadcast, TV Stations, and nearby Military bases. These sources often present radically higher EMF and RF exposure levels than cell phones and Bluetooth. Effective radiated power can reach, possibly exceed, one-million watts. The only way to really know your level of exposure is to hire a reputable engineering firm who can perform the required studies. This is an expensive solution that will remove all doubt.

Observation and Introspection to Avoid Mind Control Techniques

❑ When spending time on a computer, cell phone, or television, pay attention to your energy or emotions switching, like suddenly feeling warm and fuzzy or irritated. If you feel this shift for seemingly no reason, there is a good chance you were subjected to a subliminal message or wave. Clear your mind, clear your energy field, and center your heart to get back on track. The more in tune you become, the more you will recognize the need to minimize use of these devices and free your mind from the attacks.

❑ Observe your reactions – if you are doing, feeling, thinking, or saying something that seems “off” to you, you were likely manipulated. Did you suddenly feel drawn to or inspired by someone who you don’t really care for?

❑ Check yourself with your friends or Circle to help keep you on track.

❑ When you turn on a piece of equipment – understand what their incentive is. Are they selling you something? Are they trying to help you or harm you?

Protect Your Children

❑ Everything pertaining to phones, television, and internet above, should also be managed on your children’s devices as well, with the addition of parental control settings.

❑ Not to invoke fear, but I do not recommend a smartphone for children due to the high level of indoctrination, entrainment mind control tactics, and predators targeting children.

❑ Pornography is a huge industry which directly correlates to the child trafficking industry, generating $150 billion in revenue annually. Protecting your children from technology that drives these industries is of the utmost importance. I have written extensive reports on child trafficking nests and how they operate. Pornography is the gateway. The entertainment industry is famous for sexualizing children, just look at Netflix’s ‘Cuties’. Pornography is also a trap – if someone is browsing pornography and stumbles upon kiddie pornography, a control file may be created, which can be used at anytime to entrap a person into a felony, or for blackmail purposes.

❑ Search your local sex offenders registry and be aware of who is in your neighborhood. You may consider showing the mugshot photos to your children and letting them know that they should not befriend them if they see them in the neighborhood.

❑ If your children are still in public schools be sure to review their entire curriculum, especially the books they are to read and any books being read to them. Also explore the school library. They have been indoctrinating children through books for several decades now – filling their minds with broken families, not to trust parents, transgender agenda, climate change hoax, very dark stories to instill fear, and books that would incite rage and anger.

❑ Find out what your children are learning about and discussing in school, what signs and visual aids are posted throughout the school, and what they are playing on televisions in the classrooms.

❑ Most public schools are pushing the transgender agenda, whereby they are telling children they can “choose” to be a boy or girl, trying to create a gender identity crisis. From locker rooms to sporting events, pronouns to removing the words “mom and dad,” they are seeding their minds with mass confusion.

❑ Planned Parenthood is involved with many public schools as well, and their goal is to sexualize the children. Find out if they are involved with your children’s schools.

❑ Climate change and sustainability is a huge veil that has been placed over children’s eyes to make them believe they need to grow up and fight for the environment, when it’s really about training them to be good soldiers for controlled smart cities. Be sure to teach your children the difference between respecting and caring for the environment versus their “climate change” agenda. Agenda 21 and 2030 are good places to review for this.

❑ Solari has a dedicated page to mind control techniques on young people and children.

❑ Catherine Austin Fitts of The Solari Report recommends The Parent’s Guide to Texting, Facebook, and Social Media: Understanding the Benefits and Dangers of Parenting in a Digital World. Paperback – April 1, 2011 by Shawn Marie Edgington

Using Technology to Your Advantage

How to create an open-source cloud that the Circle can use to share documents
Get off the public cloud. Setup your own cloud on a local computer that someone in the Circle owns so that documents can be shared among the group. Someone in the Circle who is technology-oriented would be best suited to set it up. Here are some basic instructions for utilizing open-source software. OR, if you have someone who is technologically savvy, the better option would be to setup a cloud server from scratch on Linux. OR, setup a Network Attached Storage (NAS), which is a cloud-based open-source software that is preconfigured on the hardware and software level, that can be purchased.

❑ There are a lot of electromagnetic field (EMF) detectors and devices to protect from too much EMF, available online. I have personally purchased a few items from LessEMF. There are other stores available as well, such as EMR Shielding Solutions, and Select Fabricators, but I am not familiar with them or other companies, so be sure to do your due diligence with research. That said, Catherine’s tech team says that the Faraday pouches from Select Fabricators do work, so I am optimistic about their other products.

❑ I use an iMRS PEMF matt for health and keeping my energy field clear. Catherine uses Blushield for EMF protection, and QRS for health and keeping her energy field clear.

❑ The Circle might wish to brainstorm some ideas for utilizing the internet to educate others or sell a product or service, to raise funds that can be used for small software or technology purchases.

❑ Play some Bach or Gregorian chanting or Buddhist chanting to relax to soothing frequencies.

Free Your Mind

Once many of these tasks become habits and routine, you will begin to feel a sense of relief, like a weight has been lifted off your shoulders. You will have more free time, less distraction and less confusion. You will likely feel more privacy and a sense of freedom, safer and more secure. You may also notice a shift in your energy field, as though something that was once piercing it is no longer there.

If someone in the Circle is creating problems and not contributing ethically or isn’t competent, you may have to make the tough decision to remove them from your Circle. The Circle is for support, not additional distractions or disruptions from meeting your goals. Just as in life, with friends, sometimes we have to sever ties.Mantras and affirmations can be very powerful in deprogramming your mind from the infiltration of unneeded and unwanted information. Each morning upon waking, and at night before sleeping, say this mantra to yourself, or come up with one that works best for you.

“I will only allow information and frequencies into my mind and body that is for my best and highest good, that will serve my soul and keep me mentally and physically healthy.”

Always remember, you are not alone in this. Form your support Circle, and get to work!

Download this handy checklist in pdf format so you can print it out and work through the items to build a safer and more secure lifestyle for you and your family.

Subscribe to Corey’s Digs so you don’t miss a Dig!

Corey Lynn is an investigative journalist, co-host of the weekly Dig It! podcast, and co-host of The Solution Series. Follow her at coreysdigs.com, on Twitter, Gab, Truth, Rumble, and Telegram. Support her work by becoming a Patron, making a donation or buying a Book.

14 Comments

  • suzanna grove

    Corey and Catherine,
    Thank you both for this information about avoiding dangerous tech.
    Personally? I refuse to own and operate a smart phone. My mind may
    be fragile, not sure, but I simply do not want to be bothered with the
    phone.

  • Tom

    Additionally, if you have developed a love of reading, then be careful. Read those first few pages and see what the author says regarding acknowledgements. If his or her studies were financed by a particular group, then you may assume that the author will not have much negative to say about his or her backers.
    The fellow who wrote the book about Jekyll Island–I forget his name–has an interview on Youtube with Norman Dodd. There’s a Master’s Degree in History in that one-hour interview, and one learns about some of the groups which finance our “Official Histories”.
    I have been an avid reader since the late forties and it took me decades before I learned about the mis-leaders. Primarily, they lie by omission.

  • Alice

    Another excellent and thorough report. The whole area of technology is disturbing. Much of it I don’t use because I don’t understand it. Knowing that ‘they’ can inflict it on you is evil.

    Can I ask that when you do your amazon report you tell us how to get rid of an account? They don’t provide a cancel explanation – what a surprise! I feel sure there must be a way.

    Many thanks once again.

  • Tom

    Suzana, listen to the interview with Norman Dodd. Then read the “Greenbaum Speech”. Additionally, read the section of the “Autobiography of Benvenuto Cellini” where he goes to the Colosseum at midnight with a priest who summons demons. Knowing for sure who the enemy is is only easy in some cases; the more one reads, the more one is capable of discerning. The outfits Norman Dodd talks about are pretty evil and they are “real sponsors of the authors”. Once a writer sits at the enemy’s table he or she becomes a whore. I wish there were an easy answer for you.

  • Tammy Boron

    Enjoyed your article. As far as private emails, data protection, etc. you need to look at Swiss Cyber Safe. American and patriot owned, all servers in Switzerland. President of Protonmail is from China- why would you recommend and trust his allegiance to Americans?

  • Karl

    It’s a little bit misleading here to say that Apple phones are safer than Android phones, because they are both not safe! As long as you need to log into an account when you use a phone it becomes a tracking device. Check out Rob Braxman’s videos on Odysee or Youtube where he discusses about how smartphones have become a threat in our lives. His recommendation is to use a “DeGoogled” phone.

  • Chris H

    Good article thank you. I have already done a lot of what you are suggesting but still have a lot to do. Only a couple of things. I have heard that Protonmail is not secure and the company is suspect. Telegram I love but do not like how it wants your telephone number to register. Also the founder is listed on the World Economic Forums young entrepeneurs, so God knows what it is doing with all those dissenting views and voices on it. Lastly Duckduckgo is affiliated with Microsoft. The searches are very similar to Google, with promoted sites bumped up to the top and independent websites pushed to the rear. I prefer presearch which is a decentralised websearch on the blockchain with its own token. Also Dweb. Both great independent startups.

  • Jim

    “…we find Apple phones and Linux based phones far preferable to Android” Not me. Well, Linux would be fine, but not Apple. At least Android is an open operating system and you can de-Google your phone (https://brax.me/prod/host.php?f=_store&h=rob&p=). Apple is a closed system, and they recently announced how they’re going to scan photos on your device, ostensibly for child porn, but we know what that means – you have no privacy on Apple devices. If you must use a smart phone, go for a de-Googled Android and don’t use the App Store to obtain programs for it. That also means give up some of the conveniences like Google Maps.

  • Su Terry

    The author of The Creature From Jekyll Island is G. Edward Griffin. He has many videos on YouTube (which, in light of YT’s latest culling, may not last on that platform).

    The book, however, is a must-read. Someone loaned it to me, and I asked if I could keep it so I can read it again and make notes in it. I had to trade my hardcover edition of Blindness by Jose Saramago, but it was worth it.

  • Karen

    Wow. This is very overwhelming! Where do you start with all of the suggestions and how do you implement them, especially if you are not a techie?

  • Caroline

    Brave browser is much better than DuckDuckGo, and they even have their own search function. However, you have to go to the site first before searching, but they are working on making it better.

  • Irucka Embry

    Corey, thank you for writing this insightful and fairly comprehensive article on technology.

    I want to share with you and your readers the following resources that are grouped in sections:

    Mind Control Resources:

    https://www.questionuniverse.com/rethink.html#control
    Questioning the Universe Publishing (QUP) {Irucka Embry]: Resources to help us rethink, reimagine, & reFeel our world: Mind Control & Propaganda

    https://www.questionuniverse.com/rethink.html#symbol
    Questioning the Universe Publishing (QUP) {Irucka Embry]: Resources to help us rethink, reimagine, & reFeel our world: Symbolism

    Free/Libre and Open Source Software (FLOSS) and Hardware to Overcome global surveillance Resources:

    https://www.ecoccs.com/resources_links.html#free_world
    EcoC²S [Irucka Embry): EcoC²S Online Resources: Freeing and Opening Hardware, Information, Knowledge, Society, Software, and the World

    https://www.ecoccs.com/resources_technology_alternatives.html
    EcoC²S [Irucka Embry): Alternatives to Proprietary, Freedom- and Privacy-Deleting Technologies

    Additional Resources on both the negative aspects of technology & Free/Zero Point Energy Information:

    https://www.questionuniverse.com/rethink.html#globsurv
    Questioning the Universe Publishing (QUP) {Irucka Embry]: Resources to help us rethink, reimagine, & reFeel our world: Global Surveillance

    https://derrickjensen.org/welcome-to-the-machine/
    The official Derrick Jensen site: “Welcome to the Machine: Science, Surveillance, and the Culture of Control”

    https://www.globalresearch.ca/technology-addiction-in-the-electronic-age-worldwide-progress-or-servitude/5317843
    “Technology Addiction” in the Electronic Age: Worldwide Progress or Servitude?
    By Joel S. Hirschhorn, Global Research, January 05, 2013

    https://www.questionuniverse.com/oldway/electromagnetic_air_pollution.html
    Questioning the Universe Publishing (QUP) {Irucka Embry]: True change begins from within…: Electromagnetic Waves as an Indoor Air Pollutant
    By Irucka Embry, E.I.T., 2022-05-08

    https://www.questionuniverse.com/oldway/the-technological-progression-must-be-questioned-and-understood-by-all.php
    Questioning the Universe Publishing (QUP) {Irucka Embry]: True change begins from within…: The technological progression must be questioned and understood by all
    By Irucka Ajani Embry, 12 May 2003

    https://www.ecoccs.com/resources_links.html#missing
    EcoC²S [Irucka Embry): EcoC²S Online Resources: What Biotechnology, Genetic Engineering, Synthetic Biology, Cloning, Nanotechnology, High-Technology (High Tech), Conventional Renewable Energy Technologies (“Solar”, Geothermal, Wind, etc.), and Related Technologies are missing

    https://www.questionuniverse.com/vibrationkunvorted/solution-you.html
    Questioning the Universe Publishing (QUP) {Irucka Embry]: Home of Hip Hop artist Vibration Kŏn’vûrt’ɛd [Kunvorted}: Untitled: The Solution — You” lyrics page: Magnetic levitation, free energy, other suppressed technologies and knowledge

    Thank you.

    Irucka Embry

  • Nikki

    Hi Corey
    I’ve sent you correspondence re my email frozen, no googly help whatsoever.
    Once back on track let you know new mail.

    For natural health, making own, rescources, help and to get rid of nano, and emf interupters, go to or check out, a great guy,
    Tony Pantallaresco.
    Only trust him no others as they are copying his stuff but dont understand it properly.
    Put in Tony Pantallaresco how to make a nano bucket.
    It draws out the nano particles.
    Note scientists are saying they have made robots nano, atom sized now.
    Time to exert your Will and say no to their abuses.
    Also, turn off tv’s or complain to about sexualised adds, and adds that encourage gambling the industries they own.

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to Corey's Digs